diff --git a/_posts/2023-10-12-Looney-Tunables-Exploit.md b/_posts/2023-10-12-Looney-Tunables-Exploit.md index a08d38e..64c7398 100644 --- a/_posts/2023-10-12-Looney-Tunables-Exploit.md +++ b/_posts/2023-10-12-Looney-Tunables-Exploit.md @@ -1,7 +1,7 @@ --- layout: post title: Looney Tunables Exploit -image: https://ik.imagekit.io/qualys/wp-content/uploads/2023/09/230918_Blog-Looney-Tunables-Vulnerability-Graphic_v1rev2_Page_3-1070x390.jpg +image: https://live.staticflickr.com/65535/53253222754_8b2e4e1f0a_o.png categories: [Exploits, Privilege Escalation] tags: [cybersecurity, Linux, glibc, buffer overflow, privilege escalation, Looney Tunables, CVE-2023-4911]