4837 Total CVEs
26 Years
GitHub
README.md
Rendering markdown...
POC / exploit
ELF>`@@8@8
@@@@��((   ���-�=�=���-�=�=��88800hhhDDS�td88800P�td   44Q�tdR�td�-�=�=HH/lib64/ld-linux-x86-64.so.2 GNU���GNU^}�κW��k�D����GNU��e�mH "d s "__cxa_finalize__libc_start_mainmmaplibc.so.6GLIBC_2.2.5GLIBC_2.34_ITM_deregisterTMCloneTable__gmon_start___ITM_registerTMCloneTable'ui	1���=�=@�=@@�?�?�?�?�?�?��H��H��/H��t��H����5�/�%�/��h��������%�/D���%u/D��1�I��^H��H���PTE1�1�H�=��S/�f.�H�=1H��0H9�tH�6/H��t	�����H�=�0H�5�0H)�H��H��?H��H�H�tH�/H��t��fD�����=�0u+UH�=�.H��tH�=�.�����d����`0]������w�����UH��H��A�A������"��s�����H�E�H�}��u��fH�E�H��H��.�sH�0H�2��H�H�~��H�H��H�v�H�w�H�zH��H)�H)�у���ʉ�H��H���H�H�U���Ҹ����H��H���;0�d<�L�\�LE�zRx��&D$4�� FJw�?:*3$"\��t�����E�C
�@'
��=�=���o���
��?P�	���o���o ���o�o���o�=0@��H�5��-��H�5��C�iH1��jH1���H�5��,�;H�=�H1�H1���H�5��<�<H1�🔥 INITIATING PRIVILEGE ESCALATION... 🔥
[+] Found SUID binary: /usr/bin/passwd (root privileges detected!)
[+] Exploit successful! Root shell spawned!
/bin/sh😂 APRIL FOOLS! You got pranked — no root for you! 😂
GCC: (Ubuntu 11.4.0-1ubuntu1~22.04) 11.4.0�	� �� �3I�AU�=|@��=����� ���=� ��?� J @*�A1�7H@U d@q ��AN`&� @s��A�I���A� �"�Scrt1.o__abi_tagcrtstuff.cderegister_tm_clones__do_global_dtors_auxcompleted.0__do_global_dtors_aux_fini_array_entryframe_dummy__frame_dummy_init_array_entryexploit.c__FRAME_END___DYNAMIC__GNU_EH_FRAME_HDR_GLOBAL_OFFSET_TABLE___libc_start_main@GLIBC_2.34_ITM_deregisterTMCloneTable_edata_finimmap@GLIBC_2.2.5__data_start__gmon_start____dso_handle_IO_stdin_used_endshellcode__bss_startmain__TMC_END___ITM_registerTMCloneTable__cxa_finalize@GLIBC_2.2.5_init.symtab.strtab.shstrtab.interp.note.gnu.property.note.gnu.build-id.note.ABI-tag.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rela.dyn.rela.plt.init.plt.got.plt.sec.text.fini.rodata.eh_frame_hdr.eh_frame.init_array.fini_array.dynamic.data.bss.comment#8806hh$I�� W���o��$a���i���q���o~���o  0�PP��B��   �@@�PP�``����
�  �  4�8 8 ���=�-��=�-��=�-���?�/H@0� �A�10�1+�1x	85�7