exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 100 RSS Feed

Files

Polkit pkexec CVE-2021-4034 Proof Of Concept
Posted Jan 26, 2022
Authored by Andris Raugulis | Site github.com

Local privilege escalation root exploit for Polkit's pkexec vulnerability as described in CVE-2021-4034. Verified on Debian 10 and CentOS 7. Written in C.

tags | exploit, local, root
systems | linux, debian, centos
advisories | CVE-2021-4034
SHA-256 | 5c59fb8b51079e3f956e9fcbe1974b3cbb587b1887064897119332a9ecf3f86a

Related Files

Gentoo Linux Security Advisory 201207-04
Posted Jul 10, 2012
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201207-4 - A format string vulnerability in X.Org X Server may allow local privilege escalation or Denial of Service. Versions less than 1.11.4-r1 are affected.

tags | advisory, denial of service, local
systems | linux, gentoo
advisories | CVE-2012-2118
SHA-256 | b0d1eee9c53822368b3a146abd6fb5bcb3d98cb36cb607389e11d483eebd4395
Gentoo Linux Security Advisory 201207-10
Posted Jul 10, 2012
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201207-10 - Multiple vulnerabilities have been found in CUPS, some of which may allow execution of arbitrary code or local privilege escalation. Versions less than 1.4.8-r1 are affected.

tags | advisory, arbitrary, local, vulnerability
systems | linux, gentoo
advisories | CVE-2009-3553, CVE-2010-0302, CVE-2010-0393, CVE-2010-0540, CVE-2010-0542, CVE-2010-1748, CVE-2010-2431, CVE-2010-2432, CVE-2010-2941, CVE-2011-3170
SHA-256 | ac1a9fddc193fe58d21d0ca7c54126b91d2ff39c64167361020f526fdbf282f1
Hadoop 1.0.3 Symlink
Posted Jun 30, 2012
Authored by Simon .

Hadoop version 1.0.3 suffers from a local privilege escalation symlink vulnerability.

tags | exploit, local
advisories | CVE-2012-2945
SHA-256 | 7f6cd0d9985fb43e4512064e577e4aab0f6f8459eb7920053453fd5bbb415dd7
Vertrigoserv 2.27 Privilege Escalation
Posted May 19, 2012
Authored by X-Cisadane

Vertrigoserv version 2.27 local privilege escalation exploit.

tags | exploit, local
SHA-256 | ba28adebd6177911ad385cd217cc5aab499dbcebb1a6018dd42105c54d466e49
Windows Kernel ReadLayoutFile Heap Overflow
Posted May 10, 2012
Authored by Core Security Technologies, Fernando Russ | Site coresecurity.com

Core Security Technologies Advisory - There is a bug in the ReadLayoutFile Windows Kernel function that can be leveraged into a local privilege escalation exploit, potentially usable in a client-side attack scenario or after a remote intrusion by other means.

tags | advisory, remote, kernel, local
systems | windows
advisories | CVE-2012-0181
SHA-256 | ad5c6d91d11d4dcc9b8463439354e1e8142812d8ed2bc300fc637ac6cc763462
Symantec pcAnywhere Insecure File Permissions / Privilege Escalation
Posted May 2, 2012
Authored by Edward Torkington | Site ngssoftware.com

Symantec pcAnywhere suffers from an insecure file permissions vulnerability that allows for local privilege escalation.

tags | exploit, local
SHA-256 | 33997bb51755dd9bf99f53ef0cdc9918dbf0a6168c5c6e325055dca848b578f7
Symantec PCAnywhere Privilege Escalation
Posted Jan 25, 2012
Authored by Edward Torkington | Site ngssoftware.com

Symantec PCAnywhere version 12.5.x suffers from a local privilege escalation vulnerability.

tags | advisory, local
SHA-256 | 949533286d184aa8a366db5cecd292980a2b41e4568456879244809c63d57eb0
PolicyKit 0.101 Privilege Escalation
Posted Oct 5, 2011
Authored by zx2c4

PolicyKit versions 0.101 and below local privilege escalation exploit.

tags | exploit, local
advisories | CVE-2011-1485
SHA-256 | 8e1577823139cfa501ce0535ad03ba8172e54feaed9443aab35fb42423be384b
Norman Security Suite 8 Privilege Escalation
Posted Sep 28, 2011
Authored by Xst3nZ

