Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/FauxFaux/sudo-cve-2019-14287 | POC Details |
| 2 | This is a container built for demonstration purposes that has a version of the sudo command which is vulnerable to CVE-2019-14287 | https://github.com/CashWilliams/CVE-2019-14287-demo | POC Details |
| 3 | Sudo exploit | https://github.com/n0w4n/CVE-2019-14287 | POC Details |
| 4 | None | https://github.com/gurneesh/CVE-2019-14287-write-up | POC Details |
| 5 | Sudo Security Bypass (CVE-2019-14287) | https://github.com/shallvhack/Sudo-Security-Bypass-CVE-2019-14287 | POC Details |
| 6 | None | https://github.com/huang919/cve-2019-14287-PPT | POC Details |
| 7 | cve-2019-14287 | https://github.com/wenyu1999/sudo- | POC Details |
| 8 | None | https://github.com/Sindadziy/cve-2019-14287 | POC Details |
| 9 | Containerized and deployable use of the CVE-2019-14287 vuln. View README.md for more. | https://github.com/CMNatic/Dockerized-CVE-2019-14287 | POC Details |
| 10 | Sudo Vulnerability CVE-2019-14287 | https://github.com/axax002/sudo-vulnerability-CVE-2019-14287 | POC Details |
| 11 | Documentation for Sudo Security Bypass - CVE 2019-14287 | https://github.com/SachinthaDeSilva-cmd/Exploit-CVE-2019-14287 | POC Details |
| 12 | Sudo Security Policy bypass Vulnerability | https://github.com/HussyCool/CVE-2019-14287-IT18030372- | POC Details |
| 13 | None | https://github.com/ShianTrish/sudo-Security-Bypass-vulnerability-CVE-2019-14287 | POC Details |
| 14 | This is a brief exploitation of CVE-2019-14287 Sudo Security Bypass Vulnerability. | https://github.com/ejlevin99/Sudo-Security-Bypass-Vulnerability | POC Details |
| 15 | This is the exploitation of sudo security bypass vulnerability | https://github.com/thinuri99/Sudo-Security-Bypass-Vulnerability-CVE-2019-14287- | POC Details |
| 16 | None | https://github.com/janod313/-CVE-2019-14287-SUDO-bypass-vulnerability | POC Details |
| 17 | None | https://github.com/DewmiApsara/CVE-2019-14287 | POC Details |
| 18 | Scripts to verify and execute CVE-2019-14287 as part of Research | https://github.com/M108Falcon/Sudo-CVE-2019-14287 | POC Details |
| 19 | None | https://github.com/edsonjt81/CVE-2019-14287- | POC Details |
| 20 | CVE-2019-14287 | https://github.com/DularaAnushka/Linux-Privilege-Escalation-using-Sudo-Rights | POC Details |
| 21 | None | https://github.com/crypticdante/CVE-2019-14287 | POC Details |
| 22 | None | https://github.com/Hasintha-98/Sudo-Vulnerability-Exploit-CVE-2019-14287 | POC Details |
| 23 | None | https://github.com/5l1v3r1/cve-2019-14287sudoexp | POC Details |
| 24 | None | https://github.com/MariliaMeira/CVE-2019-14287 | POC Details |
| 25 | None | https://github.com/Ijinleife/CVE-2019-14287 | POC Details |
| 26 | None | https://github.com/H3xL00m/CVE-2019-14287 | POC Details |
| 27 | None | https://github.com/n3ov4n1sh/CVE-2019-14287 | POC Details |
| 28 | None | https://github.com/c0d3cr4f73r/CVE-2019-14287 | POC Details |
| 29 | None | https://github.com/Sp3c73rSh4d0w/CVE-2019-14287 | POC Details |
| 30 | None | https://github.com/0xwh1pl4sh/CVE-2019-14287 | POC Details |
| 31 | None | https://github.com/N3rdyN3xus/CVE-2019-14287 | POC Details |
| 32 | None | https://github.com/NyxByt3/CVE-2019-14287 | POC Details |
| 33 | None | https://github.com/lemonadern/poc-cve-2019-14287 | POC Details |
| 34 | None | https://github.com/h3xcr4ck3r/CVE-2019-14287 | POC Details |
| 35 | None | https://github.com/n3rdh4x0r/CVE-2019-14287 | POC Details |
| 36 | In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command. | https://github.com/projectdiscovery/nuclei-templates/blob/main/code/cves/2019/CVE-2019-14287.yaml | POC Details |
| 37 | None | https://github.com/h3x0v3rl0rd/CVE-2019-14287 | POC Details |
| 38 | Documentation for Sudo Security Bypass - CVE 2019-14287 | https://github.com/sachinthadesilva/Exploit-CVE-2019-14287 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet