Kernel Exploitler için Liste

bykzlu-x

Üye
9 Ocak 2008
190
5
Linux
Common
Linux 2.2.x ->Linux kernel ptrace/kmod local root exploit ( https://tik.lat/6HPrR )
Linux 2.2.x (on exported files, should be vuln) ( https://tik.lat/wacoT )
Linux <= 2.2.25 ->Linux Kernel 2.x mremap missing do_munmap Exploit ( https://tik.lat/iYPVm )

Linux 2.4.x ->Linux kernel ptrace/kmod local root exploit ( https://tik.lat/2qt2D )
Linux 2.4.x -> pwned.c - Linux 2.4 and 2.6 sys_uselib local root exploit ( https://tik.lat/zUqsd )
Linux 2.4.x ->Linux kernel 2.4 uselib() privilege elevation exploit ( https://tik.lat/Ywhft )
Linux 2.4.20 ->Linux Kernel Module Loader Local R00t Exploit ( https://tik.lat/p5TfV )
Linux <= 2.4.22 ->Linux Kernel <= 2.4.22 (do_brk) Local Root Exploit ( https://tik.lat/ZdNhP )
Linux 2.4.22 ->Linux Kernel 2.4.22 "do_brk()" local Root Exploit (PoC) ( https://tik.lat/HCmlX )
Linux <= 2.4.24 ->Linux Kernel 2.x mremap missing do_munmap Exploit ( https://tik.lat/taafo )
Linux 2.4.x < 2.4.27-rc3 (on nfs exported files) ( https://tik.lat/71MHK )

Linux <= 2.6.2 ->Linux Kernel 2.x mremap missing do_munmap Exploit ( https://tik.lat/DkuRN )
Linux 2.6.11 -> Linux Kernel <= 2.6.11 (CPL 0) Local Root Exploit (k-rad3.c) ( https://tik.lat/JJ2K1 )
Linux 2.6.13 <= 2.6.17.4 -> Linux Kernel 2.6.13 <= 2.6.17.4 prctl() Local Root Exploit (logrotate) ( https://tik.lat/HBV4N )
Linux 2.6.13 <= 2.6.17.4 -> Linux Kernel 2.6.13 <= 2.6.17.4 sys_prctl() Local Root Exploit ( https://tik.lat/fZDo7 )
Linux 2.6.11 <= 2.6.17.4 -> h00lyshit.c -Linux Kernel <= 2.6.17.4 (proc) Local Root Exploit ( https://tik.lat/U07YU )
Linux 2.6.x < 2.6.7-rc3 (default configuration) ( https://tik.lat/3CGLg )
Linux 2.6.x -> pwned.c - Linux 2.4 and 2.6 sys_uselib local root exploit ( https://tik.lat/COR0b )

Debian
Debian 2.2 ->/usr/bin/pileup Local Root Exploit ( https://tik.lat/BAaWc )

Ubuntu
Ubuntu Breezy 5.10 Installer Password Disclosure Vulnerability ( https://tik.lat/ahu9H )

Slackware
Slackware 7.1 ->/usr/bin/Mail Exploit ( https://tik.lat/yuJmS )

Mandrake
Mandrake 8.2 -> /usr/mail local exploit ( https://tik.lat/rqfLS )
Mandrake <= 10.2 -> cdrdao Local Root Exploit ( https://tik.lat/vMuIs )

Suse
SuSE Linux 9.1 -> ’chfn’ local root bug ( https://tik.lat/cvWnk )
SuSE Linux 9.2 -> ’chfn’ local root bug ( https://tik.lat/tiZfD )
SuSE Linux 9.3 -> ’chfn’ local root bug ( https://tik.lat/SB06v )
SuSE Linux 10.0 -> ’chfn’ local root bug ( https://tik.lat/VF63M )
SuSE Linux Enterprise Server 8 -> ’chfn’ local root bug ( https://tik.lat/nvYrQ )
SuSE Linux Enterprise Server 9 -> ’chfn’ local root bug ( https://tik.lat/PEPq5 )

