尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Sudo project | Sudo | 1.9.14 ~ 1.9.17p1 | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Escalation of Privilege to the root through sudo binary with chroot option. CVE-2025-32463 | https://github.com/pr0v3rbs/CVE-2025-32463_chwoot | POC详情 |
| 2 | None | https://github.com/4f-kira/CVE-2025-32463 | POC详情 |
| 3 | CVE-2025-32463 Proof of concept | https://github.com/K1tt3h/CVE-2025-32463-POC | POC详情 |
| 4 | None | https://github.com/Adonijah01/cve-2025-32463-lab | POC详情 |
| 5 | None | https://github.com/SysMancer/CVE-2025-32463 | POC详情 |
| 6 | Local Privilege Escalation to Root via Sudo chroot in Linux | https://github.com/kh4sh3i/CVE-2025-32463 | POC详情 |
| 7 | None | https://github.com/neko205-mx/CVE-2025-32463_Exploit | POC详情 |
| 8 | Exploit for Local Privilege Escalation in Sudo via Malicious nsswitch.conf with sudo -R. (CVE-2025-32463) | https://github.com/pevinkumar10/CVE-2025-32463 | POC详情 |
| 9 | None | https://github.com/zhaduchanhzz/CVE-2025-32463_POC | POC详情 |
| 10 | None | https://github.com/robbert1978/CVE-2025-32463_POC | POC详情 |
| 11 | Sudo Local Privilege Escalation CVE-2025-32463 (Best For Cases Where the shell is not stable to spawn a new root shell) | https://github.com/Mikivirus0/sudoinjection | POC详情 |
| 12 | Sudo chroot privileged escalation PoC | https://github.com/nflatrea/CVE-2025-32463 | POC详情 |
| 13 | None | https://github.com/san8383/CVE-2025-32463 | POC详情 |
| 14 | None | https://github.com/0xAkarii/CVE-2025-32463 | POC详情 |
| 15 | Mr.CIA's manual patching guide for CVE-2025-32463 (Sudo local privilege escalation) on Kali Linux and Ubuntu WSL. | https://github.com/CIA911/sudo_patch_CVE-2025-32463 | POC详情 |
| 16 | PoC for CVE-2025-32463 - Sudo chroot Elevation of Privilege Vulnerability | https://github.com/mirchr/CVE-2025-32463-sudo-chwoot | POC详情 |
| 17 | Privilege escalation exploit for CVE-2025-32463 using a malicious NSS module injected via sudo -R. This version creates a stealth payload called illdeed, granting root access through a controlled chroot environment. | https://github.com/ill-deed/CVE-2025-32463_illdeed | POC详情 |
| 18 | # CVE-2025-32463 – Sudo EoP Exploit (PoC) with precompiled .so | https://github.com/zinzloun/CVE-2025-32463 | POC详情 |
| 19 | Demonstrate CVE-2025-32463 with this PoC for sudo's chroot feature. Explore the exploit and its impact on vulnerable sudo versions. 🐱💻🔒 | https://github.com/yeremeu/CVE-2025-32463_chwoot | POC详情 |
| 20 | 🛡️ Proof of Concept (PoC) for CVE-2025-32463 — Local privilege escalation in sudo (versions 1.9.14 to 1.9.17). This exploit abuses the --chroot option and a malicious nsswitch.conf to execute arbitrary code as root. ⚠️ For educational and authorized testing only. | https://github.com/cyberpoul/CVE-2025-32463-POC | POC详情 |
| 21 | CVE-2025-32463 | https://github.com/B1ack4sh/Blackash-CVE-2025-32463 | POC详情 |
| 22 | Local privilege escalation vulnerability CVE-2025-32463 in Sudo allows users to gain root access. Discover details and solutions on GitHub! 🐙✨ | https://github.com/SkylerMC/CVE-2025-32463 | POC详情 |
| 23 | Linux distributions: Affects Ubuntu, Debian, Fedora, CentOS, SUSE, Amazon Linux, and others shipping sudo v1.9.14–1.9.17 | https://github.com/junxian428/CVE-2025-32463 | POC详情 |
| 24 | Proof of Concept for CVE-2025-32463 Local privilege escalation exploit targeting sudo -R on vulnerable Linux systems. For educational and authorized security testing only. | https://github.com/FreeDurok/CVE-2025-32463-PoC | POC详情 |
| 25 | None | https://github.com/Chocapikk/CVE-2025-32463-lab | POC详情 |
| 26 | A PoC exploit for CVE-2025-32463 - Sudo Privilege Escalation | https://github.com/K3ysTr0K3R/CVE-2025-32463-EXPLOIT | POC详情 |
| 27 | # cve-2025-32463 - Local Privilege Escalation to Root via Sudo chroot in Linux | https://github.com/SpongeBob-369/cve-2025-32463 | POC详情 |
