Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/mr-r3b00t/CVE-2021-3156 | POC Details |
| 2 | None | https://github.com/nexcess/sudo_cve-2021-3156 | POC Details |
| 3 | CVE-2021-3156 | https://github.com/reverse-ex/CVE-2021-3156 | POC Details |
| 4 | None | https://github.com/unauth401/CVE-2021-3156 | POC Details |
| 5 | CVE-2021-3156 | https://github.com/ymrsmns/CVE-2021-3156 | POC Details |
| 6 | This simple bash script will patch the recently discovered sudo heap overflow vulnerability. | https://github.com/elbee-cyber/CVE-2021-3156-PATCHER | POC Details |
| 7 | 1day research effort | https://github.com/kernelzeroday/CVE-2021-3156-Baron-Samedit | POC Details |
| 8 | cve-2021-3156;sudo堆溢出漏洞;漏洞检测 | https://github.com/yaunsky/cve-2021-3156 | POC Details |
| 9 | None | https://github.com/baka9moe/CVE-2021-3156-Exp | POC Details |
| 10 | CVE-2021-3156 | https://github.com/ph4ntonn/CVE-2021-3156 | POC Details |
| 11 | None | https://github.com/binw2018/CVE-2021-3156-SCRIPT | POC Details |
| 12 | None | https://github.com/freeFV/CVE-2021-3156 | POC Details |
| 13 | Notes regarding CVE-2021-3156: Heap-Based Buffer Overflow in Sudo | https://github.com/mbcrump/CVE-2021-3156 | POC Details |
| 14 | PoC for CVE-2021-3156 (sudo heap overflow) | https://github.com/stong/CVE-2021-3156 | POC Details |
| 15 | checking CVE-2021-3156 vulnerability & patch script | https://github.com/nobodyatall648/CVE-2021-3156 | POC Details |
| 16 | None | https://github.com/blasty/CVE-2021-3156 | POC Details |
| 17 | None | https://github.com/teamtopkarl/CVE-2021-3156 | POC Details |
| 18 | 复现别人家的CVEs系列 | https://github.com/Q4n/CVE-2021-3156 | POC Details |
| 19 | Description Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character. | https://github.com/kal1gh0st/CVE-2021-3156 | POC Details |
| 20 | A docker environment to research CVE-2021-3156 | https://github.com/apogiatzis/docker-CVE-2021-3156 | POC Details |
| 21 | a simple script to patch CVE-2021-3156 (heap based buffer overflow via sudo). | https://github.com/voidlsd/CVE-2021-3156 | POC Details |
| 22 | Patch Script for CVE-2021-3156 Heap Overflow | https://github.com/Ashish-dawani/CVE-2021-3156-Patch | POC Details |
| 23 | None | https://github.com/SantiagoSerrao/ScannerCVE-2021-3156 | POC Details |
| 24 | CTF for HDE 64 students at See Security College. Exploit a JWT (web part) & CVE-2021-3156 (LPE part). | https://github.com/DanielAzulayy/CTF-2021 | POC Details |
| 25 | None | https://github.com/cdeletre/Serpentiel-CVE-2021-3156 | POC Details |
| 26 | CVE-2021-3156 Vagrant Lab | https://github.com/dinhbaouit/CVE-2021-3156 | POC Details |
| 27 | Root shell PoC for CVE-2021-3156 | https://github.com/CptGibbon/CVE-2021-3156 | POC Details |
| 28 | Custom version of sudo 1.8.3p1 with CVE-2021-3156 patches applied | https://github.com/perlun/sudo-1.8.3p1-patched | POC Details |
| 29 | None | https://github.com/1N53C/CVE-2021-3156-PoC | POC Details |
| 30 | CVE-2021-3156: Sudo heap overflow exploit for Debian 10 | https://github.com/0xdevil/CVE-2021-3156 | POC Details |
| 31 | 보안취약점 확인 | https://github.com/gmldbd94/cve-2021-3156 | POC Details |
| 32 | sudo heap overflow to LPE, in Go | https://github.com/jm33-m0/CVE-2021-3156 | POC Details |
| 33 | CVE-2021-3156非交互式执行命令 | https://github.com/Rvn0xsy/CVE-2021-3156-plus | POC Details |
| 34 | How to solve Sudo Heap-Based Buffer Overflow Vulnerability — CVE-2021-3156? | https://github.com/r3k4t/how-to-solve-sudo-heap-based-bufferoverflow-vulnerability | POC Details |