BSD
Freebsd
Freebsd 3.5.1 ->Ports package local root ( https://tik.lat/iEi6O )
Freebsd 4.2 ->Ports package local root ( https://tik.lat/WhFql )
FreeBSD 4.x <= 5.4) master.passwd Disclosure Exploit ( https://tik.lat/ISNw6 )

Openbsd
Openbsd 2.x - 3.3 ->exec_ibcs2_coff_prep_zmagic() Kernel Exploit ( https://tik.lat/jkYNk )
OpenBSD 3.x-4.0 ->vga_ioctl() root exploit ( https://tik.lat/RGx54 )


Sun-Microsystems
Solaris
Solaris 2.4 ->lion24.c ( https://tik.lat/vAws7 )
Solaris 2.6 with 107733-10 and without 107733-11 ( https://tik.lat/tF26w )
Solaris 2.6 with 107733-10 and without 107733-11 ( https://tik.lat/k0Ibp )
Solaris 5.5.1 ->X11R6.3 xterm ( https://tik.lat/xZCB4 )
Solaris 7 with 106950-14 through 106950-22 and without 106950-23 ( https://tik.lat/UJg43 )
Solaris 7 with 106950-14 through 106950-22 and without 106950-23 ( https://tik.lat/2MwWK )
Solaris 7 without patch 107178-03 ( https://tik.lat/bt7YY )
Solaris 7 without patch 107178-03 ( https://tik.lat/J37Ty )
Solaris 8 without patch 108949-08 ( https://tik.lat/6X6WO )
Solaris 8 without patch 108949-08 ( https://tik.lat/nKp2y )
Solaris 8 with 109147-07 through 109147-24 and without 109147-25 ( https://tik.lat/IPKlu )
Solaris 8 with 108993-14 through 108993-31 and without 108993-32 ( https://tik.lat/S25CO )
Solaris 8 with 109147-07 through 109147-24 and without 109147-25 ( https://tik.lat/a1IM5 )
Solaris 8 with 108993-14 through 108993-31 and without 108993-32 ( https://tik.lat/HSL03 )
Solaris 9 without patch 116308-01 ( https://tik.lat/Fe08I )
Solaris 9 without patch 116308-01 ( https://tik.lat/pWDTZ )
Solaris 9 without 113476-11 ( https://tik.lat/NhXgM )
Solaris 9 without 112963-09 ( https://tik.lat/kKYDG )
Solaris 9 without 113476-11 ( https://tik.lat/VzjSp )
Solaris 9 without 112963-09 ( https://tik.lat/yS9ks )
Solaris 10 (libnspr) Arbitrary File Creation Local Root Exploit ( https://tik.lat/PkP8I )
Solaris 10 (libnspr) constructor Local Root Exploit ( https://tik.lat/kQNjn )

SunOS
SunOS 5.10 Generic i86pc i386 i86pc ( https://tik.lat/dub43 )
SunOS 5.9 Generic_112233-12 sun4u ( https://tik.lat/WL8N0 )

Bir yerde saklayın arkadaşlar lazım olur birgüm
 
Üst

Turkhackteam.org internet sitesi 5651 sayılı kanun’un 2. maddesinin 1. fıkrasının m) bendi ile aynı kanunun 5. maddesi kapsamında "Yer Sağlayıcı" konumundadır. İçerikler ön onay olmaksızın tamamen kullanıcılar tarafından oluşturulmaktadır. Turkhackteam.org; Yer sağlayıcı olarak, kullanıcılar tarafından oluşturulan içeriği ya da hukuka aykırı paylaşımı kontrol etmekle ya da araştırmakla yükümlü değildir. Türkhackteam saldırı timleri Türk sitelerine hiçbir zararlı faaliyette bulunmaz. Türkhackteam üyelerinin yaptığı bireysel hack faaliyetlerinden Türkhackteam sorumlu değildir. Sitelerinize Türkhackteam ismi kullanılarak hack faaliyetinde bulunulursa, site-sunucu erişim loglarından bu faaliyeti gerçekleştiren ip adresini tespit edip diğer kanıtlarla birlikte savcılığa suç duyurusunda bulununuz.