Search the Community

Showing results for tags 'local'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Location


Interests


Occupation


TeamViewer


Tox

Found 62 results

  1. NetShareWatcher version 1.5.8.0 local SEH buffer overflow exploit. View the full article
  2. Advanced Host Monitor version 11.92 Beta suffers from a buffer overflow vulnerability. View the full article
  3. WordPress GraceMedia Media Player plugin version 1.0 suffers from a local file inclusion vulnerability. View the full article
  4. McAfee ePO version 5.9.1 suffers from a local access bypass vulnerability. View the full article
  5. Apple macOS version 10.13.5 local privilege escalation exploit. View the full article
  6. Social Bookmarking Software version 1.2.3 suffers from a local file inclusion vulnerability. View the full article
  7. This exploit bypasses access control checks to use a restricted API function (POST /v2/snaps) of the local snapd service. This allows the installation of arbitrary snaps. Snaps in "devmode" bypass the sandbox and may include an "install hook" that is run in the context of root at install time. dirty_sockv2 leverages the vulnerability to install an empty "devmode" snap including a hook that adds a new user to the local system. This user will have permissions to execute sudo commands. As opposed to version one, this does not require the SSH service to be running. It will also work on newer versions of Ubuntu with no Internet connection at all, making it resilient to changes and effective in restricted environments. This exploit should also be effective on non-Ubuntu systems that have installed snapd but that do not support the "create-user" API due to incompatible Linux shell syntax. Some older Ubuntu systems (like 16.04) may not have the snapd components installed that are required for sideloading. If this is the case, this version of the exploit may trigger it to install those dependencies. During that installation, snapd may upgrade itself to a non-vulnerable version. Testing shows that the exploit is still successful in this scenario. This is the second of two proof of concepts related to this issue. Versions below 2.37.1 are affected. View the full article
  8. This exploit bypasses access control checks to use a restricted API function (POST /v2/create-user) of the local snapd service. This queries the Ubuntu SSO for a username and public SSH key of a provided email address, and then creates a local user based on these value. Successful exploitation for this version requires an outbound Internet connection and an SSH service accessible via localhost. This is one of two proof of concepts related to this issue. Versions below 2.37.1 are affected. View the full article
  9. IP-Tools version 2.5 local buffer overflow SEH exploit with egghunter shellcode. View the full article
  10. River Past Cam Do version 3.7.6 suffers from a local buffer overflow vulnerability. View the full article
  11. Avast Anti-Virus versions prior to 19.1.2360 suffer from a local credential disclosure vulnerability. View the full article
  12. [HIDEhttps://mega.nz/#!aqY1yIYJ!7JX2XenLV6X_wyP4iRCEKQSA_zny6d7_Xy51EzQslt4][/HIDE] Pass: level23hacktools.com
  13. SureMDM versions prior to the 2018-11 Patch suffers from local and remote file inclusion vulnerabilities. View the full article
  14. UltraISO version 9.7.1.3519 local buffer overflow SEH exploit. View the full article
  15. R i386 version 3.5.0 local buffer overflow SEH exploit. View the full article
  16. 10-Strike Network Inventory Explorer version 8.54 local buffer overflow SEH exploit with DEP bypass. View the full article
  17. HTML Video Player version 1.2.5 suffers from a local buffer overflow vulnerability. View the full article
  18. Faleemi Desktop Software version 1.8 local SEH buffer overflow exploit with DEP bypass. View the full article
  19. 1337day-Exploits

    Exploits R 3.4.4 Local Buffer Overflow

    R version 3.4.4 local non-SEH buffer overflow exploit for Windows XP SP3. View the full article
  20. MySQL user-defined (Linux) x32 / x86_64 sys_execfunction local privilege escalation exploit. Can be leveraged against versions 4.x and 5.x. View the full article
  21. Joomla! Easy Shop component version 1.2.3 suffers from a local file inclusion vulnerability. View the full article
  22. PHP Dashboards NEW version 5.8 suffers from a local file inclusion vulnerability. View the full article
  23. SeoToaster Ecommerce version 3.0.0 suffers from a local file inclusion vulnerability. View the full article
  24. Check Point ZoneAlarm version 8.8.1.110 suffers from a local privilege escalation vulnerability. View the full article