Subscribe via feed.

Solarwinds LEM 6.3.1 Sudo Privilege Escalation

Posted by deepcore on April 25, 2017 – 7:29 am

Due to lax filesystem permissions, an attacker can take control of a hardcoded sudo path in order to execute commands as a privileged user on Solarwinds Log and Event Manager Virtual Appliance version 6.3.1.


This post is under “exploit” and has no respond so far.
If you enjoy this article, make sure you subscribe to my RSS Feed.

Post a reply

You must be logged in to post a comment.