Explore >> Select a destination


You are here

reverse.put.as
| | beny23.github.io
5.0 parsecs away

Travel
| | Pwnkit is a vulnerability that uses a bug in polkit to elevate permissions to root. This write-up shows how to reproduce it using Ubuntu and what to do to check whether a system is vulnerable. What went wrong? Quoting from the original researchers: This vulnerability is an attacker's dream come true: pkexec is installed by default on all major Linux distributions; pkexec is vulnerable since its creation, in May 2009; any unprivileged local user can exploit this vulnerability to obtain full root privileges; although this vulnerability is technically a memory corruption, it is exploitable instantly, reliably, in an architecture-independent way; and it is exploitable even if the polkit daemon itself is not running.
| | malgregator.com
4.5 parsecs away

Travel
| | Ubiquiti network devices are being remotely exploited, via port 10001 discovery service. Results in loss of device management, also being used as a weak UDP DDoS amplification attack: 56 bytes in, 206 bytes out.
| | allelesecurity.com
3.8 parsecs away

Travel
| | Want to keep your systems secure against advanced threat actors? Linux Livepatch is the solution.
| | shyamjos.com
34.8 parsecs away

Travel
| Kubernetes provides container lifecycle hook framework to run code triggered by events during their management lifecycle called PostStart and PreStop hooks