| 28 | None | https://github.com/lowercasenumbers/CVE-2025-32463_sudo_chroot | POC详情 |
| 29 | PoC for CVE-2025-32463: Local privilege escalation in sudo via --chroot. Exploits NSS module injection through crafted chroot environments. Designed for security researchers and lab-only environments. | https://github.com/abrewer251/CVE-2025-32463_Sudo_PoC | POC详情 |
| 30 | None | https://github.com/0xb0rn3/CVE-2025-32463-EXPLOIT | POC详情 |
| 31 | Rust PoC for CVE-2025-32463 (sudo chroot "chwoot" Local PrivEsc) | https://github.com/morgenm/sudo-chroot-CVE-2025-32463 | POC详情 |
| 32 | Privilege escalation to root using sudo chroot, NO NEED for gcc installed. | https://github.com/MohamedKarrab/CVE-2025-32463 | POC详情 |
| 33 | Educational Docker lab to simulate privilege escalation via CVE-2025-32463 | https://github.com/dbarquero/cve-2025-32463-lab | POC详情 |
| 34 | CVE-2025-32463 漏洞概念验证 | https://github.com/9Insomnie/CVE-2025-32463 | POC详情 |
| 35 | None | https://github.com/krypton-0x00/CVE-2025-32463-Chwoot-POC | POC详情 |
| 36 | None | https://github.com/Floodnut/CVE-2025-32463 | POC详情 |
| 37 | Privilege escalation to root via sudo without gcc. Exploit works on vulnerable sudo versions. Clone the repo and run the script. 🐙💻 | https://github.com/92gmuz/CVE-2025-32463 | POC详情 |
| 38 | This is the exploit for the CVE-2025-32463 | https://github.com/Rajneeshkarya/CVE-2025-32463 | POC详情 |
| 39 | Local Privilege Escalation to Root via Sudo chroot in Linux | https://github.com/MGunturG/CVE-2025-32463 | POC详情 |
| 40 | End-to-end simulation of a Python dependency confusion attack, sudo privilege escalation (CVE-2025-32463), and rootkit-based persistence - with full memory and network forensic analysis. | https://github.com/IC3-512/linux-root-kit | POC详情 |
| 41 | None | https://github.com/daryllundy/CVE-2025-32463 | POC详情 |
| 42 | A deep dive into two critical Sudo vulnerabilities (CVE‑2025‑32463 & CVE‑2025‑32462) that enable local privilege escalation across major Linux distributions. | https://github.com/AdityaBhatt3010/Sudo-Privilege-Escalation-Linux-CVE-2025-32463-and-CVE-2025-32462 | POC详情 |
| 43 | CVE-2025-32463 | https://github.com/ChetanKomal/sudo_exploit | POC详情 |
| 44 | CVE-2025-32463 - Sudo Chroot Privilege Escalation Exploit | https://github.com/KaiHT-Ladiant/CVE-2025-32463 | POC详情 |
| 45 | 本项目基于 Docker 搭建了一个用于复现和测试 sudo 本地权限提升漏洞 CVE-2025-32463 的实验环境。 | https://github.com/y4ney/CVE-2025-32463-lab | POC详情 |
| 46 | Questo script è un proof of concept (PoC) che dimostra una tecnica di privilege escalation (Elevazione di privilegi) sfruttando una vulnerabilità teorica di sudo (es. CVE-2025-32463). Il PoC forza sudo a caricare una libreria .so manipolata sfruttando la funzionalità -R (chroot) e la configurazione personalizzata di NSS (nsswitch.conf). | https://github.com/aldoClau98/CVE-2025-32463 | POC详情 |
| 47 | None | https://github.com/painoob/CVE-2025-32463 | POC详情 |
| 48 | This CVE addresses a vulnerability in sudo versions 1.9.14 to 1.9.17, enabling unauthorized local privilege escalation to root access. | https://github.com/Nowafen/CVE-2025-32463 | POC详情 |
| 49 | POC for CVE-2025-32463 sudo_chwoot | https://github.com/Yuy0ung/CVE-2025-32463_chwoot | POC详情 |
| 50 | None | https://github.com/hacieda/CVE-2025-32463 | POC详情 |
| 51 | None | https://github.com/blackcat4347/CVE-2025-32463_PoC | POC详情 |
| 52 | 🔍 Demonstrate the CVE-2025-32463 privilege-escalation flaw in sudo's chroot feature with this minimal, reproducible proof of concept environment. | https://github.com/ashardev002/CVE-2025-32463_chwoot | POC详情 |
| 53 | None | https://github.com/mihnasdsad/CVE-2025-32463 | POC详情 |
| 54 | Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option. | https://github.com/At0mXploit/CVE-2025-32463 | POC详情 |
| 55 | 🔒 Elevate privileges to root via sudo without requiring gcc on the target system. Simplify exploit execution with pre-compiled payloads. | https://github.com/no-speech-to-text/CVE-2025-32463 | POC详情 |
