Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Ubuntu | linux kernel | 5.8 kernel ~ 5.8.0-50.56 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Ubuntu OverlayFS Local Privesc | https://github.com/briskets/CVE-2021-3493 | POC Details |
| 2 | None | https://github.com/oneoy/CVE-2021-3493 | POC Details |
| 3 | None | https://github.com/Abdennour-py/CVE-2021-3493 | POC Details |
| 4 | None | https://github.com/Ishan3011/CVE-2021-3493 | POC Details |
| 5 | CVE-2021-3493 Ubuntu OverlayFS Local Privesc (Interactive Bash Shell & Execute Command Entered) | https://github.com/inspiringz/CVE-2021-3493 | POC Details |
| 6 | CVE-2021-3493 Ubuntu漏洞 | https://github.com/derek-turing/CVE-2021-3493 | POC Details |
| 7 | 2021 kernel vulnerability in Ubuntu. | https://github.com/cerodah/overlayFS-CVE-2021-3493 | POC Details |
| 8 | None | https://github.com/puckiestyle/CVE-2021-3493 | POC Details |
| 9 | None | https://github.com/Senz4wa/CVE-2021-3493 | POC Details |
| 10 | None | https://github.com/fei9747/CVE-2021-3493 | POC Details |
| 11 | Exploit For OverlayFS | https://github.com/pmihsan/OverlayFS-CVE-2021-3493 | POC Details |
| 12 | None | https://github.com/smallkill/CVE-2021-3493 | POC Details |
| 13 | None | https://github.com/ptkhai15/OverlayFS---CVE-2021-3493 | POC Details |
| 14 | None | https://github.com/fathallah17/OverlayFS---CVE-2021-3493 | POC Details |
| 15 | Exploit a 2021 Kernel vulnerability in Ubuntu to become root almost instantly! | https://github.com/fathallah17/OverlayFS-CVE-2021-3493 | POC Details |
| 16 | None | https://github.com/Sornphut/OverlayFS---CVE-2021-3493 | POC Details |
| 17 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E6%93%8D%E4%BD%9C%E7%B3%BB%E7%BB%9F%E6%BC%8F%E6%B4%9E/Linux%20kernel%20%E6%9D%83%E9%99%90%E6%8F%90%E5%8D%87%E6%BC%8F%E6%B4%9E%20CVE-2021-3493.md | POC Details |
| 18 | A penetration test of Ubuntu Touch 16.04 that identified 7 vulnerabilities, including a critical kernel exploit (CVE-2021-3493) allowing root access. This report provides findings and actionable hardening recommendations. | https://github.com/spideyctf/UbuntuTouchSecurityVAPTReport | POC Details |
| 19 | root Privileges | https://github.com/cyberx-1/OverlayFS-CVE-2021-3493 | POC Details |
| 20 | CVE-2021-3493 OverlayFS privilege escalation exploit framework with advanced red team features. Includes persistence mechanisms, post-exploitation modules, stealth capabilities, and comprehensive documentation. For authorized testing only. | https://github.com/George-Yanni/DeepRoot | POC Details |
No public POC found.
Login to generate AI POCNo comments yet