尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | None | https://github.com/mr-r3b00t/CVE-2021-3156 | POC详情 |
| 2 | None | https://github.com/nexcess/sudo_cve-2021-3156 | POC详情 |
| 3 | CVE-2021-3156 | https://github.com/reverse-ex/CVE-2021-3156 | POC详情 |
| 4 | None | https://github.com/unauth401/CVE-2021-3156 | POC详情 |
| 5 | CVE-2021-3156 | https://github.com/ymrsmns/CVE-2021-3156 | POC详情 |
| 6 | This simple bash script will patch the recently discovered sudo heap overflow vulnerability. | https://github.com/elbee-cyber/CVE-2021-3156-PATCHER | POC详情 |
| 7 | 1day research effort | https://github.com/kernelzeroday/CVE-2021-3156-Baron-Samedit | POC详情 |
| 8 | cve-2021-3156;sudo堆溢出漏洞;漏洞检测 | https://github.com/yaunsky/cve-2021-3156 | POC详情 |
| 9 | None | https://github.com/baka9moe/CVE-2021-3156-Exp | POC详情 |
| 10 | CVE-2021-3156 | https://github.com/ph4ntonn/CVE-2021-3156 | POC详情 |
| 11 | None | https://github.com/binw2018/CVE-2021-3156-SCRIPT | POC详情 |
| 12 | None | https://github.com/freeFV/CVE-2021-3156 | POC详情 |
| 13 | Notes regarding CVE-2021-3156: Heap-Based Buffer Overflow in Sudo | https://github.com/mbcrump/CVE-2021-3156 | POC详情 |
| 14 | PoC for CVE-2021-3156 (sudo heap overflow) | https://github.com/stong/CVE-2021-3156 | POC详情 |
| 15 | checking CVE-2021-3156 vulnerability & patch script | https://github.com/nobodyatall648/CVE-2021-3156 | POC详情 |
| 16 | None | https://github.com/blasty/CVE-2021-3156 | POC详情 |
| 17 | None | https://github.com/teamtopkarl/CVE-2021-3156 | POC详情 |
| 18 | 复现别人家的CVEs系列 | https://github.com/Q4n/CVE-2021-3156 | POC详情 |
| 19 | Description Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character. | https://github.com/kal1gh0st/CVE-2021-3156 | POC详情 |
| 20 | A docker environment to research CVE-2021-3156 | https://github.com/apogiatzis/docker-CVE-2021-3156 | POC详情 |
| 21 | a simple script to patch CVE-2021-3156 (heap based buffer overflow via sudo). | https://github.com/voidlsd/CVE-2021-3156 | POC详情 |
| 22 | Patch Script for CVE-2021-3156 Heap Overflow | https://github.com/Ashish-dawani/CVE-2021-3156-Patch | POC详情 |
| 23 | None | https://github.com/SantiagoSerrao/ScannerCVE-2021-3156 | POC详情 |
| 24 | CTF for HDE 64 students at See Security College. Exploit a JWT (web part) & CVE-2021-3156 (LPE part). | https://github.com/DanielAzulayy/CTF-2021 | POC详情 |
| 25 | None | https://github.com/cdeletre/Serpentiel-CVE-2021-3156 | POC详情 |
| 26 | CVE-2021-3156 Vagrant Lab | https://github.com/dinhbaouit/CVE-2021-3156 | POC详情 |
| 27 | Root shell PoC for CVE-2021-3156 | https://github.com/CptGibbon/CVE-2021-3156 | POC详情 |
| 28 | Custom version of sudo 1.8.3p1 with CVE-2021-3156 patches applied | https://github.com/perlun/sudo-1.8.3p1-patched | POC详情 |
| 29 | None | https://github.com/1N53C/CVE-2021-3156-PoC | POC详情 |
| 30 | CVE-2021-3156: Sudo heap overflow exploit for Debian 10 | https://github.com/0xdevil/CVE-2021-3156 | POC详情 |
| 31 | 보안취약점 확인 | https://github.com/gmldbd94/cve-2021-3156 | POC详情 |
| 32 | sudo heap overflow to LPE, in Go | https://github.com/jm33-m0/CVE-2021-3156 | POC详情 |
| 33 | CVE-2021-3156非交互式执行命令 | https://github.com/Rvn0xsy/CVE-2021-3156-plus | POC详情 |
| 34 | How to solve Sudo Heap-Based Buffer Overflow Vulnerability — CVE-2021-3156? | https://github.com/r3k4t/how-to-solve-sudo-heap-based-bufferoverflow-vulnerability | POC详情 |
