Difference between revisions of "Enhome"

From PwnWiki
Line 33: Line 33:
 
<div style="background: #d2ffc9;  padding: 5px; margin: 3px; font-weight: bold; text-align: center; color: #000000; font-size: 120%;; ">Popular items</div>
 
<div style="background: #d2ffc9;  padding: 5px; margin: 3px; font-weight: bold; text-align: center; color: #000000; font-size: 120%;; ">Popular items</div>
 
<div style="padding-left: 1em;">
 
<div style="padding-left: 1em;">
* [https://www.pwnwiki.org/index.php?title=WiFi_Mouse_1.7.8.5%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E WiFi Mouse 1.7.8.5遠程代碼執行漏洞]
+
{{Popular_English}}
* [https://www.pwnwiki.org/index.php?title=CVE-2021-26855_-_Exchange_Server_SSRF%E6%BC%8F%E6%B4%9E CVE-2021-26855 - Exchange Server SSRF漏洞]
 
* [https://www.pwnwiki.org/index.php?title=Apache_Solr%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AE%80%E5%8F%96%E6%BC%8F%E6%B4%9E Apache Solr任意文件讀取漏洞]
 
  
 
</div>
 
</div>
Line 51: Line 49:
 
<div style="background: #fbffc9;  padding: 5px; margin: 3px; font-weight: bold; color: #000000; text-align: center; font-size: 120%;; ">Penetration test data</div>
 
<div style="background: #fbffc9;  padding: 5px; margin: 3px; font-weight: bold; color: #000000; text-align: center; font-size: 120%;; ">Penetration test data</div>
 
<div style="padding-left: 1em;">
 
<div style="padding-left: 1em;">
*[https://www.pwnwiki.org/index.php?title=%E4%BD%BF%E7%94%A8OpenSsl%E5%8A%A0%E5%AF%86%E5%8F%8D%E5%BD%88shell 使用OpenSsl加密反彈shell]
+
{{Documents_English}}
*[https://www.pwnwiki.org/index.php?title=Burpsuite%E9%A9%97%E8%AD%89%E7%A2%BC%E8%AD%98%E5%88%A5%E6%8F%92%E4%BB%B6xp_CAPTCHA Burpsuite驗證碼識別插件xp CAPTCHA]
 
 
<br>
 
<br>
 
</div>
 
</div>

Revision as of 14:54, 22 March 2021


Welcome to Pwnwiki

Pwnwiki - Free, everyone editable vulnerability library

Currently included 6,176 pages,521 Active editor.

Trans.jpeg Other language: Español русский English Український
Latest Recommended
Popular items
News Broadcast

CVE-2021-3493

The OverlayFS vulnerability allows local users under Ubuntu to gain root privileges. An Ubuntu specific issue in the overlayfs file system in the Linux kernel, in which it did not correctly validate the application regarding the file system function of the user namespace. Since Ubuntu comes with a patch that allows unprivileged overlayfs to mount, local attackers can use it to gain higher privileges.

Ubuntu-logo32.png

Affected version

Ubuntu 20.10
Ubuntu 20.04 LTS
Ubuntu 18.04 LTS
Ubuntu 16.04 LTS
Ubuntu 14.04 ESM

Repair suggestions

  • Update system package version
  • Update the Linux kernel to 5.11