Search the Community

Showing results for tags 'local'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Location


Interests


Occupation


TeamViewer


Tox

Found 73 results

  1. FTPShell Server version 6.83 Account name to ban local buffer overflow exploit. View the full article
  2. FTPShell Server version 6.83 Virtual Path Mapping local buffer overflow exploit. View the full article
  3. Apache versions 2.4.17 up to 2.4.38 apache2ctl graceful logrotate local privilege escalation exploit. View the full article
  4. River Past Cam Do version 3.7.6 suffers from an activation code local buffer overflow vulnerability. View the full article
  5. WordPress Form Maker plugin version 1.13.2 suffers from cross site request forgery and local file inclusion vulnerabilities. View the full article
  6. phpFileManager version 1.7.8 suffers from a local file inclusion vulnerability. View the full article
  7. Thomson Reuters Concourse and Firm Central versions prior to 2.13.0097 suffer from directory traversal and local file inclusion vulnerabilities. View the full article
  8. WordPress Anti-Malware Security and Brute-Force Firewall plugin version 4.18.63 suffers from a local file inclusion vulnerability. View the full article
  9. WordPress Loco Translate plugin version 2.2.1 suffers from a local file inclusion vulnerability. View the full article
  10. Microsoft Windows Win32k local privilege escalation proof of concept exploit. View the full article
  11. X-NetStat Pro version 5.63 local buffer overflow exploit with egghunter. View the full article
  12. NetShareWatcher version 1.5.8.0 local SEH buffer overflow exploit. View the full article
  13. Advanced Host Monitor version 11.92 Beta suffers from a buffer overflow vulnerability. View the full article
  14. WordPress GraceMedia Media Player plugin version 1.0 suffers from a local file inclusion vulnerability. View the full article
  15. McAfee ePO version 5.9.1 suffers from a local access bypass vulnerability. View the full article
  16. Apple macOS version 10.13.5 local privilege escalation exploit. View the full article
  17. Social Bookmarking Software version 1.2.3 suffers from a local file inclusion vulnerability. View the full article
  18. This exploit bypasses access control checks to use a restricted API function (POST /v2/snaps) of the local snapd service. This allows the installation of arbitrary snaps. Snaps in "devmode" bypass the sandbox and may include an "install hook" that is run in the context of root at install time. dirty_sockv2 leverages the vulnerability to install an empty "devmode" snap including a hook that adds a new user to the local system. This user will have permissions to execute sudo commands. As opposed to version one, this does not require the SSH service to be running. It will also work on newer versions of Ubuntu with no Internet connection at all, making it resilient to changes and effective in restricted environments. This exploit should also be effective on non-Ubuntu systems that have installed snapd but that do not support the "create-user" API due to incompatible Linux shell syntax. Some older Ubuntu systems (like 16.04) may not have the snapd components installed that are required for sideloading. If this is the case, this version of the exploit may trigger it to install those dependencies. During that installation, snapd may upgrade itself to a non-vulnerable version. Testing shows that the exploit is still successful in this scenario. This is the second of two proof of concepts related to this issue. Versions below 2.37.1 are affected. View the full article
  19. This exploit bypasses access control checks to use a restricted API function (POST /v2/create-user) of the local snapd service. This queries the Ubuntu SSO for a username and public SSH key of a provided email address, and then creates a local user based on these value. Successful exploitation for this version requires an outbound Internet connection and an SSH service accessible via localhost. This is one of two proof of concepts related to this issue. Versions below 2.37.1 are affected. View the full article
  20. IP-Tools version 2.5 local buffer overflow SEH exploit with egghunter shellcode. View the full article
  21. River Past Cam Do version 3.7.6 suffers from a local buffer overflow vulnerability. View the full article
  22. Avast Anti-Virus versions prior to 19.1.2360 suffer from a local credential disclosure vulnerability. View the full article
  23. [HIDEhttps://mega.nz/#!aqY1yIYJ!7JX2XenLV6X_wyP4iRCEKQSA_zny6d7_Xy51EzQslt4][/HIDE] Pass: level23hacktools.com
  24. SureMDM versions prior to the 2018-11 Patch suffers from local and remote file inclusion vulnerabilities. View the full article