Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | Kernel | Kernel prior to 6.4-rc1 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel. | https://github.com/ysanatomic/io_uring_LPE-CVE-2023-2598 | POC Details |
| 2 | None | https://github.com/cainiao159357/CVE-2023-2598 | POC Details |
| 3 | None | https://github.com/LLfam/CVE-2023-2598 | POC Details |
| 4 | The exploitation of CVE-2023-2598 about io_uring | https://github.com/SpongeBob-369/CVE-2023-2598 | POC Details |
| 5 | 复现文章网上很多师傅有写,这里就不献丑了,本exploit交互使用的代码是kernel提供的做小改动,由于漏洞提供的原语比较强大,都能直接越界任意写一张内存页以上的空间,所以利用手法比较简单实用,选用的size是4k页大小,直接堆喷filp篡改/etc/passwd | https://github.com/guard-wait/CVE-2023-2598_EXP | POC Details |
No public POC found.
Login to generate AI POCNo comments yet