PWNWIK.COM
,
Other languages: | |
---|---|
中文Español русский English Український Français Lietuvis norsk Tiếng Việt عربى Gaeilge 한국어 Nederlands bahasa Indonesia 粤语 简体中文 |
Excellent Article
CVE-2021-3493The OverlayFS vulnerability allows local users under Ubuntu to gain root privileges. An Ubuntu specific issue in the overlayfs file system in the Linux kernel, in which it did not correctly validate the application regarding the file system function of the user namespace. Since Ubuntu comes with a patch that allows unprivileged overlayfs to mount, local attackers can use it to gain higher privileges. Affected versionUbuntu 20.10 Ubuntu 20.04 LTS Ubuntu 18.04 LTS Ubuntu 16.04 LTS Ubuntu 14.04 ESM Repair suggestions
|
Featured Articles
There is a denial of service vulnerability in the Windows IPv6 protocol stack. An unauthorized remote attacker can exploit this vulnerability by sending specially crafted data packets to the target system. Successful exploitation of this vulnerability can lead to a denial of service of the target system. Affected versionWindows All IntroductionThere is a denial of service vulnerability in the Windows IPv6 protocol stack. When IPv6 fragmentation is reorganized, because the parameter types used by the NetioRetreatNetBuffer function and the NdisGetDataBuffer function do not match, the latter can cause the latter to return a null pointer, which will cause a null pointer problem during subsequent copy operations. The attacker can insert the Fragment header for IPv6 option with another identifier at the end of the last fragment of a very large data packet, and continue to send the remaining fragments of the data packet with this identifier, thereby reorganizing the second group of data packets. The vulnerability is triggered at the time, causing the target system to deny service. see details |
Other Wiki(s)
|
Join Us
PwnWiki is a multilingual, free content, and a collaborative project that anyone can participate in. Its goal is to establish a complete, accurate and neutral vulnerability database. The growth of PwnWiki depends on your participation. Whether it is creating new entries, editing existing entries, or adding illustrations to entries, you can contribute to PwnWiki.
|
Saying |
---|
|
Disclaimer
NOTE: Please read the following: |
免费、自由、人人可编辑的漏洞库--PwnWiki.com