Difference between revisions of "Enhome"
From PwnWiki
| Line 1: | Line 1: | ||
| − | + | {{DISPLAYTITLE:<span style="position: absolute; clip: rect(1px 1px 1px 1px); clip: rect(1px, 1px, 1px, 1px);">{{FULLPAGENAME}}</span>}} | |
| − | + | ||
| − | < | + | <div class="section group"> |
| − | <font size="2" color="green"><p>Currently included[[Special:Statistics|{{NUMBEROFPAGES}}]] | + | <div class="col span_2_of_2"> |
| − | </font> | + | <div style="background:#F6F6F6;text-align: center;border:1px solid #ddd;"> |
| − | <center> | + | <div style="margin-bottom:7px;"> |
| − | <center> | + | <div style="font-size: 2em;">Welcome to '''[https://www.pwnwiki.org Pwnwiki]'''</div> |
| + | '''Pwnwiki''' - '''Free, everyone editable vulnerability library'''<br> | ||
| + | <font size="2" color="green"><p>Currently included [[Special:Statistics|{{NUMBEROFPAGES}}]] pages,[[Special:Statistics|{{NUMBEROFUSERS}}]] Active editor.</p> | ||
| + | </div></div> | ||
| + | </div> | ||
| + | </div> | ||
| + | |||
| + | <div class="section group"> | ||
| + | <div class="col span_2_of_2"> | ||
| + | <center> [[Nginx]] | [[Weblogic]] | [[Wordpress]] | [[Fastjson]] | [[Windows]] | [[Linux]] | [[Apache/Httpd]] | [[Discuz]] | [[IOT]] | [[ThinkCMF]]</center> | ||
| + | </div> | ||
| + | </div> | ||
| + | {| style="margin: auto; width: 750px;" | ||
| + | | style="text-align: left; margin: 1em 1em 1em 0; border: 1px solid #20A3C0; padding: .2em;" | | ||
| + | {| cellspacing="2px" | ||
| + | | valign="middle" | [[Image:Trans.jpeg|50px]] | ||
| + | | Other language: | ||
| + | | [https://www.pwnwiki.org/index.php?title=Eshome Español] [https://www.pwnwiki.org/index.php?title=Ruhome русский] [https://www.pwnwiki.org/index.php?title=Enhome English] [https://www.pwnwiki.org/index.php?title=Uahome Український] | ||
| + | |} | ||
| + | |} | ||
| + | {| width=100% | ||
| + | | id="mf-versions" style="width: 34%; background: #FCFCFC; border: 1px solid #ccc; vertical-align: top;" | | ||
| + | <div style="background: #cafcf8; padding: 5px; margin: 3px; font-weight: bold; text-align: center; color: #000000; font-size: 120%; ">Latest Recommended</div> | ||
| + | {{Recommended_English}} | ||
| + | |||
| + | | id="mf-versions" style="width: 34%; border: 1px solid #ccc; vertical-align: top;" | | ||
| + | <div style="background: #d2ffc9; padding: 5px; margin: 3px; font-weight: bold; text-align: center; color: #000000; font-size: 120%;; ">Popular items</div> | ||
| + | <div style="padding-left: 1em;"> | ||
| + | * [https://www.pwnwiki.org/index.php?title=WiFi_Mouse_1.7.8.5%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E WiFi Mouse 1.7.8.5遠程代碼執行漏洞] | ||
| + | * [https://www.pwnwiki.org/index.php?title=CVE-2021-26855_-_Exchange_Server_SSRF%E6%BC%8F%E6%B4%9E CVE-2021-26855 - Exchange Server SSRF漏洞] | ||
| + | * [https://www.pwnwiki.org/index.php?title=Apache_Solr%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AE%80%E5%8F%96%E6%BC%8F%E6%B4%9E Apache Solr任意文件讀取漏洞] | ||
