diego-treitos / linux-smart-enumeration

Linux enumeration tool for pentesting and CTFs with verbosity levels
GNU General Public License v3.0
3.45k stars 574 forks source link

CVE false positives #65

Closed exploide closed 2 years ago

exploide commented 2 years ago

Fixed false positives for some CVEs:

garatc commented 2 years ago

Thanks for this. Especially for cve-2022-0847, which showed a false positive each time it was run against a RedHat 8-

diego-treitos commented 2 years ago

Thanks for the changes @exploide . I have one question about this PR. You have addes an empty file called cve-2021-3156.sh. Why is that?

exploide commented 2 years ago

It's not an empty file, it already exists. I just changed the mode to add the executable flag. The diff on the changes plane shows

cve/cve-2021-3156.sh     100644 → 100755

and the only change is the +x in the mode.

This is not important at all, but is consistent to all the other files within the cve/ folder. If you do an ls -l you see that at the moment, only this script is marked as non-executable.

diego-treitos commented 2 years ago

It's not an empty file, it already exists. I just changed the mode to add the executable flag. The diff on the changes plane shows

It's not an empty file, it already exists. I just changed the mode to add the executable flag. The diff on the changes plane shows

cve/cve-2021-3156.sh     100644 → 100755

and the only change is the +x in the mode.

This is not important at all, but is consistent to all the other files within the cve/ folder. If you do an ls -l you see that at the moment, only this script is marked as non-executable.

cve/cve-2021-3156.sh     100644 → 100755

and the only change is the +x in the mode.

This is not important at all, but is consistent to all the other files within the cve/ folder. If you do an ls -l you see that at the moment, only this script is marked as non-executable.

My apologies, you even stated that in your first comment. These days I am quite busy so I didn't pay much attention.

Alright. I am mergin this. Thanks a lot again @exploide !