Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux 8 | 0:2.28-225.el8_8.6 ~ * | cpe:/a:redhat:enterprise_linux:8::appstream | |
| Red Hat | Red Hat Enterprise Linux 8 | 0:2.28-225.el8_8.6 ~ * | cpe:/a:redhat:enterprise_linux:8::appstream | |
| Red Hat | Red Hat Enterprise Linux 8.6 Extended Update Support | 0:2.28-189.6.el8_6 ~ * | cpe:/o:redhat:rhel_eus:8.6::baseos | |
| Red Hat | Red Hat Enterprise Linux 9 | 0:2.34-60.el9_2.7 ~ * | cpe:/a:redhat:enterprise_linux:9::appstream | |
| Red Hat | Red Hat Enterprise Linux 9 | 0:2.34-60.el9_2.7 ~ * | cpe:/a:redhat:enterprise_linux:9::appstream | |
| Red Hat | Red Hat Enterprise Linux 9.0 Extended Update Support | 0:2.34-28.el9_0.4 ~ * | cpe:/a:redhat:rhel_eus:9.0::appstream | |
| Red Hat | Red Hat Virtualization 4 for Red Hat Enterprise Linux 8 | 0:2.28-189.6.el8_6 ~ * | cpe:/o:redhat:rhel_eus:8.6::baseos | |
| Red Hat | Red Hat Virtualization 4 for Red Hat Enterprise Linux 8 | 0:4.5.3-10.el8ev ~ * | cpe:/o:redhat:rhev_hypervisor:4.4::el8 | |
| Red Hat | Red Hat Virtualization 4 for Red Hat Enterprise Linux 8 | 0:4.5.3-202312060823_8.6 ~ * | cpe:/o:redhat:rhev_hypervisor:4.4::el8 | |
| Red Hat | Red Hat Enterprise Linux 6 | - | cpe:/o:redhat:enterprise_linux:6 | |
| Red Hat | Red Hat Enterprise Linux 7 | - | cpe:/o:redhat:enterprise_linux:7 | |
| Red Hat | Red Hat Enterprise Linux 7 | - | cpe:/o:redhat:enterprise_linux:7 |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt | https://github.com/Green-Avocado/CVE-2023-4911 | POC Details |
| 2 | PoC for CVE-2023-4911 | https://github.com/leesh3288/CVE-2023-4911 | POC Details |
| 3 | CVE-2023-4911 proof of concept | https://github.com/RickdeJager/CVE-2023-4911 | POC Details |
| 4 | None | https://github.com/xiaoQ1z/CVE-2023-4911 | POC Details |
| 5 | CVE-2023-4911 | https://github.com/silent6trinity/looney-tuneables | POC Details |
| 6 | None | https://github.com/hadrian3689/looney-tunables-CVE-2023-4911 | POC Details |
| 7 | CVE-2023-4911 | https://github.com/ruycr4ft/CVE-2023-4911 | POC Details |
| 8 | PoC for CVE-2023-4911 LooneyTuneables | https://github.com/guffre/CVE-2023-4911 | POC Details |
| 9 | Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions. | https://github.com/chaudharyarjun/LooneyPwner | POC Details |
| 10 | Looney Tunables Local privilege escalation (CVE-2023-4911) workshop | https://github.com/KernelKrise/CVE-2023-4911 | POC Details |
| 11 | Proof of concept for CVE-2023-4911 (Looney Tunables) discovered by Qualys Threat Research Unit | https://github.com/Diego-AltF4/CVE-2023-4911 | POC Details |
| 12 | Looney Tunables CVE-2023-4911 | https://github.com/teraGL/looneyCVE | POC Details |
| 13 | PoC of CVE-2023-4911 | https://github.com/snurkeburk/Looney-Tunables | POC Details |
| 14 | None | https://github.com/puckiestyle/CVE-2023-4911 | POC Details |
| 15 | None | https://github.com/yanfernandess/Looney-Tunables-CVE-2023-4911 | POC Details |
| 16 | Repository containing a Proof of Concept (PoC) demonstrating the impact of CVE-2023-4911, a vulnerability in glibc's ld.so dynamic loader, exposing risks related to Looney Tunables. | https://github.com/NishanthAnand21/CVE-2023-4911-PoC | POC Details |
| 17 | PoC for CVE-2023-4911 | https://github.com/xem6/CVE-2023-4911 | POC Details |
| 18 | CVE-2023-4911-Looney-Tunables | https://github.com/Billar42/CVE-2023-4911 | POC Details |
| 19 | None | https://github.com/dungNHVhust/CVE-2023-4911 | POC Details |
| 20 | CVE-2023-4911 exploit | https://github.com/shacojx/CVE-2023-4911-Exploit | POC Details |
| 21 | None | https://github.com/KillReal01/CVE-2023-4911 | POC Details |
| 22 | A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges. | https://github.com/projectdiscovery/nuclei-templates/blob/main/code/cves/2023/CVE-2023-4911.yaml | POC Details |
| 23 | None | https://github.com/RRespxwnss/Looney-Tunables-CVE-2023-4911 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet