Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2010-0426 PoC — Sudo sudoedit命令本地权限提升漏洞

Source
Associated Vulnerability
Title:Sudo sudoedit命令本地权限提升漏洞 (CVE-2010-0426)
Description:sudo 1.6.x before 1.6.9p21 and 1.7.x before 1.7.2p4, when a pseudo-command is enabled, permits a match between the name of the pseudo-command and the name of an executable file in an arbitrary directory, which allows local users to gain privileges via a crafted executable file, as demonstrated by a file named sudoedit in a user's home directory.
Description
cve-2010-0426
Readme
# CVE-2010-0426

This is part of Cved: *a tool to manage vulnerable docker containers.* 

Cved: https://github.com/git-rep-src/cved

Image source: https://github.com/cved-sources/cve-2010-0426

Image author: https://github.com/t0kx/privesc-CVE-2010-0426
File Snapshot

[4.0K] /data/pocs/ed95184c77ed1a5475c97c4faab105dfb9c7cea4 ├── [ 771] Dockerfile └── [ 254] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →