Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | A script to automate privilege escalation with CVE-2023-22809 vulnerability | https://github.com/n3m1dotsys/CVE-2023-22809-sudoedit-privesc | POC Details |
| 2 | None | https://github.com/M4fiaB0y/CVE-2023-22809 | POC Details |
| 3 | CVE-2023-22809 Linux Sudo | https://github.com/CKevens/CVE-2023-22809-sudo-POC | POC Details |
| 4 | None | https://github.com/hello4r1end/patch_CVE-2023-22809 | POC Details |
| 5 | Analysis & Exploit | https://github.com/Chan9Yan9/CVE-2023-22809 | POC Details |
| 6 | None | https://github.com/pashayogi/CVE-2023-22809 | POC Details |
| 7 | None | https://github.com/asepsaepdin/CVE-2023-22809 | POC Details |
| 8 | Running this exploit on a vulnerable system allows a local attacker to gain a root shell on the machine. | https://github.com/Toothless5143/CVE-2023-22809 | POC Details |
| 9 | A script to automate privilege escalation with CVE-2023-22809 vulnerability | https://github.com/n3m1sys/CVE-2023-22809-sudoedit-privesc | POC Details |
| 10 | CVE-2023-22809 Linux Sudo | https://github.com/3yujw7njai/CVE-2023-22809-sudo-POC | POC Details |
| 11 | None | https://github.com/AntiVlad/CVE-2023-22809 | POC Details |
| 12 | Sudo Privilege Escalation: CVE-2023-22809 Simulation This project simulates the Sudo privilege escalation vulnerability (CVE-2023-22809) to demonstrate how unauthorized root access can be gained. It involves identifying and exploiting this vulnerability in a controlled environment using Parrot OS, the Sudo command, and Bash scripting. | https://github.com/laxmiyamkolu/SUDO-privilege-escalation | POC Details |
| 13 | None | https://github.com/D0rDa4aN919/CVE-2023-22809-Exploiter | POC Details |
| 14 | CVE-2023-22809 Linux Sudo | https://github.com/AiK1d/CVE-2023-22809-sudo-POC | POC Details |
| 15 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E6%93%8D%E4%BD%9C%E7%B3%BB%E7%BB%9F%E6%BC%8F%E6%B4%9E/Linux%20sudo%20%E6%9D%83%E9%99%90%E6%8F%90%E5%8D%87%E6%BC%8F%E6%B4%9E%20CVE-2023-22809.md | POC Details |
| 16 | automatically exploit the sudoedit vulnerability fo CVE-2023-22809 | https://github.com/spidoman/CVE-2023-22809-automated-python-exploits | POC Details |
| 17 | Automates vulnerability check for sudo versions and privilege escalation via sudoedit if exploitable, helping users test and gain root access. | https://github.com/Spydomain/CVE-2023-22809-automated-python-exploits | POC Details |
| 18 | CVE-2023-22809 Linux Sudo | https://github.com/P4x1s/CVE-2023-22809-sudo-POC | POC Details |
| 19 | Implementation of the CVE-2023-22809 | https://github.com/ValeuDoamne/CVE-2023-22809 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2022-25901 | 5.3 MEDIUM | CookieJar 安全漏洞 |
| CVE-2022-45923 | OpenText Content Suite Platform 代码问题漏洞 | |
| CVE-2023-0164 | OrangeScrum 操作系统命令注入漏洞 | |
| CVE-2022-47966 | 多款ZOHO ManageEngine产品安全漏洞 | |
| CVE-2022-47950 | OpenStack 安全漏洞 | |
| CVE-2022-47881 | Foxit PDF Reader 缓冲区错误漏洞 | |
| CVE-2022-46505 | MatrixSSL 安全漏洞 | |
| CVE-2022-45928 | OpenText Content Suite Platform 安全漏洞 | |
| CVE-2022-45927 | OpenText Content Suite Platform 安全漏洞 | |
| CVE-2022-45926 | OpenText Content Suite Platform 代码问题漏洞 | |
| CVE-2022-45925 | OpenText Content Suite Platform 安全漏洞 | |
| CVE-2022-45924 | OpenText Content Suite Platform 安全漏洞 | |
| CVE-2022-45922 | OpenText Content Suite Platform 安全漏洞 | |
| CVE-2022-45613 | Book Store Management System 跨站脚本漏洞 | |
| CVE-2022-4235 | RushBet 跨站脚本漏洞 | |
| CVE-2022-41417 | BlogEngine 输入验证错误漏洞 | |
| CVE-2022-3100 | OpenStack barbican 安全漏洞 | |
| CVE-2021-36630 | Ruckus Wireless SmartZone 安全漏洞 | |
| CVE-2021-33959 | Plex media server 访问控制错误漏洞 | |
| CVE-2020-35326 | inxedu SQL注入漏洞 |
Showing top 20 of 22 CVEs. View all on vendor page → →
No comments yet