### [CVE-2016-1531](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1531) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Exim before 4.86.2, when installed setuid root, allows local users to gain privileges via the perl_startup argument. ### POC #### Reference - http://packetstormsecurity.com/files/136124/Exim-4.84-3-Local-Root-Privilege-Escalation.html - https://www.exploit-db.com/exploits/39535/ - https://www.exploit-db.com/exploits/39549/ - https://www.exploit-db.com/exploits/39702/ #### Github - https://github.com/0xsyr0/OSCP - https://github.com/ARPSyndicate/cvemon - https://github.com/HadessCS/Awesome-Privilege-Escalation - https://github.com/Jekyll-Hyde2022/PrivEsc-Linux - https://github.com/Pr1vEsc/Hacking-linux - https://github.com/SenukDias/OSCP_cheat - https://github.com/SirElmard/ethical_hacking - https://github.com/Totes5706/Offensive-Security-Cheat-Sheet - https://github.com/c0d3cr4f73r/CVE-2016-1531 - https://github.com/chorankates/Irked - https://github.com/crypticdante/CVE-2016-1531 - https://github.com/ghostking2802/Linux-privilege-escalation-cheatsheet - https://github.com/hackerhouse-opensource/exploits - https://github.com/kam1n0/sudo-exim4-privesc - https://github.com/kgwanjala/oscp-cheatsheet - https://github.com/mhamzakhattak/offsec-pentest-commands - https://github.com/oscpname/OSCP_cheat - https://github.com/revanmalang/OSCP - https://github.com/sujayadkesar/Linux-Privilege-Escalation - https://github.com/suljov/Hacking-linux - https://github.com/txuswashere/OSCP - https://github.com/xhref/OSCP - https://github.com/yukitsukai47/PenetrationTesting_cheatsheet