Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc | https://github.com/Plazmaz/CVE-2019-18634 | POC Details |
| 2 | Proof of Concept for CVE-2019-18634 | https://github.com/saleemrashid/sudo-cve-2019-18634 | POC Details |
| 3 | An Python Exploit for Sudo vulnerability CVE-2019-18634 | https://github.com/N1et/CVE-2019-18634 | POC Details |
| 4 | exploit for sudo CVE-2019-18634 | https://github.com/ptef/CVE-2019-18634 | POC Details |
| 5 | None | https://github.com/edsonjt81/sudo-cve-2019-18634 | POC Details |
| 6 | exploit | https://github.com/Y3A/CVE-2019-18634 | POC Details |
| 7 | My n-day exploit for CVE-2019-18634 (local privilege escalation) | https://github.com/aesophor/CVE-2019-18634 | POC Details |
| 8 | None | https://github.com/TheJoyOfHacking/saleemrashid-sudo-cve-2019-18634 | POC Details |
| 9 | None | https://github.com/DDayLuong/CVE-2019-18634 | POC Details |
| 10 | A reproduction of CVE-2019-18634, sudo privilege escalation with buffer overflow. | https://github.com/chanbakjsd/CVE-2019-18634 | POC Details |
| 11 | exploit | https://github.com/paras1te-x/CVE-2019-18634 | POC Details |
| 12 | This repo contains both the exploit and the explaination of how this vulnerability is exploited | https://github.com/l0w3/CVE-2019-18634 | POC Details |
| 13 | None | https://github.com/ngyinkit/cve-2019-18634 | POC Details |
| 14 | None | https://github.com/letsr00t/-CVE-2019-18634-sudo-pwfeedback | POC Details |
| 15 | analysis of the sudo buffer overflow affect sudo version <1.8.26 and how to use GCC to compile publicly availible exploits | https://github.com/CyrusRazavi/CVE-2019-18634- | POC Details |
| 16 | analysis of the sudo buffer overflow affect sudo version <1.8.26 and how to use GCC to compile publicly availible exploits | https://github.com/CyrusRazavi/CVE-2019-18634-writeup | POC Details |
No public POC found.
Login to generate AI POCZaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.