There was an error while loading. Please reload this page.
1 parent 358b0d5 commit 5b6aaa6Copy full SHA for 5b6aaa6
README.md
@@ -56,7 +56,7 @@ Currently we support some single-step (i.e., simple to exploit, do not need to b
56
| `root_allows_lowpriv_to_ssh` | user `lowpriv` can overwrite cron-executed script |
57
| `cron_calling_user_wildcard` | backup script running as roots can be exploited using wildcards |
58
| `cron_calling_user_file` | the cron job calls a user-writable script as root |
59
-| `file_with_root_password | there is a file in the user's directory with the root password |
+| `file_with_root_password` | there is a file in the user's directory with the root password |
60
61
## howto apply the vulnerable VM configuration?
62
0 commit comments