update
This commit is contained in:
parent
680b029677
commit
f11f99fdf4
483
linpeas.sh
483
linpeas.sh
File diff suppressed because one or more lines are too long
@ -217,7 +217,7 @@ Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.30
|
||||
Tags: ubuntu=9.04
|
||||
Rank: 1
|
||||
analysis-url: https://xorl.wordpress.com/2009/07/16/cve-2009-1895-linux-kernel-per_clear_on_setid-personality-bypass/
|
||||
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/9435.tgz
|
||||
src-url: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9435.tgz
|
||||
exploit-db: 9435
|
||||
Comments: /proc/sys/vm/mmap_min_addr needs to equal 0 OR pulseaudio needs to be installed
|
||||
EOF
|
||||
@ -228,7 +228,7 @@ Name: ${txtgrn}[CVE-2009-2692,CVE-2009-1895]${txtrst} sock_sendpage2
|
||||
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.30
|
||||
Tags:
|
||||
Rank: 1
|
||||
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/9436.tgz
|
||||
src-url: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9436.tgz
|
||||
exploit-db: 9436
|
||||
Comments: Works for systems with /proc/sys/vm/mmap_min_addr equal to 0
|
||||
EOF
|
||||
@ -239,7 +239,7 @@ Name: ${txtgrn}[CVE-2009-2692,CVE-2009-1895]${txtrst} sock_sendpage3
|
||||
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.30
|
||||
Tags:
|
||||
Rank: 1
|
||||
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/9641.tar.gz
|
||||
src-url: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9641.tar.gz
|
||||
exploit-db: 9641
|
||||
Comments: /proc/sys/vm/mmap_min_addr needs to equal 0 OR pulseaudio needs to be installed
|
||||
EOF
|
||||
@ -260,7 +260,7 @@ Name: ${txtgrn}[CVE-2009-2698]${txtrst} the rebel (udp_sendmsg)
|
||||
Reqs: pkg=linux-kernel,ver>=2.6.1,ver<=2.6.19
|
||||
Tags: debian=4
|
||||
Rank: 1
|
||||
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/9574.tgz
|
||||
src-url: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9574.tgz
|
||||
exploit-db: 9574
|
||||
analysis-url: https://blog.cr0.org/2009/08/cve-2009-2698-udpsendmsg-vulnerability.html
|
||||
author: spender
|
||||
@ -701,7 +701,7 @@ Name: ${txtgrn}[CVE-2016-4997]${txtrst} target_offset
|
||||
Reqs: pkg=linux-kernel,ver>=4.4.0,ver<=4.4.0,cmd:grep -qi ip_tables /proc/modules
|
||||
Tags: ubuntu=16.04{kernel:4.4.0-21-generic}
|
||||
Rank: 1
|
||||
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40053.zip
|
||||
src-url: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40053.zip
|
||||
Comments: ip_tables.ko needs to be loaded
|
||||
exploit-db: 40049
|
||||
author: Vitaly 'vnik' Nikolenko
|
||||
@ -714,7 +714,7 @@ Reqs: pkg=linux-kernel,ver>=4.4,ver<4.5.5,CONFIG_BPF_SYSCALL=y,sysctl:kernel.unp
|
||||
Tags: ubuntu=16.04{kernel:4.4.0-21-generic}
|
||||
Rank: 1
|
||||
analysis-url: https://bugs.chromium.org/p/project-zero/issues/detail?id=808
|
||||
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39772.zip
|
||||
src-url: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39772.zip
|
||||
Comments: CONFIG_BPF_SYSCALL needs to be set && kernel.unprivileged_bpf_disabled != 1
|
||||
exploit-db: 40759
|
||||
author: Jann Horn
|
||||
@ -858,7 +858,7 @@ Reqs: pkg=linux-kernel,ver>=4.15,ver<=4.19.2,CONFIG_USER_NS=y,sysctl:kernel.unpr
|
||||
Tags: ubuntu=18.04{kernel:4.15.0-20-generic},fedora=28{kernel:4.16.3-301.fc28}
|
||||
Rank: 1
|
||||
analysis-url: https://bugs.chromium.org/p/project-zero/issues/detail?id=1712
|
||||
src-url: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45886.zip
|
||||
src-url: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45886.zip
|
||||
exploit-db: 45886
|
||||
author: Jann Horn
|
||||
Comments: CONFIG_USER_NS needs to be enabled
|
||||
@ -871,7 +871,7 @@ Reqs: pkg=linux-kernel,ver>=4,ver<5.1.17,sysctl:kernel.yama.ptrace_scope==0,x86_
|
||||
Tags: ubuntu=16.04{kernel:4.15.0-*},ubuntu=18.04{kernel:4.15.0-*},debian=9{kernel:4.9.0-*},debian=10{kernel:4.19.0-*},fedora=30{kernel:5.0.9-*}
|
||||
Rank: 1
|
||||
analysis-url: https://bugs.chromium.org/p/project-zero/issues/detail?id=1903
|
||||
src-url: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47133.zip
|
||||
src-url: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47133.zip
|
||||
ext-url: https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2019-13272/poc.c
|
||||
Comments: Requires an active PolKit agent.
|
||||
exploit-db: 47133
|
||||
@ -1066,7 +1066,7 @@ Reqs: pkg=glibc|libc6,x86
|
||||
Tags: debian=6
|
||||
Rank: 1
|
||||
analysis-url: http://googleprojectzero.blogspot.com/2014/08/the-poisoned-nul-byte-2014-edition.html
|
||||
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/34421.tar.gz
|
||||
src-url: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34421.tar.gz
|
||||
exploit-db: 34421
|
||||
EOF
|
||||
)
|
||||
@ -1284,7 +1284,7 @@ Reqs: pkg=ntfs-3g,ver<2017.4
|
||||
Tags: ubuntu=16.04{ntfs-3g:2015.3.14AR.1-1build1},debian=7.0{ntfs-3g:2012.1.15AR.5-2.1+deb7u2},debian=8.0{ntfs-3g:2014.2.15AR.2-1+deb8u2}
|
||||
Rank: 1
|
||||
analysis-url: https://bugs.chromium.org/p/project-zero/issues/detail?id=1072
|
||||
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41356.zip
|
||||
src-url: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41356.zip
|
||||
exploit-db: 41356
|
||||
author: Jann Horn
|
||||
Comments: Distros use own versioning scheme. Manual verification needed. Linux headers must be installed. System must have at least two CPU cores.
|
||||
|
BIN
win/winPEAS.exe
BIN
win/winPEAS.exe
Binary file not shown.
Binary file not shown.
Loading…
Reference in New Issue
Block a user