21%
30.01.2020
an important role, since it ensures that the root filesystem can be accessed after the computer has been restarted, to be able to access all the tools that are necessary for the computer to continue booting
21%
04.10.2018
attributes, such as group memberships (memberOf), have an expiry stamp. In this way, your role-based group construct can be used for permanent memberships of your root administrators and temporary memberships
21%
11.04.2016
environment, the required infrastructure is set up quickly. After installing the Windows Management Framework 4 [1], included in Server 2012 R2 and Windows 8.1, you already have the tools in place. Power
21%
15.12.2011
to be run as root or other users, with command logging and fine-grained access controls.
Sudo 1.8, which was released in March 2011, includes a new pluggable architecture that allows third-party plug
21%
17.08.2016
.
The root cause of this flaw is a serious vulnerability in the TCP specification that “allows a blind off-path attacker to infer if any two arbitrary hosts on the Internet are communicating using a TCP
21%
15.01.2019
-2018-16866) resides in "systemd-journald" service and could allow an attacker to gain root access on the targeted systems.
"We developed an exploit for CVE-2018-16865 and CVE-2018-16866 that obtains
21%
02.11.2021
of Hive, the Linux/FreeBSD iteration only includes one command-line parameter (-no-wipe). When executed without root permission, the Linux variation of Hive fails to trigger the encryption, because it isn
21%
26.01.2022
discovered the pkexec command could be used by local attackers to increase privileges to root in Ubuntu, Debian, Fedora, and CentOS (and warn that it's most likely exploitable in other distributions as well
21%
13.06.2016
and monitoring. You can thus centrally manage your virtual switches. Once the service is installed and set up, you can manage your networks with System Center Virtual Machine Manager 2012 R2 or 2016, as well
21%
09.08.2023
.
The flaw was discovered by SUSE developers, who found that the program contains a “privileged D-Bus service running as root and a Polkit policy.”
They disclosed the issue to Mozilla in May but failed to get