Skip to content

Local Privilege Escalation via snapd (CVE-2019-7304) Remastered PoC exploit

License

Notifications You must be signed in to change notification settings

f4T1H21/dirty_sock

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 

Repository files navigation

dirty_sock

Local Privilege Escalation via snapd (CVE-2019-7304) Remastered PoC exploit
Credit goes to initstring. Original dirty_sock.

Usage

Wait ~40 seconds before executing the script again otherwise it sucks.

chmod u+x lpe.py
./lpe.py

About

Local Privilege Escalation via snapd (CVE-2019-7304) Remastered PoC exploit

Topics

Resources

License

Stars

Watchers

Forks

Languages

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy