Difference between revisions of "Enhome"

From PwnWiki
Line 1: Line 1:
[[File:Pwnwiki.jpg |200px | right]]
+
{{DISPLAYTITLE:<span style="position: absolute; clip: rect(1px 1px 1px 1px); clip: rect(1px, 1px, 1px, 1px);">{{FULLPAGENAME}}</span>}}
+
 
<font size="2" color="blue"><p>Free, everyone editable vulnerability library</p></font>
+
<div class="section group">
<font size="2" color="green"><p>Currently included[[Special:Statistics|{{NUMBEROFPAGES}}]]Pages,[[Special:Statistics|{{NUMBEROFUSERS}}]]Active editors</p>
+
<div class="col span_2_of_2">
</font>
+
<div style="background:#F6F6F6;text-align: center;border:1px solid #ddd;">
<center>Pwnwiki Fan exchange group(Telegram: [https://t.me/pwnwiki_zh @pwnwiki_en])Everyone is welcome to join.</center>
+
<div style="margin-bottom:7px;">
<center>Twitter[https://twitter.com/pwnwikiorg @pwnwikiorg]。</center>
+
<div style="font-size: 2em;">Welcome to '''[https://www.pwnwiki.org Pwnwiki]'''</div>
 +
'''Pwnwiki''' - '''Free, everyone editable vulnerability library'''<br>
 +
<font size="2" color="green"><p>Currently included [[Special:Statistics|{{NUMBEROFPAGES}}]] pages,[[Special:Statistics|{{NUMBEROFUSERS}}]] Active editor.</p>
 +
</div></div>
 +
</div>
 +
</div>
 +
 
 +
<div class="section group">
 +
<div class="col span_2_of_2">
 +
<center> [[Nginx]] | [[Weblogic]] | [[Wordpress]] | [[Fastjson]] | [[Windows]] | [[Linux]] |  [[Apache/Httpd]] | [[Discuz]] |  [[IOT]] | [[ThinkCMF]]</center>
 +
</div>
 +
</div>
 +
{| style="margin: auto; width: 750px;"
 +
| style="text-align: left; margin: 1em 1em 1em 0; border: 1px solid #20A3C0; padding: .2em;" |
 +
{| cellspacing="2px"
 +
| valign="middle" | [[Image:Trans.jpeg|50px]]
 +
| Other language:
 +
| [https://www.pwnwiki.org/index.php?title=Eshome Español] [https://www.pwnwiki.org/index.php?title=Ruhome русский] [https://www.pwnwiki.org/index.php?title=Enhome English] [https://www.pwnwiki.org/index.php?title=Uahome Український]
 +
|}
 +
|}
 +
{| width=100%
 +
| id="mf-versions" style="width: 34%; background: #FCFCFC; border: 1px solid #ccc; vertical-align: top;" |
 +
<div style="background: #cafcf8; padding: 5px; margin: 3px; font-weight: bold; text-align: center; color: #000000; font-size: 120%; ">Latest Recommended</div>
 +
{{Recommended_English}}
 +
 
 +
| id="mf-versions" style="width: 34%;  border: 1px solid #ccc; vertical-align: top;" |
 +
<div style="background: #d2ffc9;  padding: 5px; margin: 3px; font-weight: bold; text-align: center; color: #000000; font-size: 120%;; ">Popular items</div>
 +
<div style="padding-left: 1em;">
 +
* [https://www.pwnwiki.org/index.php?title=WiFi_Mouse_1.7.8.5%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E WiFi Mouse 1.7.8.5遠程代碼執行漏洞]
 +
* [https://www.pwnwiki.org/index.php?title=CVE-2021-26855_-_Exchange_Server_SSRF%E6%BC%8F%E6%B4%9E CVE-2021-26855 - Exchange Server SSRF漏洞]
 +
* [https://www.pwnwiki.org/index.php?title=Apache_Solr%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AE%80%E5%8F%96%E6%BC%8F%E6%B4%9E Apache Solr任意文件讀取漏洞]
 +
 
