Search the Community

Showing results for tags 'local'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Premium Accounts
  • Modders Section
  • PRIV8-Section
  • Cracking Zone PRIV8
  • Carding Zone PRIV8

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 104 results

  1. The best WordPress security plugin, Better WP Security, is now... iThemes Security shows you a list of things to do to make your site more secure with a simple way to turn options on or off. We've simplified these steps and provided descriptions of each action so you know exactly what's happening on your site. You shouldn't have to be a security pro to use a security plugin. And isn't that the point? Demo: [Hidden Content] [HIDE][Hidden Content]]
  2. This Metasploit module exploits an issue in ptrace_link in kernel/ptrace.c before Linux kernel 5.1.17. This issue can be exploited from a Linux desktop terminal, but not over an SSH session, as it requires execution from within the context of a user with an active Polkit agent. In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. View the full article
  3. X.Org X Server version 1.20.4 suffers from a local stack overflow vulnerability. View the full article
  4. Uplay version 92.0.0.6280 suffers from a local privilege escalation vulnerability. View the full article
  5. DeviceViewer version 3.12.0.1 add user local buffer overflow exploit with DEP bypass. View the full article
  6. ASX to MP3 Converter version 3.1.3.7 .asx local stack overflow exploit. View the full article
  7. Duplicator Pro version 1.3.14 and below suffer from a local information disclosure vulnerability. View the full article
  8. 1337day-Exploits

    Gila CMS Local File Inclusion

    Gila CMS versions prior to 1.11.1 suffer from a local file inclusion vulnerability. View the full article
  9. macOS version 18.7.0 kernel local privilege escalation exploit that may only work on Macs before 2016. View the full article
  10. Alkacon OpenCMS version 10.5.x suffers from a local file inclusion vulnerability. View the full article
  11. Confluence Server versions 6.1.0 up to 6.6.16, 6.7.0 up to 6.13.7, and 6.14.0 up to 6.15.8 suffer from a file disclosure vulnerability. View the full article
  12. PilusCart versions 1.4.1 and below suffers from a file disclosure vulnerability. View the full article
  13. Steam Windows client local privilege escalation exploit. View the full article
  14. Aptana Jaxer version 1.0.3.4547 suffers from a local file inclusion vulnerability. View the full article
  15. Microsoft Windows 7 Build 7601 (x86) local privilege escalation exploit. View the full article
  16. Microsoft Windows Task Scheduler suffers from a local privilege escalation vulnerability. The Windows MMC auto-elevates members of the 'administrators' group via the GUI and MMC snap-ins (via mmc.exe) automatically elevate without prompting UAC potentially leading to unintentional elevation of privilege. View the full article
  17. 1337day-Exploits

    FlightPath Local File Inclusion

    FlightPath versions prior to 4.8.2 and 5.0-rc2 suffer from a local file inclusion vulnerability. View the full article
  18. Karenderia CMS version 5.1 suffers from a local file inclusion vulnerability. View the full article
  19. Exim versions 4.87 through 4.91 suffer from a local privilege escalation vulnerability. View the full article
  20. Telus Actiontec T2200H with firmware T2200H-31.128L.08 suffers from a local privilege escalation vulnerability. View the full article
  21. Microsoft Windows AppX Deployment Service local privilege escalation exploit that bypasses CVE-2019-0841. View the full article
  22. IceWarp versions 10.4.4 and below suffer from a local file inclusion vulnerability. View the full article
  23. DVD X Player version 5.5 Pro suffers from a local buffer overflow vulnerability. View the full article
  24. Rapid7 Windows InsightIDR Agent version 2.6.3.14 suffers from a local privilege escalation vulnerability. View the full article
  25. Serv-U FTP Server version 15.1.6.25 suffers from a local privilege escalation vulnerability via authentication bypass. View the full article