Search the Community

Showing results for tags 'local'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Location


Interests


Occupation


TeamViewer


Tox

Found 76 results

  1. WordPress Diarise theme version 1.5.9 suffers from a local file disclosure vulnerability. View the full article
  2. Vulmap is an open source online local vulnerability scanner project. It consists of online local vulnerability scanning programs for Windows and Linux operating systems. These scripts can be used for defensive and offensive purposes. It is possible to make vulnerability assessments using these scripts. Also they can be used for privilege escalation by pentesters/red teamers. Vulmap can be used to, scan vulnerabilities on localhost, see related exploits and download them. Scripts basically, scan localhost to gather installed software information and ask vulmon.com api if there are any vulnerabilies and exploits related with installed software. If vulnerabilities exist, vulmap give CVE ID, risk score, vulnerability's detail link, exploit id and exploit title. Exploits can be downloaded with vulmap also. [HIDE][Hidden Content]]
  3. osTicket version 1.11 suffers from cross site scripting and local file inclusion vulnerabilities. View the full article
  4. FTPShell Server version 6.83 Account name to ban local buffer overflow exploit. View the full article
  5. FTPShell Server version 6.83 Virtual Path Mapping local buffer overflow exploit. View the full article
  6. Apache versions 2.4.17 up to 2.4.38 apache2ctl graceful logrotate local privilege escalation exploit. View the full article
  7. River Past Cam Do version 3.7.6 suffers from an activation code local buffer overflow vulnerability. View the full article
  8. WordPress Form Maker plugin version 1.13.2 suffers from cross site request forgery and local file inclusion vulnerabilities. View the full article
  9. phpFileManager version 1.7.8 suffers from a local file inclusion vulnerability. View the full article
  10. Thomson Reuters Concourse and Firm Central versions prior to 2.13.0097 suffer from directory traversal and local file inclusion vulnerabilities. View the full article
  11. WordPress Anti-Malware Security and Brute-Force Firewall plugin version 4.18.63 suffers from a local file inclusion vulnerability. View the full article
  12. WordPress Loco Translate plugin version 2.2.1 suffers from a local file inclusion vulnerability. View the full article
  13. Microsoft Windows Win32k local privilege escalation proof of concept exploit. View the full article
  14. X-NetStat Pro version 5.63 local buffer overflow exploit with egghunter. View the full article
  15. NetShareWatcher version 1.5.8.0 local SEH buffer overflow exploit. View the full article
  16. Advanced Host Monitor version 11.92 Beta suffers from a buffer overflow vulnerability. View the full article
  17. WordPress GraceMedia Media Player plugin version 1.0 suffers from a local file inclusion vulnerability. View the full article
  18. McAfee ePO version 5.9.1 suffers from a local access bypass vulnerability. View the full article
  19. Apple macOS version 10.13.5 local privilege escalation exploit. View the full article
  20. Social Bookmarking Software version 1.2.3 suffers from a local file inclusion vulnerability. View the full article
  21. This exploit bypasses access control checks to use a restricted API function (POST /v2/snaps) of the local snapd service. This allows the installation of arbitrary snaps. Snaps in "devmode" bypass the sandbox and may include an "install hook" that is run in the context of root at install time. dirty_sockv2 leverages the vulnerability to install an empty "devmode" snap including a hook that adds a new user to the local system. This user will have permissions to execute sudo commands. As opposed to version one, this does not require the SSH service to be running. It will also work on newer versions of Ubuntu with no Internet connection at all, making it resilient to changes and effective in restricted environments. This exploit should also be effective on non-Ubuntu systems that have installed snapd but that do not support the "create-user" API due to incompatible Linux shell syntax. Some older Ubuntu systems (like 16.04) may not have the snapd components installed that are required for sideloading. If this is the case, this version of the exploit may trigger it to install those dependencies. During that installation, snapd may upgrade itself to a non-vulnerable version. Testing shows that the exploit is still successful in this scenario. This is the second of two proof of concepts related to this issue. Versions below 2.37.1 are affected. View the full article
  22. This exploit bypasses access control checks to use a restricted API function (POST /v2/create-user) of the local snapd service. This queries the Ubuntu SSO for a username and public SSH key of a provided email address, and then creates a local user based on these value. Successful exploitation for this version requires an outbound Internet connection and an SSH service accessible via localhost. This is one of two proof of concepts related to this issue. Versions below 2.37.1 are affected. View the full article
  23. IP-Tools version 2.5 local buffer overflow SEH exploit with egghunter shellcode. View the full article
  24. River Past Cam Do version 3.7.6 suffers from a local buffer overflow vulnerability. View the full article