From b94b787e2d369574a975a265bbc1935fbbaad749 Mon Sep 17 00:00:00 2001 From: g0tmi1k Date: Thu, 8 Dec 2016 20:35:27 +0000 Subject: [PATCH] Fix for #64 Dirty, but it works --- README.md | 6 ++++-- searchsploit | 9 ++++----- 2 files changed, 8 insertions(+), 7 deletions(-) diff --git a/README.md b/README.md index 4b73754fa..f811c09c5 100755 --- a/README.md +++ b/README.md @@ -56,12 +56,13 @@ root@kali:~# searchsploit afd windows local Exploit Title | Path | (/usr/share/exploitdb/platforms) --------------------------------------------------------------------------------- ---------------------------------- -Microsoft Windows 2003/XP - 'afd.sys' Privilege Escalation (K-plugin) | ./windows/local/6757.txt Microsoft Windows XP - 'afd.sys' Local Kernel Denial of Service | ./windows/dos/17133.c +Microsoft Windows 2003/XP - 'afd.sys' Privilege Escalation (K-plugin) (MS08-066) | ./windows/local/6757.txt Microsoft Windows XP/2003 - 'afd.sys' Privilege Escalation (MS11-080) | ./windows/local/18176.py -Microsoft Windows - 'AfdJoinLeaf' Privilege Escalation (MS11-080) | ./windows/local/21844.rb +Microsoft Windows - 'AfdJoinLeaf' Privilege Escalation (MS11-080) (Metasploit) | ./windows/local/21844.rb Microsoft Windows - 'afd.sys' Dangling Pointer Privilege Escalation (MS14-040) | ./win_x86/local/39446.py Microsoft Windows 7 (x64) - 'afd.sys' Privilege Escalation (MS14-040) | ./win_x86-64/local/39525.py +Microsoft Windows (x86) - 'afd.sys' Privilege Escalation (MS11-046) | ./windows/local/40564.c --------------------------------------------------------------------------------- ---------------------------------- root@kali:~# root@kali:~# searchsploit -p 39446 @@ -70,6 +71,7 @@ Exploit: Microsoft Windows - 'afd.sys' Dangling Pointer Privilege Escalation (MS Path: /usr/share/exploitdb/platforms/win_x86/local/39446.py Copied EDB-ID 39446's path to the clipboard. + root@kali:~# ``` diff --git a/searchsploit b/searchsploit index 1993feb29..83e977370 100755 --- a/searchsploit +++ b/searchsploit @@ -1,7 +1,7 @@ #!/bin/bash # Name: SearchSploit - Exploit-DB's CLI search tool -# Version: 3.7.1 (Release date: 2016-11-07) -# Written by: Offensive Security, Unix-Ninja & g0tmi1k +# Version: 3.7.2 (Release date: 2016-12-08) +# Written by: Offensive Security, Unix-Ninja, and g0tmi1k # Homepage: https://github.com/offensive-security/exploit-database # ## NOTE: @@ -350,7 +350,6 @@ function buildterms() } - ## Check for empty args if [[ $# -eq 0 ]]; then usage >&2 @@ -517,8 +516,8 @@ if [[ "${GETPATH}" -eq 1 ]]; then fi if [[ "${MIRROR}" -eq 1 ]]; then - echo "Copied to '$(pwd)/'" cp -i "${location}" "$(pwd)/" + echo "Copied to '$(pwd)/'" echo -e "\n" fi else @@ -628,7 +627,7 @@ elif [[ "${EDBID}" -eq 1 ]]; then ## Print JSON format (full options) ("--json")? elif [[ "${JSON}" -eq 1 ]]; then OUTPUT="$( eval ${SEARCH} \ - | awk -F "\"*,\"*" '{ printf "\r\t\t'{'\"Exploit\":\"%s\",\"Path\":\"'${gitpath}/'%s\",\"EDB-ID\":%s},\n", $3, $2, $1 }' \ + | awk -F "\"*,\"*" '{ printf "\r\t\t'{'\"Exploit\":\"%s,\"Path\":\"'${gitpath}/'%s\",\"EDB-ID\":%s},\n", $3, $2, $1 }' \ | sed '$ s/,$//g' )" ## Default view else