Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | POC for netdata ndsudo vulnerability - CVE-2024-32019 | https://github.com/AzureADTrent/CVE-2024-32019-POC | POC Details |
| 2 | CVE-2024-32019 is a high-severity local privilege escalation vulnerability in Netdata (versions >= 1.44.0-60 < 1.45.3), caused by insecure use of the PATH variable in the ndsudo SUID binary, allowing attackers to execute arbitrary commands as root. | https://github.com/dollarboysushil/CVE-2024-32019-Netdata-ndsudo-PATH-Vulnerability-Privilege-Escalation | POC Details |
| 3 | Netdata ndsudo local privilage escalation workflow and POC (CVE-2024-32019) | https://github.com/juanbelin/CVE-2024-32019-POC | POC Details |
| 4 | Netdata ndsudo PoC | https://github.com/C0deInBlack/CVE-2024-32019-poc | POC Details |
| 5 | None | https://github.com/sPhyos/cve-2024-32019-PoC | POC Details |
| 6 | None | https://github.com/x0da6h/POC-for-CVE-2024-32019 | POC Details |
| 7 | Netdata ndsudo Privilege Escalation PoC | https://github.com/T1erno/CVE-2024-32019-Netdata-ndsudo-Privilege-Escalation-PoC | POC Details |
| 8 | This is an alternative poc for the CVE-2024-32019 written in python | https://github.com/hexared/CVE-2024-32019_poc | POC Details |
| 9 | Privilege Escalation via "ndsudo" (Netdata Local Exploit) | https://github.com/80Ottanta80/CVE-2024-32019-PoC | POC Details |
| 10 | Python implementation of Netdata LPE exploit | https://github.com/julichaan/CVE-2024-32019-ndsudo-local-privilege-escalation-NetData | POC Details |
| 11 | NDSUDO Vulnerability Exploit | https://github.com/justjoeyking/CVE-2024-32019-ndsudo | POC Details |
No public POC found.
Login to generate AI POCNo comments yet