mirror of
https://github.com/0xMarcio/cve.git
synced 2026-05-09 19:17:37 +02:00
39 lines
1.5 KiB
Markdown
39 lines
1.5 KiB
Markdown
### [CVE-2016-2779](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2779)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
runuser in util-linux allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
No PoCs from references.
|
|
|
|
#### Github
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/KorayAgaya/TrivyWeb
|
|
- https://github.com/Mohzeela/external-secret
|
|
- https://github.com/aquasecurity/starboard-aqua-csp-webhook
|
|
- https://github.com/broadinstitute/dsp-appsec-trivy-cicd
|
|
- https://github.com/crazy-max/yasu
|
|
- https://github.com/flyrev/security-scan-ci-presentation
|
|
- https://github.com/garethr/findcve
|
|
- https://github.com/gp47/xef-scan-ex02
|
|
- https://github.com/hartwork/antijack
|
|
- https://github.com/hilbix/suid
|
|
- https://github.com/lucky-sideburn/secpod_wrap
|
|
- https://github.com/sergeichev-vitaly/gosu
|
|
- https://github.com/siddharthraopotukuchi/trivy
|
|
- https://github.com/simiyo/trivy
|
|
- https://github.com/t31m0/Vulnerability-Scanner-for-Containers
|
|
- https://github.com/tednespippi/gosu
|
|
- https://github.com/tianon/gosu
|
|
- https://github.com/umahari/security
|
|
- https://github.com/vivek-kyndryl/gosu
|
|
- https://github.com/wojiushixiaobai/gosu-loongarch64
|
|
- https://github.com/yfoelling/yair
|
|
|