exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from IhaQueR

First Active2000-09-08
Last Active2003-06-28
suiddmp.c
Posted Jun 28, 2003
Authored by IhaQueR

Local root exploit that makes use of a race condition vulnerability found in the Linux execve() system call that affects the 2.4 kernel tree.

tags | exploit, kernel, local, root
systems | linux
SHA-256 | c02c2f58cf3b035c346097edc9de2f0459979689331100ce6b90e71e1f58d4b2
ktv.sh
Posted Jul 18, 2001
Authored by IhaQueR

Ktvision v0.1.1-271 and below symlink local root exploit. Tested against SuSE 7.1.

tags | exploit, local, root
systems | linux, suse
SHA-256 | 7484393e8ed414c9a92178e33e802ebab4f5ba09c299bb89762e99c3e225abf9
rctab.tar.gz
Posted Jan 27, 2001
Authored by IhaQueR

Due to a various race conditions in the init level editing script /sbin/rctab it is possible for any local user to overwrite any system's file with arbitrary data. This may result in denial of service attack, local or even remote root compromise, if root runs the /sbin/rctab script. Tested against SuSE 7.0.

tags | exploit, remote, denial of service, arbitrary, local, root
systems | linux, suse
SHA-256 | fc19e225e62f6f5c2e025ec29e9a8a3f1627d65e3092f30765ef013a8834d294
explbsd395.c
Posted Sep 13, 2000
Authored by IhaQueR

Screen 3.9.5 BSD local root exploit. Tested against OpenBSD.

tags | exploit, local, root
systems | bsd, openbsd
SHA-256 | 8ee52045aae8ee9d02f7529addb6cb4f32eb283bdbcc2dfabb8ab07255fc01c5
screen-expl.c
Posted Sep 13, 2000
Authored by IhaQueR

Screen 3.7.6 (and others) local root exploit.

tags | exploit, local, root
SHA-256 | 62f1c82f1876f11bcc563d044cc998f0f0b3ce2061a32bad1588595b8a773e53
expl395.c
Posted Sep 8, 2000
Authored by IhaQueR

Screen 3.9.5 and below local root exploit for Linux. Tested against SuSE 6.1.

tags | exploit, local, root
systems | linux, suse
SHA-256 | b32cf02872905afa005ea30d36475fca569d44e349e023f5c0478a9e94373d11
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close