Norman Security Suite version 8 nprosec.sys local privilege escalation exploit.

tags | exploit, local
SHA-256 | 8df0aafe1184c7cf43771d10c41a84e3e72021a993eb8896efc956fdbba50721
Debian Security Advisory 2293-1
Posted Aug 13, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2293-1 - Tomas Hoger found a buffer overflow in the X.Org libXfont library, which may allow for a local privilege escalation through crafted font files.

tags | advisory, overflow, local
systems | linux, debian
advisories | CVE-2011-2895
SHA-256 | d38139e3d1721864f60469101f5742fa6eb83264bdaf18ae660175d7089d70f5
Cisco VPN Client Privilege Escalation
Posted Jul 5, 2011
Authored by Gavin Jones | Site ngssecure.com

The 64 Bit Cisco VPN Client for Windows 7 is affected by a local privilege escalation vulnerability that allows non-privileged users to gain administrative privileges.

tags | advisory, local
systems | cisco, windows
SHA-256 | 08f5570d4c6be54c002cfa145af36178430faf32f06ff0356ead9ce97f74e70d
Cisco Security Advisory 20110601-ac
Posted Jun 1, 2011
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - The Cisco AnyConnect Secure Mobility Client, previously known as the Cisco AnyConnect VPN Client, is affected by arbitrary program execution and local privilege escalation vulnerabilities. There are no workarounds for the vulnerabilities described in this advisory.

tags | advisory, arbitrary, local, vulnerability
systems | cisco
advisories | CVE-2011-2039, CVE-2011-2040, CVE-2011-2041
SHA-256 | b6f62c24ad600052d82c60490ef64ffb9b47d1a6b4fbb76139a5453a3b92aadf
Vmware vSphere Management Assistant (vMA) Privilege Escalation
Posted May 16, 2011
Authored by @drk1wi

Vmware vSphere Management Assistant (vMA) suffers from a local privilege escalation vulnerability.

tags | exploit, local
SHA-256 | 00cf8c44a6d902ca66053c39cade132def8aa3357eed4f38516bf8a5094862aa
tmux 1.3 / 1.4 Privilege Escalation
Posted Apr 11, 2011
Authored by ph0x90bic

tmux versions 1.3 and 1.4 suffer from a -S option incorrect setgid local privilege escalation vulnerability.

tags | exploit, local
advisories | CVE-2011-1496
SHA-256 | cd885fe8e526cc9f25b3d09ae86f267db6f64ccabdcde1494411eddaa61dea49
VMware Security Advisory 2011-0006
Posted Mar 30, 2011
Authored by VMware | Site vmware.com

VMware Security Advisory 2011-0006 - The VMware vmrun utility is susceptible to a local privilege escalation in non-standard configurations.

tags | advisory, local
advisories | CVE-2011-1126
SHA-256 | 069d709991feb1e78d30ec92cec7f28dd116782787338066a58527dd30e9ea96
FreeBSD 6.4 Netgraph Privilege Escalation
Posted Mar 10, 2011
Authored by zx2c4

FreeBSD versions 6.4 and below Netgraph local privilege escalation exploit.

tags | exploit, local
systems | freebsd
advisories | CVE-2008-5736
SHA-256 | f9bec532885df70ffa4f6568914b356999d9c3d3c17fd766a1248a5b0e06d65d
Mono/Moonlight Local Privilege Escalation
Posted Jan 11, 2011
Authored by Chris Howie

Mono/Moonlight suffers from a local privilege escalation vulnerability.

tags | exploit, local
advisories | CVE-2010-4254
SHA-256 | dbb7e39dc55c86d76a0dd4ef8dadef2773134510e6cf07fbbc3bf405f1dcc77d
Linux Kernel 2.6.37 Local Privilege Escalation
Posted Dec 8, 2010
Authored by Dan Rosenberg

Linux kernel local privilege escalation exploit for versions 2.6.37 and below. It leverages three separate vulnerabilities to achieve root including a NULL pointer dereference, being able to assign arbitrary Econet addresses to arbitrary interfaces, and the ability to write a NULL word to an arbitrary kernel address.

