what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 100 RSS Feed

Files

FreeBSD fd Privilege Escalation
Posted Dec 30, 2019
Authored by Karsten Konig

Local root exploit for the FreeBSD fd vulnerability as disclosed in FreeBSD-SA-19:02.fd.

tags | exploit, local, root
systems | freebsd, bsd
advisories | CVE-2019-5596
SHA-256 | 05adfc97defa9b66032601dddbc7174d89d7c42893b3449bce122d3043b86df0

Related Files

poppassd-lnx.sh.txt
Posted Sep 26, 2005
Authored by Kingcope

Linux Qpopper poppassd latest version local root exploit.

tags | exploit, local, root
systems | linux
SHA-256 | 359257daa77f9f0e2c89be1a887fb0aee80f2b97f3cb11af5a5f3c2e3e21073d
poppassd-freebsd.sh.txt
Posted Sep 26, 2005
Authored by Kingcope

FreeBSD Qpopper poppassd latest version local root exploit. Tested on FreeBSD 5.4-RELEASE.

tags | exploit, local, root
systems | freebsd
SHA-256 | ec9e82155213753b712f0aa73de5fe9e2ef20be39dbc88b2b8f9c0fc19bed853
x_osh2-9byte.pl.txt
Posted Aug 24, 2005
Authored by Charles Stevenson

Operator Shell (osh) 1.7-12 local root exploit. New version of an old exploit. This version has the shellcode trimmed down to 9 bytes thanks to Andrewg.

tags | exploit, shell, local, root, shellcode
SHA-256 | 93c7051b9b8e5fc758a98373d2984054e773f1047fd7a891921e608d15228270
x_osh2.pl.txt
Posted Aug 17, 2005
Authored by Charles Stevenson

Operator Shell (osh) 1.7-12 local root exploit. New version of an old exploit.

tags | exploit, shell, local, root
SHA-256 | 4ddcb37c6addfe9669637e9768105bf89fb404c3737bcff22f8e1019069720c9
kavLocalRoot.txt
Posted Aug 13, 2005
Authored by Dr. Peter Bieringer

Due to the logs directory being 777 by default, Kaspersky AntiVirus 5.5 is susceptible to a local root exploit via a symlink attack. Details are provided.

tags | exploit, local, root
SHA-256 | 4221d11c999895f3600e0c16961946b2c0424f23876f1d8b87d18a563fb9fbfa
lantronixRoot.txt
Posted Aug 6, 2005
Authored by c0ntex

Multiple Lantronix Secure Console Server local root exploits that make use of security issues allowing for unrestricted shell access.

tags | exploit, shell, local, root
SHA-256 | c0a5ce471897d527b519e28394d96c4425c7cba31436744d12e76f3ba35bd3c2
webapp-config-05182005.txt
Posted May 22, 2005
Authored by Eric Romang | Site zataz.net

Gentoo webapp-config prior to v1.10-r14 insecure temp file creation advisory and local root exploit. Requires that the root user installs, upgrades, or deletes a Gentoo provided web application with the webapp-config tool. More information available here.

tags | exploit, web, local, root
systems | linux, gentoo
SHA-256 | 2b65efbc316467f3bf71596936ac3d3b83b43b919e292377283fe01bacb7a19b
ong_bak.c
Posted Apr 18, 2005
Authored by qobaiashi

Local root exploit for the Linux kernel code that has the Bluetooth related flaw.

tags | exploit, kernel, local, root
systems | linux
SHA-256 | 4a8d3385026264b0d9c530ed4943c63ac284e7a2e54d4eb0f283eec2b83b2aa5
xosx-cf.c
Posted Mar 24, 2005
Authored by vade79 | Site fakehalo.us

Local root exploit for /usr/bin/su on Mac OS X that makes use of the buffer overflow vulnerability discovered by iDefense using the CF_CHARSET_PATH environment variable.

tags | exploit, overflow, local, root
systems | apple, osx
advisories | CVE-2005-0716
SHA-256 | 3d4f65ef5c5787a4e22d1adaf440941026368d42080a9637123986b999b4dcbf
luxman_ex2.pl
Posted Mar 17, 2005
Authored by Kevin Finisterre | Site digitalmunition.com

LuxMan 0.41-19.1 local root exploit that makes use of a buffer overflow.

tags | exploit, overflow, local, root
advisories | CVE-2005-0385
SHA-256 | 7b01e49311df22b1e782ddfdbb2ef21a26bd6b3b31f09ee7f544b869544f4e19
paxomatic.c
Posted Mar 15, 2005
Authored by Christophe Devine

PaX double-mirrored VMA munmap local root exploit. This exploit has only been tested on Debian 3.0 running Linux 2.4.29 patched with grsecurity-2.1.1-2.4.29-200501231159.

tags | exploit, local, root
systems | linux, debian
SHA-256 | 60c1ceed2d16f7931996d9a19b03526bcb19cf2759c368e25b75293b7ef9f6f5
ex_perl2b.c
Posted Feb 22, 2005
Authored by Kevin Finisterre | Site digitalmunition.com

Local root exploit for the PerlIO package that makes use of a buffer overflow in PERLIO_DEBUG.

tags | exploit, overflow, local, root
advisories | CVE-2005-0156
SHA-256 | 9d0552984b75d1eee91c3d55047ad2d3a217517c70c32a822a80f3f6ad4a4f98
ex_perl.c
Posted Feb 22, 2005
Authored by Kevin Finisterre | Site digitalmunition.com

Local root exploit for the PerlIO package that makes use of a flaw where manipulation of the filename set in PERLIO_DEBUG allows for local root compromise when using setuid perl.

