Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Canonical | Ubuntu Kernel | - | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2023-2640 CVE-2023-32629 | https://github.com/OllaPapito/gameoverlay | POC Details |
| 2 | GameoverlayFS (CVE-2023-2640 and CVE-2023-32629) exploit in Shell Script tested on Ubuntu 20.04 Kernel 5.4.0 | https://github.com/luanoliveira350/GameOverlayFS | POC Details |
| 3 | GameOver(lay) Ubuntu Privilege Escalation | https://github.com/g1vi/CVE-2023-2640-CVE-2023-32629 | POC Details |
| 4 | None | https://github.com/vinetsuicide/CVE-2023-2640-CVE-2023-32629 | POC Details |
| 5 | Escalating Privilege using CVE-2023-2640 CVE-2023-3262 | https://github.com/SanjayRagavendar/Ubuntu-GameOver-Lay | POC Details |
| 6 | None | https://github.com/Nkipohcs/CVE-2023-2640-CVE-2023-32629 | POC Details |
| 7 | None | https://github.com/musorblyat/CVE-2023-2640-CVE-2023-32629 | POC Details |
| 8 | None | https://github.com/K5LK/CVE-2023-2640-32629 | POC Details |
| 9 | A local privilege escalation vulnerability has been discovered in the OverlayFS module of the Ubuntu kernel. This vulnerability could allow an attacker with local access to escalate their privileges, potentially gaining root-like access to the system. | https://github.com/projectdiscovery/nuclei-templates/blob/main/code/cves/2023/CVE-2023-2640.yaml | POC Details |
| 10 | Dimostrazione di una vulnerabilità RCE (Remote Code Execution) in phpMyAdmin 4.8.1, con exploit per reverse shell e analisi di privilege escalation tramite la vulnerabilità CVE-2023-2640/CVE-2023-32629 (GameOverlay) su kernel Linux. | https://github.com/filippo-zullo98/phpMyAdmin-RCE-Exploit-Lab | POC Details |
No public POC found.
Login to generate AI POCNo comments yet