| 35 | None | https://github.com/oneoy/CVE-2021-3156 | POC详情 |
| 36 | Sudo Baron Samedit Exploit | https://github.com/worawit/CVE-2021-3156 | POC详情 |
| 37 | Exploit generator for sudo CVE-2021-3156 | https://github.com/lmol/CVE-2021-3156 | POC详情 |
| 38 | CVE-2021-3156漏洞修复Shell | https://github.com/BearCat4/CVE-2021-3156 | POC详情 |
| 39 | None | https://github.com/password520/CVE-2021-3156 | POC详情 |
| 40 | None | https://github.com/capturingcats/CVE-2021-3156 | POC详情 |
| 41 | CVE-2021-3156 - Sudo Baron Samedit | https://github.com/LiveOverflow/pwnedit | POC详情 |
| 42 | None | https://github.com/ajtech-hue/CVE-2021-3156-Mitigation-ShellScript-Build | POC详情 |
| 43 | None | https://github.com/donghyunlee00/CVE-2021-3156 | POC详情 |
| 44 | None | https://github.com/TheFlash2k/CVE-2021-3156 | POC详情 |
| 45 | None | https://github.com/Exodusro/CVE-2021-3156 | POC详情 |
| 46 | None | https://github.com/CyberCommands/CVE-2021-3156 | POC详情 |
| 47 | Sudo Heap Overflow Baron Samedit | https://github.com/0x7183/CVE-2021-3156 | POC详情 |
| 48 | None | https://github.com/Y3A/CVE-2021-3156 | POC详情 |
| 49 | CVE-2021-3156 - sudo exploit for ubuntu 18.04 & 20.04 | https://github.com/redhawkeye/sudo-exploit | POC详情 |
| 50 | Sudo heap-based buffer overflow privilege escalation commands and mitigations. | https://github.com/d3c3ptic0n/CVE-2021-3156 | POC详情 |
| 51 | None | https://github.com/musergi/CVE-2021-3156 | POC详情 |
| 52 | CVE-2021-3156 exploit | https://github.com/halissha/CVE-2021-3156 | POC详情 |
| 53 | Exploit and Demo system for CVE-2021-3156 | https://github.com/sharkmoos/Baron-Samedit | POC详情 |
| 54 | CVE-2021-3156 POC and Docker and Analysis write up | https://github.com/chenaotian/CVE-2021-3156 | POC详情 |
| 55 | CVE-2021-3156 deep dive. | https://github.com/ret2basic/SudoScience | POC详情 |
| 56 | None | https://github.com/puckiestyle/CVE-2021-3156 | POC详情 |
| 57 | Exploit for CVE-2021-3156 | https://github.com/barebackbandit/CVE-2021-3156 | POC详情 |
| 58 | CVE-2021-3156 | https://github.com/RodricBr/CVE-2021-3156 | POC详情 |
| 59 | CMPT733 Cybersecurity Lab II Project: GDB plugin for heap exploits inspired by CVE-2021-3156 | https://github.com/ypl6/heaplens | POC详情 |
| 60 | sudo提权漏洞CVE-2021-3156复现代码 | https://github.com/q77190858/CVE-2021-3156 | POC详情 |
| 61 | CVE-2021-3156: Heap-Based Buffer Overflow in Sudo (Baron Samedit) | https://github.com/arvindshima/CVE-2021-3156 | POC详情 |
| 62 | Visualization, Fuzzing, Exploit and Patch of Baron Samedit Vulnerability | https://github.com/Mhackiori/CVE-2021-3156 | POC详情 |
| 63 | The test report of this exploit. | https://github.com/baka9moe/CVE-2021-3156-TestReport | POC详情 |
| 64 | 利用sudo提权,只针对cnetos7 | https://github.com/PhuketIsland/CVE-2021-3156-centos7 | POC详情 |
| 65 | clif is a command-line interface (CLI) application fuzzer, pretty much what wfuzz or ffuf are for web. It was inspired by sudo vulnerability CVE-2021-3156 and the fact that for some reasons, Google's afl-fuzz doesn't allow for unlimited argument or option specification. | https://github.com/0x4ndy/clif | POC详情 |
| 66 | None | https://github.com/meowhua15/CVE-2021-3156 | POC详情 |
| 67 | None | https://github.com/mutur4/CVE-2021-3156 | POC详情 |
| 68 | Exploit for Ubuntu 20.04 using CVE-2021-3156 enhanced with post-exploitation scripts | https://github.com/PurpleOzone/PE_CVE-CVE-2021-3156 | POC详情 |