tags | exploit, local, root, perl
advisories | CVE-2005-0155
SHA-256 | 37c8e812ac9515d45c3ee54cc72ae33c4155953042f46623108ce7b9ced75a3c
un_0wnz_macue.txt
Posted Feb 22, 2005
Authored by unl0ck | Site unl0ck.void.ru

Mac OS X local root exploit for Adobe Version Cue that makes use of insecure path.

tags | exploit, local, root
systems | apple, osx
SHA-256 | 017cece775091cace1f674e295d3b3f0bba7d27840068e165334ad1654ae1d51
x_osh.pl
Posted Feb 6, 2005
Authored by Charles Stevenson

Operator Shell (osh) 1.7-12 local root exploit.

tags | exploit, shell, local, root
SHA-256 | fe3a929faff57858b299fc1c0d1660e3387d19c65452c581dd20e06aa4b548d6
trn-test.txt
Posted Jan 27, 2005
Authored by ZzagorR | Site rootbinbash.com

Local root exploit for /usr/bin/trn. Tested on Mandrake 9.2, Slackware 9.1.0/10.0.0.

tags | exploit, local, root
systems | linux, slackware, mandrake
SHA-256 | 01582be97fed45d219f9fdddda6cbadc367a0d5d9c76671520bd0222ed537e2d
fm-iSink.c
Posted Jan 25, 2005
Authored by nemo

Local root exploit for mRouter installed by iSync on Mac OS X 10.3.

tags | exploit, local, root
systems | apple, osx
SHA-256 | 9a814a90dbb6e5458ed265b55264c5bf185da8f2b4e2f51e6fe813505c80c98a
un-htget_0.9x.txt
Posted Jan 6, 2005
Authored by nekd0 | Site unl0ck.void.ru

Local root exploit for htget versions 0.9.x and below.

tags | exploit, local, root
SHA-256 | b00f0adbb375360a412bc0c36539c6f346a47598682b2be9741666ecb5fe30b7
raptor_udf.c
Posted Dec 31, 2004
Authored by Marco Ivaldi | Site 0xdeadbeef.info

Local root exploit that makes use of the dynamic library for do_system() in MySQL UDF. Tested on MySQL 4.0.17.

tags | exploit, local, root
SHA-256 | 95a7207a7051562030ac705492537b56b8b7240a2c9e35e9973ec9e34e4a0c48
raptor_passwd.c
Posted Dec 31, 2004
Authored by Marco Ivaldi | Site 0xdeadbeef.info

Local root exploit for a vulnerability in the passwd circ() function under Solaris/SPARC 8/9. This exploit uses the ret-into-ld.so technique, to effectively bypass the non-executable stack protection (noexec_user_stack=1 in /etc/system).

tags | exploit, local, root
systems | solaris
advisories | CVE-2004-0360
SHA-256 | a6e61ccf2c4234b32ebb45aaf4f04d6bf8eaca49b1b7f4a8c10f9a63208bbd20
raptor_libdthelp2.c
Posted Dec 31, 2004
Authored by Marco Ivaldi | Site 0xdeadbeef.info

Local root exploit for a buffer overflow in CDE libDtHelp library that allows local users to execute arbitrary code via a modified DTHELPUSERSEARCHPATH environment variable and the Help feature. Works against Solaris/SPARC 7/8/9. This is the ret-into-ld.so version of raptor_libdthelp.c, able to bypass the non-executable stack protection (noexec_user_stack=1 in /etc/system).

tags | exploit, overflow, arbitrary, local, root
systems | solaris
advisories | CVE-2003-0834
SHA-256 | b8436092faaf18ae6c0392c009430729a21181ff6e47eb8696bfd081a924f23b
raptor_libdthelp.c
Posted Dec 31, 2004
Authored by Marco Ivaldi | Site 0xdeadbeef.info

Local root exploit for a buffer overflow in CDE libDtHelp library that allows local users to execute arbitrary code via a modified DTHELPUSERSEARCHPATH environment variable and the Help feature. Works against Solaris/SPARC 7/8/9.

tags | exploit, overflow, arbitrary, local, root
systems | solaris
advisories | CVE-2003-0834
SHA-256 | 5e7614c63543acb78f04d9c4e7b85a01cf23e73fb1477712065be31ad5ee010b
raptor_ldpreload.c
Posted Dec 31, 2004
Authored by Marco Ivaldi | Site 0xdeadbeef.info

Local root exploit for a stack-based buffer overflow in the runtime linker, ld.so.1, on Solaris 2.6 through 9 that allows local users to gain root privileges via a long LD_PRELOAD environment variable.

tags | exploit, overflow, local, root
systems | solaris
advisories | CVE-2003-0609
SHA-256 | 6d7bdc11a3396a323aa02a43e2fdb992917edce2a4b72006644e2f579e17c406
ultrix_dxterm_4.5_exploit.c
Posted Dec 30, 2004
Authored by ztion

Ultrix 4.5/MIPS dxterm local root exploit.

tags | exploit, local, root
SHA-256 | a9f9cac2b843401fbda3fc88a820da9c83707b1c0da6ba220ccbd95e33098818
dc_iwconfig.c
Posted Oct 26, 2004
Authored by Diabolic Crab | Site hackerscenter.com

Local root exploit for /usr/sbin/iwconfig.

tags | exploit, local, root
SHA-256 | 10b71b48cb5e4b165f212352a02ef424f83595d0dcaf1c2619779a0133ef61f9
Page 4 of 4
Back1234Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close