linux-exploit-suggester icon indicating copy to clipboard operation
linux-exploit-suggester copied to clipboard

Linux privilege escalation auditing tool

Results 23 linux-exploit-suggester issues
Sort by recently updated
recently updated
newest added

Unfortunately the [src-url](https://raw.githubusercontent.com/briskets/CVE-2021-3493/main/exploit.c) is a reupload. The original exploit is embedded in the advisory page. There's no direct link. ``` user@ubuntu:~/Desktop$ gcc overlayfs.c user@ubuntu:~/Desktop$ ./a.out bash-5.0# id uid=0(root) gid=0(root) groups=0(root),4(adm),24(cdrom),27(sudo),30(dip),46(plugdev),120(lpadmin),131(lxd),132(sambashare),1000(user),1002(wireshark)...

* Moved to be with the other 2017 era exploits. * Fix exploit-db URL to use the correct format. * Add author

The Exploit has a typo in its name. It should be mempodipper instead of memodipper ``` EXPLOITS[((n++))]=$(cat

First of all thank you for this amazing tool, I want a small correction in an exploit download page suggested by linux-exploit-suggester for Dirty Cow 2 https://www.exploit-db.com/exploits/40847.cpp, but the page...

system info: ``` www-data@openadmin:/tmp$ uname -a Linux openadmin 4.15.0-70-generic #79-Ubuntu SMP Tue Nov 12 10:36:11 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux www-data@openadmin:/tmp$ lsb_release -a No LSB modules are available. Distributor...

I suppose that the line 1790 should look like this: `pkgVersion=$(echo "$pkg" | grep -E -i -o -e '-[\.0-9\+:p]+[-\+]*' | cut -d':' -f2 | sed 's/[\+-]//g' | sed 's/p[0-9]//g')` or...