| 69 | None | https://github.com/asepsaepdin/CVE-2021-3156 | POC详情 |
| 70 | None | https://github.com/DDayLuong/CVE-2021-3156 | POC详情 |
| 71 | Forked from @worawit, shorter&optimized. Only works for sudo=1.8.23 on Centos7 | https://github.com/wurwur/CVE-2021-3156 | POC详情 |
| 72 | None | https://github.com/SamTruss/LMU-CVE-2021-3156 | POC详情 |
| 73 | kernal exploit 3156 | https://github.com/34rthq04k3/CVE-2021-3156 | POC详情 |
| 74 | kernal exploit 3156 | https://github.com/ragingkarson/CVE-2021-3156 | POC详情 |
| 75 | Checker for CVE-2021-3156 with static version check | https://github.com/lypd0/CVE-2021-3156-checker | POC详情 |
| 76 | None | https://github.com/ZTK-009/CVE-2021-3156 | POC详情 |
| 77 | Y3A / CVE-2021-3156 | https://github.com/EthicalSecurity-Agency/Y3A-CVE-2021-3156 | POC详情 |
| 78 | None | https://github.com/DASICS-ICT/DASICS-CVE-2021-3156 | POC详情 |
| 79 | None | https://github.com/Typical0day/CVE-2021-3156 | POC详情 |
| 80 | None | https://github.com/hycheng15/CVE-2021-3156 | POC详情 |
| 81 | None | https://github.com/acidburn2049/CVE-2021-3156 | POC详情 |
| 82 | fork of worawit/CVE-2021-3156 exploit_nss.py modified to work with ifconfig instead of the ip command | https://github.com/Bad3r/CVE-2021-3156-without-ip-command | POC详情 |
| 83 | None | https://github.com/Sebastianbedoya25/CVE-2021-3156 | POC详情 |
| 84 | This repository contains a Proof-of-Concept (PoC) exploit for the Baron Samedit vulnerability (CVE-2021-3156). The exploit demonstrates privilege escalation on Ubuntu 20.04 with sudo version 1.8.31 and glibc version 2.31. It includes an assembly-based exploit, a shared object payload, and a Makefile for automated compilation. | https://github.com/ten-ops/baron-samedit | POC详情 |
| 85 | None | https://github.com/Sornphut/CVE-2021-3156-Heap-Based-Buffer-Overflow-in-Sudo-Baron-Samedit- | POC详情 |
| 86 | Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character. | https://github.com/projectdiscovery/nuclei-templates/blob/main/code/cves/2021/CVE-2021-3156.yaml | POC详情 |
| 87 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E6%93%8D%E4%BD%9C%E7%B3%BB%E7%BB%9F%E6%BC%8F%E6%B4%9E/Linux%20sudo%20%E6%9D%83%E9%99%90%E6%8F%90%E5%8D%87%E6%BC%8F%E6%B4%9E%20CVE-2021-3156.md | POC详情 |
| 88 | None | https://github.com/shishirpandey18/CVE-2021-3156 | POC详情 |
| 89 | None | https://github.com/duongdz96/CVE-2021-3156-main | POC详情 |
| 90 | None | https://github.com/Shuhaib88/Baron-Samedit-Heap-Buffer-Overflow-CVE-2021-3156 | POC详情 |
| 91 | None | https://github.com/Superliverbun/cve-2021-3156- | POC详情 |
| 92 | CVE-2021-3156-Exploit-Demo | https://github.com/TopskiyPavelQwertyGang/Review.CVE-2021-3156 | POC详情 |
| 93 | Exploit para explotar la vulnerabilidad CVE-2021-3156. | https://github.com/Maalfer/Sudo-CVE-2021-3156 | POC详情 |
| 94 | A research regarding the exisiting CVE exploit : CVE-2021-3156(Sudo BufferOverflow) | https://github.com/HuzaifaTariqAfzalKhan/CVE-Exploit-Research-Development-ITSOLERA | POC详情 |
| 95 | Projeto educacional desenvolvido em Python com foco na análise da vulnerabilidade CVE-2021-3156 (Baron Samedit), uma falha crítica no sudo que permitia elevação de privilégio local em sistemas Linux. | https://github.com/VilmarTuminskii/cve-2021-3156-sudo-lab | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论