Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | A script to automate privilege escalation with CVE-2023-22809 vulnerability | https://github.com/n3m1dotsys/CVE-2023-22809-sudoedit-privesc | POC Details |
| 2 | None | https://github.com/M4fiaB0y/CVE-2023-22809 | POC Details |
| 3 | CVE-2023-22809 Linux Sudo | https://github.com/CKevens/CVE-2023-22809-sudo-POC | POC Details |
| 4 | None | https://github.com/hello4r1end/patch_CVE-2023-22809 | POC Details |
| 5 | Analysis & Exploit | https://github.com/Chan9Yan9/CVE-2023-22809 | POC Details |
| 6 | None | https://github.com/pashayogi/CVE-2023-22809 | POC Details |
| 7 | None | https://github.com/asepsaepdin/CVE-2023-22809 | POC Details |
| 8 | Running this exploit on a vulnerable system allows a local attacker to gain a root shell on the machine. | https://github.com/Toothless5143/CVE-2023-22809 | POC Details |
| 9 | A script to automate privilege escalation with CVE-2023-22809 vulnerability | https://github.com/n3m1sys/CVE-2023-22809-sudoedit-privesc | POC Details |
| 10 | CVE-2023-22809 Linux Sudo | https://github.com/3yujw7njai/CVE-2023-22809-sudo-POC | POC Details |
| 11 | None | https://github.com/AntiVlad/CVE-2023-22809 | POC Details |
| 12 | Sudo Privilege Escalation: CVE-2023-22809 Simulation This project simulates the Sudo privilege escalation vulnerability (CVE-2023-22809) to demonstrate how unauthorized root access can be gained. It involves identifying and exploiting this vulnerability in a controlled environment using Parrot OS, the Sudo command, and Bash scripting. | https://github.com/laxmiyamkolu/SUDO-privilege-escalation | POC Details |
| 13 | None | https://github.com/D0rDa4aN919/CVE-2023-22809-Exploiter | POC Details |
| 14 | CVE-2023-22809 Linux Sudo | https://github.com/AiK1d/CVE-2023-22809-sudo-POC | POC Details |
| 15 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E6%93%8D%E4%BD%9C%E7%B3%BB%E7%BB%9F%E6%BC%8F%E6%B4%9E/Linux%20sudo%20%E6%9D%83%E9%99%90%E6%8F%90%E5%8D%87%E6%BC%8F%E6%B4%9E%20CVE-2023-22809.md | POC Details |
| 16 | automatically exploit the sudoedit vulnerability fo CVE-2023-22809 | https://github.com/spidoman/CVE-2023-22809-automated-python-exploits | POC Details |
| 17 | Automates vulnerability check for sudo versions and privilege escalation via sudoedit if exploitable, helping users test and gain root access. | https://github.com/Spydomain/CVE-2023-22809-automated-python-exploits | POC Details |
| 18 | CVE-2023-22809 Linux Sudo | https://github.com/P4x1s/CVE-2023-22809-sudo-POC | POC Details |
| 19 | Implementation of the CVE-2023-22809 | https://github.com/ValeuDoamne/CVE-2023-22809 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet