1 |
https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt |
https://github.com/Green-Avocado/CVE-2023-4911 |
POC详情
|
2 |
PoC for CVE-2023-4911 |
https://github.com/leesh3288/CVE-2023-4911 |
POC详情
|
3 |
CVE-2023-4911 proof of concept |
https://github.com/RickdeJager/CVE-2023-4911 |
POC详情
|
4 |
None |
https://github.com/xiaoQ1z/CVE-2023-4911 |
POC详情
|
5 |
CVE-2023-4911 |
https://github.com/silent6trinity/looney-tuneables |
POC详情
|
6 |
None |
https://github.com/hadrian3689/looney-tunables-CVE-2023-4911 |
POC详情
|
7 |
CVE-2023-4911 |
https://github.com/ruycr4ft/CVE-2023-4911 |
POC详情
|
8 |
PoC for CVE-2023-4911 LooneyTuneables |
https://github.com/guffre/CVE-2023-4911 |
POC详情
|
9 |
Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions. |
https://github.com/chaudharyarjun/LooneyPwner |
POC详情
|
10 |
Looney Tunables Local privilege escalation (CVE-2023-4911) workshop |
https://github.com/KernelKrise/CVE-2023-4911 |
POC详情
|
11 |
Proof of concept for CVE-2023-4911 (Looney Tunables) discovered by Qualys Threat Research Unit |
https://github.com/Diego-AltF4/CVE-2023-4911 |
POC详情
|
12 |
Looney Tunables CVE-2023-4911 |
https://github.com/teraGL/looneyCVE |
POC详情
|
13 |
PoC of CVE-2023-4911 |
https://github.com/snurkeburk/Looney-Tunables |
POC详情
|
14 |
None |
https://github.com/puckiestyle/CVE-2023-4911 |
POC详情
|
15 |
None |
https://github.com/yanfernandess/Looney-Tunables-CVE-2023-4911 |
POC详情
|
16 |
Repository containing a Proof of Concept (PoC) demonstrating the impact of CVE-2023-4911, a vulnerability in glibc's ld.so dynamic loader, exposing risks related to Looney Tunables. |
https://github.com/NishanthAnand21/CVE-2023-4911-PoC |
POC详情
|
17 |
PoC for CVE-2023-4911 |
https://github.com/xem6/CVE-2023-4911 |
POC详情
|
18 |
CVE-2023-4911-Looney-Tunables |
https://github.com/Billar42/CVE-2023-4911 |
POC详情
|
19 |
None |
https://github.com/dungNHVhust/CVE-2023-4911 |
POC详情
|
20 |
CVE-2023-4911 exploit |
https://github.com/shacojx/CVE-2023-4911-Exploit |
POC详情
|
21 |
None |
https://github.com/KillReal01/CVE-2023-4911 |
POC详情
|
22 |
A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.
|
https://github.com/projectdiscovery/nuclei-templates/blob/main/code/cves/2023/CVE-2023-4911.yaml |
POC详情
|