<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://wiki.cayu.ar/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://wiki.cayu.ar/feed.php">
        <title>Cayu - Wiki de Sergio Cayuqueo - seguridad:enlaces:exploits</title>
        <description></description>
        <link>https://wiki.cayu.ar/</link>
        <image rdf:resource="https://wiki.cayu.ar/lib/exe/fetch.php?media=wiki:dokuwiki.svg" />
       <dc:date>2026-04-19T12:54:08+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://wiki.cayu.ar/doku.php?id=seguridad:enlaces:exploits:dirty_cow&amp;rev=1478203976&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cayu.ar/doku.php?id=seguridad:enlaces:exploits:mempodipper&amp;rev=1545944609&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://wiki.cayu.ar/lib/exe/fetch.php?media=wiki:dokuwiki.svg">
        <title>Cayu - Wiki de Sergio Cayuqueo</title>
        <link>https://wiki.cayu.ar/</link>
        <url>https://wiki.cayu.ar/lib/exe/fetch.php?media=wiki:dokuwiki.svg</url>
    </image>
    <item rdf:about="https://wiki.cayu.ar/doku.php?id=seguridad:enlaces:exploits:dirty_cow&amp;rev=1478203976&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2016-11-03T20:12:56+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>dirty_cow</title>
        <link>https://wiki.cayu.ar/doku.php?id=seguridad:enlaces:exploits:dirty_cow&amp;rev=1478203976&amp;do=diff</link>
        <description>Dirty COW

CVE-2016-5195 &lt;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5195&gt;


/*
* (un)comment correct payload first (x86 or x64)!
* 
* $ gcc cowroot.c -o cowroot -pthread
* $ ./cowroot
* DirtyCow root privilege escalation
* Backing up /usr/bin/passwd.. to /tmp/bak
* Size of binary: 57048
* Racing, this may take a while..
* /usr/bin/passwd is overwritten
* Popping root shell.
* Don&#039;t forget to restore /tmp/bak
* thread stopped
* thread stopped
* root@box:/root/cow# id
* uid=0(root) g…</description>
    </item>
    <item rdf:about="https://wiki.cayu.ar/doku.php?id=seguridad:enlaces:exploits:mempodipper&amp;rev=1545944609&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-12-27T21:03:29+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>mempodipper</title>
        <link>https://wiki.cayu.ar/doku.php?id=seguridad:enlaces:exploits:mempodipper&amp;rev=1545944609&amp;do=diff</link>
        <description>mempodipper

CVE-2012-0056
Linux Kernel 2.6.39 &lt; 3.2.2 (Gentoo / Ubuntu x86/x64) - &#039;Mempodipper&#039; Local Privilege Escalation (1)


/*
Exploit code is here: http://git.zx2c4.com/CVE-2012-0056/plain/mempodipper.c
Blog post about it is here: http://blog.zx2c4.com/749
EDB-Note: Updated version can be found here: https://www.exploit-db.com/exploits/35161/

# Exploit Title: Mempodipper - Linux Local Root for &gt;=2.6.39, 32-bit and 64-bit
# Date: Jan 21, 2012
# Author: zx2c4
# Tested on: Gentoo, Ubuntu
# …</description>
    </item>
</rdf:RDF>