tags | exploit, arbitrary, kernel, local, root, vulnerability
systems | linux
advisories | CVE-2010-4258, CVE-2010-3849, CVE-2010-3850
SHA-256 | 90c6bf981c13631f20aedf98e74ee2ce76bde194f9c594a64c300a938f3bfa47
Linux Systemtap Privilege Escalation
Posted Nov 26, 2010
Authored by Tavis Ormandy

This code demonstrates a local privilege escalation vulnerability in systemtap.

tags | exploit, local
advisories | CVE-2010-4170
SHA-256 | fd7691a08020e68fc8cc7b5dd46bd1790de570b5d43ecd78597ce5d6e5cb8cad
Native Instruments Service Center 2.2.5 Local Privilege Escalation
Posted Nov 20, 2010
Authored by LiquidWorm | Site zeroscience.mk

Native Instruments Service Center version 2.2.5 suffers from a local privilege escalation vulnerability.

tags | advisory, local
SHA-256 | 17003a3d3ba0281c940bdee33302d7f863117f4222be5fa9fc977e0d2d38b948
Oracle Virtual Server Agent Local Privilege Escalation
Posted Nov 3, 2010
Site onapsis.com

Onapsis Security Advisory - The Oracle Virtual Server Agent suffers from a local privilege escalation vulnerability. By exploiting this vulnerability, an authenticated attacker would be able to remotely compromise the OVS server, together with all the virtual machines configured on it. This would result in the compromise of integrity, availability and confidentiality of every virtual machine deployed in the OVS server.

tags | advisory, local
advisories | CVE-2010-3584
SHA-256 | 8bb07a17e1151edee2f97edcaff919d8ae30d080f8d6e3f3cd95c2a984839665
FreeBSD mbufs() Sendfile Cache Poisoning Exploit
Posted Aug 19, 2010
Authored by Kingcope

FreeBSD mbufs() sendfile cache poisoning local privilege escalation exploit that throws a setuid shell in /tmp. Works on 7.x and 8.x builds prior to 12Jul2010.

tags | exploit, shell, local
systems | freebsd
SHA-256 | 52de447adb0cf2da2d0293e293c0bb572852ec6114e07299e2dfc735fc81b5ce
Zemana AntiLogger Local Privilege Escalation
Posted Jul 28, 2010
Authored by th_decoder

Zemana AntiLogger with AntiLog32.sys versions 1.5.2.755 and below suffer from a local privilege escalation vulnerability.

tags | exploit, local
SHA-256 | c4b5374aef4fafad83d8cf34f59211029acaf54deb05c6b2269c93d7ea737d0a
InterScan Web Security 5.0 Local Privilege Escalation
Posted Jun 25, 2010
Authored by Ivan Huertas | Site cybsec.com

InterScan Web Security version 5.0 suffers from a local privilege escalation vulnerability.

tags | exploit, web, local
SHA-256 | c03b30071efd39649f473633d9b056d835c22798ac9cb37e2ec1d2cd7d8e9c18
Kingsoft WebShield KAVSafe.sys Privilege Escalation
Posted May 25, 2010
Authored by Xuanyuan Smart

Kingsoft WebShield KAVSafe.sys versions 2010.4.14.609(2010.5.23) and below suffer from a kernel mode local privilege escalation vulnerability.

tags | exploit, kernel, local
SHA-256 | 17fca34022bf7c6b745aa66d33307d17c847110bb4ff1afb04b49e92d86e465d
Page 1 of 4
Back1234Next

File Archive:

June 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    19 Files
  • 2
    Jun 2nd
    16 Files
  • 3
    Jun 3rd
    28 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    19 Files
  • 7
    Jun 7th
    23 Files
  • 8
    Jun 8th
    11 Files
  • 9
    Jun 9th
    10 Files
  • 10
    Jun 10th
    4 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    27 Files
  • 20
    Jun 20th
    65 Files
  • 21
    Jun 21st
    10 Files
  • 22
    Jun 22nd
    8 Files
  • 23
    Jun 23rd
    6 Files
  • 24
    Jun 24th
    6 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    15 Files
  • 28
    Jun 28th
    14 Files
  • 29
    Jun 29th
    11 Files
  • 30
    Jun 30th
    7 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close