 +
</div>
 +
|}
 +
{| width=100%
 +
| id="mf-guides" style="width: 33%; background: #FCFCFC; border: 1px solid #ccc; vertical-align: top;" |
 +
<div style="background: #ebc9ff;  padding: 5px; margin: 3px; font-weight: bold; color: #000000; text-align: center; font-size: 120%;; ">News Broadcast</div>
 +
<div style="padding-left: 1em;">
 +
{{News_English}}
 +
</div>
 +
|}
 +
{| width=100%
 +
 
 +
| id="mf-links" style="width: 33%; background: #FCFCFC; border: 1px solid #ccc; vertical-align: top;" |
 +
<div style="background: #fbffc9;  padding: 5px; margin: 3px; font-weight: bold; color: #000000; text-align: center; font-size: 120%;; ">Penetration test data</div>
 +
<div style="padding-left: 1em;">
 +
*[https://www.pwnwiki.org/index.php?title=%E4%BD%BF%E7%94%A8OpenSsl%E5%8A%A0%E5%AF%86%E5%8F%8D%E5%BD%88shell 使用OpenSsl加密反彈shell]
 +
*[https://www.pwnwiki.org/index.php?title=Burpsuite%E9%A9%97%E8%AD%89%E7%A2%BC%E8%AD%98%E5%88%A5%E6%8F%92%E4%BB%B6xp_CAPTCHA Burpsuite驗證碼識別插件xp CAPTCHA]
 +
<br>
 +
</div>
 +
| id="mf-gallery" style="width: 33%; background: #FCFCFC; border: 1px solid #ccc; vertical-align: top;" |
 +
<div style="background: #ffe7c9; padding: 5px; margin: 3px; font-weight: bold; color: #000000; text-align: center; font-size: 120%;; ">Join us</div>
 +
<div style="padding-left: 1em;">
 +
[[File:Logo_header.jpg|200px|left]]
 +
*See [https://www.mediawiki.org/wiki/Help:Formatting/zh#HTML_%E6%A0%87%E8%AE%B0 manual] To get information on using this wiki! <br>
 +
*You need to [https://www.pwnwiki.org/index.php?title=%E7%89%B9%E6%AE%8A:%E4%BD%BF%E7%94%A8%E8%80%85%E7%99%BB%E5%85%A5 log in]。<br>
 +
*No account? [https://www.pwnwiki.org/index.php?title=%E7%89%B9%E6%AE%8A:%E5%BB%BA%E7%AB%8B%E5%B8%B3%E8%99%9F Click to register] <br>
 +
*Click on<small>[https://www.pwnwiki.org/index.php?title=%E7%B7%A8%E8%BC%AF%E8%AA%AA%E6%98%8E here]</small>View the editing instructions.<br>
 +
*Please click to help translate<small>[https://www.pwnwiki.org/index.php?title=%E7%89%B9%E6%AE%8A:%E5%85%A7%E5%AE%B9%E7%BF%BB%E8%AD%AF here]</small> .
 +
</div>
 +
|-
 +
|
 +
|
 +
|}

Revision as of 14:51, 22 March 2021


Welcome to Pwnwiki

Pwnwiki - Free, everyone editable vulnerability library

Currently included 6,176 pages,521 Active editor.

Trans.jpeg Other language: Español русский English Український
Latest Recommended
Popular items
News Broadcast

CVE-2021-3493

The OverlayFS vulnerability allows local users under Ubuntu to gain root privileges. An Ubuntu specific issue in the overlayfs file system in the Linux kernel, in which it did not correctly validate the application regarding the file system function of the user namespace. Since Ubuntu comes with a patch that allows unprivileged overlayfs to mount, local attackers can use it to gain higher privileges.

Ubuntu-logo32.png

Affected version

Ubuntu 20.10
Ubuntu 20.04 LTS
Ubuntu 18.04 LTS
Ubuntu 16.04 LTS
Ubuntu 14.04 ESM

Repair suggestions

  • Update system package version
  • Update the Linux kernel to 5.11