吉林十一选五多少期      
吉林十一选五多少期 | 安全文章 | 安全工具 | Exploits | 本站原創 | 關于我們 | 網站地圖 | 安全論壇
熱門關鍵字: shell  88888  art  vitter  vsserver
 :::VITTERSAFE危特網安::: >> 搜索 “linux” 結果:
Linux Kernel < 4.4.0-116 (Ubuntu 16.04.4) - Local Privilege Escalation 點擊:233
  /* * Ubuntu 16.04.4 kernel priv esc * * all credits to @bleidl * - vnik */ // Tested on: // 4.4.0-116-generic #140-Ubuntu SMP Mon Feb 12 21:23:04 UTC 2018 x86_64 // if different kernel adjust CRED offset + check kernel stack size #include stdio.h #in(2018-03-20)
SC 7.16 - Stack-Based Buffer Overflow 點擊:16
  # Exploit Author: Juan Sacco - //www.exploitpack.com [email protected] # Bug found using Exploit Pack - Local fuzzer feature. # # Tested on: GNU/Linux - Kali Linux # Filename: pool/main/s/sc/sc_7.16-4+b2_i386.deb # # Description: SC v7.16 i(2018-03-13)
glibc '$ORIGIN' Expansion Privilege Escalation 點擊:17
  ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core/exploit/local/linux'require 'msf/core/exploit/exe'class MetasploitModule Msf::Exploit::Local Rank(2018-02-11)
glibc LD_AUDIT Arbitrary DSO Load Privilege Escalation 點擊:20
  ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core/exploit/local/linux'require 'msf/core/exploit/exe'class MetasploitModule Msf::Exploit::Local Rank(2018-02-11)
Microsoft Windows Subsystem for Linux - 'execve()' Local Privilege Escalation 點擊:17
  #define _GNU_SOURCE #include errno.h #include stdio.h #include stdlib.h #include string.h #include unistd.h #include fcntl.h #include sys/socket.h #include sys/stat.h #include sys/wait.h #include sys/types.h #include sys/mman.h #include unistd.h #inc(2018-02-05)
Docker Sudo Privilege Escalation 點擊:16
  #!/bin/bash# SUDO Docker Privilege Escalation # https://github.com/pyperanger/dockerevil# SELINUX bypass using :z option# https://docs.docker.com/engine/admin/volumes/bind-mounts/#configure-the-selinux-labelecho [*] SUDO Docker Privilege Escalation;(2018-01-18)
Linux Kernel < 4.4.0-83 / < 4.8.0-58 (Ubuntu 14.04/16.04) - Local Privilege Esca 點擊:15
  // A proof-of-concept local root exploit for CVE-2017-1000112. // Includes KASLR and SMEP bypasses. No SMAP bypass. // Tested on Ubuntu trusty 4.4.0-* and Ubuntu xenial 4-8-0-* kernels. // // Usage: // [email protected]:~$ uname -a // Linux ubuntu 4.8.0-58(2018-01-03)
Linux Kernel >= 4.9 eBPF memory corruption bugs Vulnerability 點擊:22
  Hi! A few BPF verifier bugs in the Linux kernel, most of which can be used for controlled memory corruption, have been fixed over the last days. One of the bugs was introduced in 4.9, the others were only introduced in 4.14. The fixes are in the net(2017-12-22)
Linux kernel < 4.10.15 - Race Condition Privilege Escalation 點擊:23
  /* * PoC for CVE-2017-10661, triggers UAF with KASan enabled in kernel 4.10 */ #include string.h #include sys/timerfd.h #include sys/time.h #include sys/msg.h #include sys/types.h #include sys/socket.h #include sys/mman.h #include errno.h #include ti(2017-12-19)
Linux Kernel - DCCP Socket Use-After-Free 點擊:28
  /* This is an announcement for CVE-2017-8824 which is a use-after-free vulnerability I found in Linux DCCP socket. It can be used to gain kernel code execution from unprivileged processes. Youll find in attachment the proof of concept code and the ke(2017-12-07)
首頁 上一頁 [1]  [2]  [3]  [4]  [6]  [7]  下一頁 末頁
相關關搜索: linux 3C 21ENTITY 25 asd SYSTEM 22http 3A 2F 2Fo  linux 3C 21ENTITY 25 asd SYSTEM 5C 27http 3A 2F  Linux node  Linux 4.40  linux+3C+21ENTITY++25+asd+SYSTEM++5C+27http+3A+2F  Linux+node  linux+3C+21ENTITY++25+asd+SYSTEM++22http+3A+2F+2Fo  吉林十一选五多少期
CopyRight © 2002-2019 吉林十一选五多少期 All Rights Reserved