| + | |||
| + | </div> | ||
| + | |} | ||
| + | {| width=100% | ||
| + | | id="mf-guides" style="width: 33%; background: #FCFCFC; border: 1px solid #ccc; vertical-align: top;" | | ||
| + | <div style="background: #ebc9ff; padding: 5px; margin: 3px; font-weight: bold; color: #000000; text-align: center; font-size: 120%;; ">News Broadcast</div> | ||
| + | <div style="padding-left: 1em;"> | ||
| + | {{News_English}} | ||
| + | </div> | ||
| + | |} | ||
| + | {| width=100% | ||
| + | |||
| + | | id="mf-links" style="width: 33%; background: #FCFCFC; border: 1px solid #ccc; vertical-align: top;" | | ||
| + | <div style="background: #fbffc9; padding: 5px; margin: 3px; font-weight: bold; color: #000000; text-align: center; font-size: 120%;; ">Penetration test data</div> | ||
| + | <div style="padding-left: 1em;"> | ||
| + | *[https://www.pwnwiki.org/index.php?title=%E4%BD%BF%E7%94%A8OpenSsl%E5%8A%A0%E5%AF%86%E5%8F%8D%E5%BD%88shell 使用OpenSsl加密反彈shell] | ||
| + | *[https://www.pwnwiki.org/index.php?title=Burpsuite%E9%A9%97%E8%AD%89%E7%A2%BC%E8%AD%98%E5%88%A5%E6%8F%92%E4%BB%B6xp_CAPTCHA Burpsuite驗證碼識別插件xp CAPTCHA] | ||
| + | <br> | ||
| + | </div> | ||
| + | | id="mf-gallery" style="width: 33%; background: #FCFCFC; border: 1px solid #ccc; vertical-align: top;" | | ||
| + | <div style="background: #ffe7c9; padding: 5px; margin: 3px; font-weight: bold; color: #000000; text-align: center; font-size: 120%;; ">Join us</div> | ||
| + | <div style="padding-left: 1em;"> | ||
| + | [[File:Logo_header.jpg|200px|left]] | ||
| + | *See [https://www.mediawiki.org/wiki/Help:Formatting/zh#HTML_%E6%A0%87%E8%AE%B0 manual] To get information on using this wiki! <br> | ||
| + | *You need to [https://www.pwnwiki.org/index.php?title=%E7%89%B9%E6%AE%8A:%E4%BD%BF%E7%94%A8%E8%80%85%E7%99%BB%E5%85%A5 log in]。<br> | ||
| + | *No account? [https://www.pwnwiki.org/index.php?title=%E7%89%B9%E6%AE%8A:%E5%BB%BA%E7%AB%8B%E5%B8%B3%E8%99%9F Click to register] <br> | ||
| + | *Click on<small>[https://www.pwnwiki.org/index.php?title=%E7%B7%A8%E8%BC%AF%E8%AA%AA%E6%98%8E here]</small>View the editing instructions.<br> | ||
| + | *Please click to help translate<small>[https://www.pwnwiki.org/index.php?title=%E7%89%B9%E6%AE%8A:%E5%85%A7%E5%AE%B9%E7%BF%BB%E8%AD%AF here]</small> . | ||
| + | </div> | ||
| + | |- | ||
| + | | | ||
| + | | | ||
| + | |} | ||
Revision as of 14:51, 22 March 2021
|
|
News Broadcast
CVE-2021-3493The OverlayFS vulnerability allows local users under Ubuntu to gain root privileges. An Ubuntu specific issue in the overlayfs file system in the Linux kernel, in which it did not correctly validate the application regarding the file system function of the user namespace. Since Ubuntu comes with a patch that allows unprivileged overlayfs to mount, local attackers can use it to gain higher privileges. Affected versionUbuntu 20.10 Ubuntu 20.04 LTS Ubuntu 18.04 LTS Ubuntu 16.04 LTS Ubuntu 14.04 ESM Repair suggestions
|
|
Penetration test data
|
Join us
|