Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04) | https://github.com/MaherAzzouzi/CVE-2022-37706-LPE-exploit | POC Details |
| 2 | All Credit to MaherAzzouzi (https://github.com/MaherAzzouzi/CVE-2022-37706-LPE-exploit). This is a copy of the exploit for CTFs | https://github.com/ECU-10525611-Xander/CVE-2022-37706 | POC Details |
| 3 | None | https://github.com/GrayHatZone/CVE-2022-37706-LPE-exploit | POC Details |
| 4 | Exploit created by nu11secur1ty (https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2022-37706) | https://github.com/junnythemarksman/CVE-2022-37706 | POC Details |
| 5 | The exploit is tested on Ubuntu 22.04 | https://github.com/AleksPwn/CVE-2022-37706 | POC Details |
| 6 | CVE-2022-37706-Enlightenment v0.25.3 - Privilege escalation | https://github.com/TACTICAL-HACK/CVE-2022-37706-SUID | POC Details |
| 7 | PoC | https://github.com/sanan2004/CVE-2022-37706 | POC Details |
| 8 | None | https://github.com/KaoXx/CVE-2022-37706 | POC Details |
| 9 | Privilege escaltion exploit script for Boardlight machine on HackTheBox. I had access as the Larissa user and ran this script from the /tmp directory; script has been adjusted accordingly. | https://github.com/d3ndr1t30x/CVE-2022-37706 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet