diff --git a/data/KernelPocs/CVE-2023-0179/README.md b/data/KernelPocs/CVE-2023-0179/README.md index a77756a..6e161c2 100644 --- a/data/KernelPocs/CVE-2023-0179/README.md +++ b/data/KernelPocs/CVE-2023-0179/README.md @@ -28,9 +28,3 @@ The exploit creates a new user account `needle:needle` with UID 0 by abusing the Enjoy root privileges. -## Demo - -[![asciicast](https://asciinema.org/a/mVTu420tWy8ocdFY70sWD9VLO.svg)](https://asciinema.org/a/mVTu420tWy8ocdFY70sWD9VLO) - -## Credits -- David Bouman's `libnftnl` [implementation](https://github.com/pqlx/CVE-2022-1015) and detailed [blog post](https://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/)