| 35 | None | https://github.com/oneoy/CVE-2021-3156 | POC Details |
| 36 | Sudo Baron Samedit Exploit | https://github.com/worawit/CVE-2021-3156 | POC Details |
| 37 | Exploit generator for sudo CVE-2021-3156 | https://github.com/lmol/CVE-2021-3156 | POC Details |
| 38 | CVE-2021-3156漏洞修复Shell | https://github.com/BearCat4/CVE-2021-3156 | POC Details |
| 39 | None | https://github.com/password520/CVE-2021-3156 | POC Details |
| 40 | None | https://github.com/capturingcats/CVE-2021-3156 | POC Details |
| 41 | CVE-2021-3156 - Sudo Baron Samedit | https://github.com/LiveOverflow/pwnedit | POC Details |
| 42 | None | https://github.com/ajtech-hue/CVE-2021-3156-Mitigation-ShellScript-Build | POC Details |
| 43 | None | https://github.com/donghyunlee00/CVE-2021-3156 | POC Details |
| 44 | None | https://github.com/TheFlash2k/CVE-2021-3156 | POC Details |
| 45 | None | https://github.com/Exodusro/CVE-2021-3156 | POC Details |
| 46 | None | https://github.com/CyberCommands/CVE-2021-3156 | POC Details |
| 47 | Sudo Heap Overflow Baron Samedit | https://github.com/0x7183/CVE-2021-3156 | POC Details |
| 48 | None | https://github.com/Y3A/CVE-2021-3156 | POC Details |
| 49 | CVE-2021-3156 - sudo exploit for ubuntu 18.04 & 20.04 | https://github.com/redhawkeye/sudo-exploit | POC Details |
| 50 | Sudo heap-based buffer overflow privilege escalation commands and mitigations. | https://github.com/d3c3ptic0n/CVE-2021-3156 | POC Details |
| 51 | None | https://github.com/musergi/CVE-2021-3156 | POC Details |
| 52 | CVE-2021-3156 exploit | https://github.com/halissha/CVE-2021-3156 | POC Details |
| 53 | Exploit and Demo system for CVE-2021-3156 | https://github.com/sharkmoos/Baron-Samedit | POC Details |
| 54 | CVE-2021-3156 POC and Docker and Analysis write up | https://github.com/chenaotian/CVE-2021-3156 | POC Details |
| 55 | CVE-2021-3156 deep dive. | https://github.com/ret2basic/SudoScience | POC Details |
| 56 | None | https://github.com/puckiestyle/CVE-2021-3156 | POC Details |
| 57 | Exploit for CVE-2021-3156 | https://github.com/barebackbandit/CVE-2021-3156 | POC Details |
| 58 | CVE-2021-3156 | https://github.com/RodricBr/CVE-2021-3156 | POC Details |
| 59 | CMPT733 Cybersecurity Lab II Project: GDB plugin for heap exploits inspired by CVE-2021-3156 | https://github.com/ypl6/heaplens | POC Details |
| 60 | sudo提权漏洞CVE-2021-3156复现代码 | https://github.com/q77190858/CVE-2021-3156 | POC Details |
| 61 | CVE-2021-3156: Heap-Based Buffer Overflow in Sudo (Baron Samedit) | https://github.com/arvindshima/CVE-2021-3156 | POC Details |
| 62 | Visualization, Fuzzing, Exploit and Patch of Baron Samedit Vulnerability | https://github.com/Mhackiori/CVE-2021-3156 | POC Details |
| 63 | The test report of this exploit. | https://github.com/baka9moe/CVE-2021-3156-TestReport | POC Details |
| 64 | 利用sudo提权,只针对cnetos7 | https://github.com/PhuketIsland/CVE-2021-3156-centos7 | POC Details |
| 65 | clif is a command-line interface (CLI) application fuzzer, pretty much what wfuzz or ffuf are for web. It was inspired by sudo vulnerability CVE-2021-3156 and the fact that for some reasons, Google's afl-fuzz doesn't allow for unlimited argument or option specification. | https://github.com/0x4ndy/clif | POC Details |
| 66 | None | https://github.com/meowhua15/CVE-2021-3156 | POC Details |
| 67 | None | https://github.com/mutur4/CVE-2021-3156 | POC Details |
| 68 | Exploit for Ubuntu 20.04 using CVE-2021-3156 enhanced with post-exploitation scripts | https://github.com/PurpleOzone/PE_CVE-CVE-2021-3156 | POC Details |
| 69 | None | https://github.com/asepsaepdin/CVE-2021-3156 | POC Details |
| 70 | None | https://github.com/DDayLuong/CVE-2021-3156 | POC Details |
| 71 | Forked from @worawit, shorter&optimized. Only works for sudo=1.8.23 on Centos7 | https://github.com/wurwur/CVE-2021-3156 | POC Details |
| 72 | None | https://github.com/SamTruss/LMU-CVE-2021-3156 | POC Details |
| 73 | kernal exploit 3156 | https://github.com/34rthq04k3/CVE-2021-3156 | POC Details |
| 74 | kernal exploit 3156 | https://github.com/ragingkarson/CVE-2021-3156 | POC Details |
| 75 | Checker for CVE-2021-3156 with static version check | https://github.com/lypd0/CVE-2021-3156-checker | POC Details |
| 76 | None | https://github.com/ZTK-009/CVE-2021-3156 | POC Details |
| 77 | Y3A / CVE-2021-3156 | https://github.com/EthicalSecurity-Agency/Y3A-CVE-2021-3156 | POC Details |
| 78 | None | https://github.com/DASICS-ICT/DASICS-CVE-2021-3156 | POC Details |
| 79 | None | https://github.com/Typical0day/CVE-2021-3156 | POC Details |
| 80 | None | https://github.com/hycheng15/CVE-2021-3156 | POC Details |
| 81 | None | https://github.com/acidburn2049/CVE-2021-3156 | POC Details |
| 82 | fork of worawit/CVE-2021-3156 exploit_nss.py modified to work with ifconfig instead of the ip command | https://github.com/Bad3r/CVE-2021-3156-without-ip-command | POC Details |
| 83 | None | https://github.com/Sebastianbedoya25/CVE-2021-3156 | POC Details |
| 84 | This repository contains a Proof-of-Concept (PoC) exploit for the Baron Samedit vulnerability (CVE-2021-3156). The exploit demonstrates privilege escalation on Ubuntu 20.04 with sudo version 1.8.31 and glibc version 2.31. It includes an assembly-based exploit, a shared object payload, and a Makefile for automated compilation. | https://github.com/ten-ops/baron-samedit | POC Details |
| 85 | None | https://github.com/Sornphut/CVE-2021-3156-Heap-Based-Buffer-Overflow-in-Sudo-Baron-Samedit- | POC Details |
| 86 | Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character. | https://github.com/projectdiscovery/nuclei-templates/blob/main/code/cves/2021/CVE-2021-3156.yaml | POC Details |
| 87 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E6%93%8D%E4%BD%9C%E7%B3%BB%E7%BB%9F%E6%BC%8F%E6%B4%9E/Linux%20sudo%20%E6%9D%83%E9%99%90%E6%8F%90%E5%8D%87%E6%BC%8F%E6%B4%9E%20CVE-2021-3156.md | POC Details |
| 88 | None | https://github.com/shishirpandey18/CVE-2021-3156 | POC Details |
| 89 | None | https://github.com/duongdz96/CVE-2021-3156-main | POC Details |
| 90 | None | https://github.com/Shuhaib88/Baron-Samedit-Heap-Buffer-Overflow-CVE-2021-3156 | POC Details |
| 91 | None | https://github.com/Superliverbun/cve-2021-3156- | POC Details |
| 92 | CVE-2021-3156-Exploit-Demo | https://github.com/TopskiyPavelQwertyGang/Review.CVE-2021-3156 | POC Details |
| 93 | Exploit para explotar la vulnerabilidad CVE-2021-3156. | https://github.com/Maalfer/Sudo-CVE-2021-3156 | POC Details |
| 94 | A research regarding the exisiting CVE exploit : CVE-2021-3156(Sudo BufferOverflow) | https://github.com/HuzaifaTariqAfzalKhan/CVE-Exploit-Research-Development-ITSOLERA | POC Details |
| 95 | Projeto educacional desenvolvido em Python com foco na análise da vulnerabilidade CVE-2021-3156 (Baron Samedit), uma falha crítica no sudo que permitia elevação de privilégio local em sistemas Linux. | https://github.com/VilmarTuminskii/cve-2021-3156-sudo-lab | POC Details |
No public POC found.
Login to generate AI POCNo comments yet