尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Meta Platforms, Inc | below | 0.0.0 ~ 0.9.0 | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | CVE-2025-27591 | https://github.com/obamalaolu/CVE-2025-27591 | POC详情 |
| 2 | Below v0.8.1 - Local Privilege Escalation (CVE-2025-27591) - PoC Exploit | https://github.com/rvizx/CVE-2025-27591 | POC详情 |
| 3 | CVE-2025-27591 is a privilege escalation vulnerability that affected the Below service before version 0.9.0 | https://github.com/BridgerAlderson/CVE-2025-27591-PoC | POC详情 |
| 4 | CVE-2025-27591 | https://github.com/DarksBlackSk/CVE-2025-27591 | POC详情 |
| 5 | CVE-2025-27591 is a known privilege escalation vulnerability in the Below service (version < v0.9.0) | https://github.com/dollarboysushil/Linux-Privilege-Escalation-CVE-2025-27591 | POC详情 |
| 6 | None | https://github.com/alialucas7/CVE-2025-27591_PoC | POC详情 |
| 7 | A Proof of Concept for CVE-2025-27591, a local privilege escalation in Below ≤ v0.8.1 | https://github.com/incommatose/CVE-2025-27591-PoC | POC详情 |
| 8 | 🔥 Local Privilege Escalation Exploit for CVE-2025-27591 | Abuses world-writable log dir in Below to gain root via /etc/passwd injection | https://github.com/00xCanelo/CVE-2025-27591 | POC详情 |
| 9 | None | https://github.com/Thekin-ctrl/CVE-2025-27591-Below | POC详情 |
| 10 | a C exploit for CVE-2025-27591, which allow an attacker to escalate privilege to root. | https://github.com/Cythonic1/CVE-2025-27591 | POC详情 |
| 11 | Below <v0.9.0 PoC Privilege Escalation Exploit | https://github.com/umutcamliyurt/CVE-2025-27591 | POC详情 |
| 12 | PoC for CVE-2025-27591 – Local privilege escalation in the below monitoring tool. By symlinking its log file to /etc/passwd, an attacker can inject a root account and gain full system compromise. | https://github.com/danil-koltsov/below-log-race-poc | POC详情 |
| 13 | Local Privilege Escalation vai `below` (CVE-2025-27591) - PoC Exploit | https://github.com/HOEUN-Visai/CVE-2025-27591-below- | POC详情 |
| 14 | CVE-2025-27591 | https://github.com/krn966/CVE-2025-27591 | POC详情 |
| 15 | A Bash-based privilege escalation exploit targeting the `below` system performance monitoring tool. This refurbished exploit leverages a symlink vulnerability in the logging mechanism to inject a root user into `/etc/passwd`, achieving full root access. | https://github.com/0xDTC/Below-Logger-Symlink-Attack_CVE-2025-27591 | POC详情 |
| 16 | self cleaning CVE-2025-27591 Poc that grants a root reverse shell instead of modifying passwd files | https://github.com/0x00Jeff/CVE-2025-27591 | POC详情 |
| 17 | Local Privilege Escalation vai `below` (CVE-2025-27591) - PoC Exploit | https://github.com/VisaiCyber/CVE-2025-27591-below- | POC详情 |
| 18 | Exploit for CVE-2025-27591 (for educational purposes) | https://github.com/Stp1t/CVE-2025-27591 | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论