mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 02:31:38 +00:00
1.9 KiB
1.9 KiB
CVE-2016-1531
Description
Exim before 4.86.2, when installed setuid root, allows local users to gain privileges via the perl_startup argument.
POC
Reference
- http://packetstormsecurity.com/files/136124/Exim-4.84-3-Local-Root-Privilege-Escalation.html
- https://www.exploit-db.com/exploits/39535/
- https://www.exploit-db.com/exploits/39549/
- https://www.exploit-db.com/exploits/39702/
Github
- https://github.com/0xsyr0/OSCP
- https://github.com/ARPSyndicate/cvemon
- https://github.com/HadessCS/Awesome-Privilege-Escalation
- https://github.com/Jekyll-Hyde2022/PrivEsc-Linux
- https://github.com/Pr1vEsc/Hacking-linux
- https://github.com/SenukDias/OSCP_cheat
- https://github.com/SirElmard/ethical_hacking
- https://github.com/Totes5706/Offensive-Security-Cheat-Sheet
- https://github.com/c0d3cr4f73r/CVE-2016-1531
- https://github.com/chorankates/Irked
- https://github.com/crypticdante/CVE-2016-1531
- https://github.com/exfilt/CheatSheet
- https://github.com/ghostking2802/Linux-privilege-escalation-cheatsheet
- https://github.com/hackerhouse-opensource/exploits
- https://github.com/kam1n0/sudo-exim4-privesc
- https://github.com/kgwanjala/oscp-cheatsheet
- https://github.com/mhamzakhattak/offsec-pentest-commands
- https://github.com/oscpname/OSCP_cheat
- https://github.com/parth45/cheatsheet
- https://github.com/revanmalang/OSCP
- https://github.com/sujayadkesar/Linux-Privilege-Escalation
- https://github.com/suljov/Hacking-linux
- https://github.com/txuswashere/OSCP
- https://github.com/xhref/OSCP
- https://github.com/yukitsukai47/PenetrationTesting_cheatsheet