Загрузка данных
[1;34mâââââââââââ⣠[1;32mChecking for Copy Fail (CVE-2026-31431) [1;90m(T1068)
[0m[1;34mâ [1;34m[3mhttps://copy.fail/
[0m[1;34mâ [1;34m[3mhttps://www.cve.org/CVERecord?id=CVE-2026-31431
[0m[1;31;103mVULNERABLE: non-destructive AF_ALG/splice page-cache write triggered[0m
[1;34mâââââââââââ⣠[1;32mKernel Exploit Registry [1;90m(T1068)
[0m[1;34mâ⣠[1;32mOperating system ............. Linux
[0m[1;34mâ⣠[1;32mKernel release ............... 5.15.0-111-generic
[0m[1;34mâ⣠[1;32mComparable version ........... 5.15.0.111
[0m[1;34mâ⣠[1;32mData chunk limit ............. max 25 rows per KERNEL_CVE_DATA_* variable (1..21)
[0m[1;34mâ⣠[1;32mKernel config source ......... /boot/config-5.15.0-111-generic
[0m[1;31;103mCVE: CVE-2022-0847 | Name: DirtyPipe | Match data: pkg=linux-kernel,ver>=5.8,ver<=5.16.11 | Tags: ubuntu=(20.04|21.04),debian=11 | Rank: 1[0m
[1;31;103mCVE: CVE-2022-0995 | Name: watch_queue | Match data: pkg=linux-kernel,ver>=5.8,ver<5.16.5,x86_64 | Tags: ubuntu=21.10{kernel:5.13.0.37-generic} | Rank: 1 | Details: Not 100% reliable, may need to be run a couple of times. It rare cases it may panic the kernel.[0m
[1;31;103mCVE: CVE-2022-2586 | Name: nft_object UAF | Match data: pkg=linux-kernel,ver>=5.12,ver<5.19,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1 | Tags: ubuntu=(20.04){kernel:5.12.13} | Rank: 1 | Details: kernel.unprivileged_userns_clone=1 required (to obtain CAP_NET_ADMIN)[0m
[1;31;103mCVE: CVE-2022-32250 | Name: nft_object UAF (NFT_MSG_NEWSET) | Match data: pkg=linux-kernel,ver<5.18.1,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1 | Tags: ubuntu=(22.04){kernel:5.15.0-27-generic} | Rank: 1 | Details: kernel.unprivileged_userns_clone=1 required (to obtain CAP_NET_ADMIN)[0m
[1;31;103mCVE: CVE-2023-0386 | Name: OverlayFS suid smuggle | Match data: pkg=linux-kernel,ver>=5.11,ver<=6.2,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1 | Tags: ubuntu=22.04.1{kernel:5.15.0-57-generic} | Rank: 1 | Details: CONFIG_USER_NS needs to be enabled && kernel.unprivileged_userns_clone=1 required[0m
[1;31;103m[1;34mâ⣠[1;32mKernel vulns found: 5[0m
[1;31;103m[0m[0m
[1;34mâââââââââââ⣠[1;32mChecking for Dirty Frag (CVE-2026-43284 / CVE-2026-43500) [1;90m(T1068)
[0m[1;34mâ [1;34m[3mhttps://ubuntu.com/blog/dirty-frag-linux-vulnerability-fixes-available
[0m[1;34mâ [1;34m[3mhttps://www.cve.org/CVERecord?id=CVE-2026-43284
[0m[1;34mâ [1;34m[3mhttps://www.cve.org/CVERecord?id=CVE-2026-43500
[0m[1;31;103mCVE-2026-43284 (xfrm-ESP): autoloadable: esp4 esp6 xfrm_user ipcomp6[0m
[1;31;103mCVE-2026-43500 (rxrpc): autoloadable: rxrpc[0m
[1;33mmodprobe mitigation (xfrm-ESP): not found[0m
[1;33mmodprobe mitigation (rxrpc): not found[0m
[1;33mUnprivileged user namespaces: enabled[0m
[1;31;103mCurrent process: CAP_NET_ADMIN present (matches public PoC requirement)[0m
[1;33mKernel build predates upstream fix (2026-05-08): likely unpatched unless distro backport.[0m
[1;31;103mLIKELY VULNERABLE to CVE-2026-43284 (xfrm-ESP).[0m
[1;31;103mLIKELY VULNERABLE to CVE-2026-43500 (rxrpc).[0m
Mitigation: 'install esp4/esp6/rxrpc /bin/false' in /etc/modprobe.d/, then rmmod;
or sysctl kernel.unprivileged_userns_clone=0; or apply distro patches.
[1;31;103mPotentially vulnerable to CVE-2021-4034 (PwnKit) - check distro patches[0m
[1;34mââ⣠[1;32mPolkit Policies [1;90m(T1548.003)
[0m[1;96mChecking /etc/polkit-1/localauthority.conf.d/:[0m
[1;31mWARNING: /etc/polkit-1/localauthority.conf.d/ is writable![0m
[1;31mWARNING: /etc/polkit-1/localauthority.conf.d//50-localauthority.conf is writable![0m
[1;34mâââââââââââ⣠[1;32mChecking for PackageKit Pack2TheRoot (CVE-2026-41651) [1;90m(T1068)
[0m[1;34mâ [1;34m[3mhttps://github.security.telekom.com/2026/04/pack2theroot-linux-local-privilege-escalation.html
[0m[1;90mPackageKit Not Found
[0m
Linux4.10_to_5.1.17(CVE-2019-13272)/rhel_6(CVE-2011-1485)/Generic_CVE-2021-4034[0m
-rwsr-xr-x 1 root root 35K Ð°Ð¿Ñ 1 2024 /usr/bin[1;31m/umount ---> BSD/Linux(08-1996)[0m
-rwsr-xr-x 1 root root 155K Ð°Ð¿Ñ 10 2024 /usr/bin[1;31m/sudo ---> check_if_the_sudo_version_is_vulnerable[0m
-rwsr-xr-x 1 root root 45K ОÑМ 25 2024 /usr/bin[1;31m/newgrp ---> HP-UX_10.20[0m