| 56 | 🐳 Reproduce and test the CVE-2025-32463 vulnerability in a Docker-based lab environment for security research and practical analysis. | https://github.com/DaadaAyoze/CVE-2025-32463-lab | POC详情 |
| 57 | This repository contains a Proof of Concept (PoC) for CVE-2025-32463, a vulnerability in sudo allowing a chroot escape to achieve local privilege escalation. | https://github.com/nelissandro/CVE-2025-32463-Sudo-Chroot-Escape | POC详情 |
| 58 | None | https://github.com/7r00t/cve-2025-32463-lab | POC详情 |
| 59 | A Python exploit for CVE-2025-32463, a critical local privilege escalation vulnerability in the Sudo binary on Linux systems. This flaw allows local users to obtain root access by exploiting the --chroot option, which incorrectly uses /etc/nsswitch.conf from a user-controlled directory. | https://github.com/AC8999/CVE-2025-32463 | POC详情 |
| 60 | None | https://github.com/onniio/CVE-2025-32463 | POC详情 |
| 61 | # CVE-2025-32463 – Sudo EoP Exploit (PoC) with precompiled .so | https://github.com/khoazero123/CVE-2025-32463 | POC详情 |
| 62 | This repository contains an exploit script for CVE-2025-32463, a local privilege escalation involving `chroot` behavior in affected `sudo` versions (1.9.14 through 1.9.17) | https://github.com/r3dBust3r/CVE-2025-32463 | POC详情 |
| 63 | sudo --chroot exploit | https://github.com/0x3c4dfa1/CVE-2025-32463 | POC详情 |
| 64 | Enviroment and Nuclei template to test CVE-2025-32463 | https://github.com/ricardomaia/CVE-2025-32463 | POC详情 |
| 65 | - Vulnerable: sudo 1.9.14, 1.9.15, 1.9.16, 1.9.17 - Patched in: sudo 1.9.17p1 and later - Legacy versions older than 1.9.14 are not affected, as they don't support the --chroot option. | https://github.com/shazed-x/CVE-2025-32463 | POC详情 |
| 66 | None | https://github.com/cybershaolin47/CVE-2025-32463_POC | POC详情 |
| 67 | Privilege escalation to root using sudo chroot, NO NEED for gcc installed. | https://github.com/cyberajju/CVE-2025-32463 | POC详情 |
| 68 | Sudo Vulnerability Local PrivEsc (CVE-2025-32463) POC with Python | https://github.com/dr4x-c0d3r/sudo-chroot | POC详情 |
| 69 | Sudo Vulnerability Local PrivEsc (CVE-2025-32463) POC with Python | https://github.com/dr4xp/sudo-chroot | POC详情 |
| 70 | None | https://github.com/robbin0919/CVE-2025-32463 | POC详情 |
| 71 | CVE‑2025‑32463 | https://github.com/DensuLabs/CVE-2025-32463 | POC详情 |
| 72 | This repository contains a Proof of Concept (PoC) for CVE-2025-32463, a vulnerability in sudo allowing a chroot escape to achieve local privilege escalation. | https://github.com/D3ltaFormation/CVE-2025-32463-Sudo-Chroot-Escape | POC详情 |
| 73 | Technical examination of CVE-2025-32463 by Muhammed Kaya. | https://github.com/muhammedkayag/CVE-2025-32463 | POC详情 |
| 74 | exploit | https://github.com/NewComrade12211/CVE-2025-32463 | POC详情 |
| 75 | None | https://github.com/Ghstxz/CVE-2025-32463 | POC详情 |
| 76 | Practical security research project exploiting CVE-2025-32463 to gain root access on a vulnerable sudo version. Includes write-up, PoC, and mitigation steps. | https://github.com/ankitpandey383/CVE-2025-32463-Sudo-Privilege-Escalation | POC详情 |
| 77 | Chroot Privilege Escalation | https://github.com/justjoeyking/CVE-2025-32463 | POC详情 |
| 78 | CVE-2025-32463 | https://github.com/Ashwesker/Blackash-CVE-2025-32463 | POC详情 |
| 79 | Privilege escalation to root using sudo chroot, NO NEED for gcc installed. | https://github.com/cybertechajju/CVE-2025-32463 | POC详情 |
| 80 | None | https://github.com/Mr-Alperen/CVE-2025-32463 | POC详情 |
| 81 | CVE-2025-32463 | https://github.com/Ashwesker/Ashwesker-CVE-2025-32463 | POC详情 |
| 82 | None | https://github.com/aexdyhaxor/CVE-2025-32463 | POC详情 |
| 83 | Proof of Concept (PoC) Escalada de privilegios por versión de Sudo. | https://github.com/wvverez/CVE-2025-32463 | POC详情 |
| 84 | 🛡️ Proof of Concept (PoC) for CVE-2025-32463 — Local privilege escalation in sudo (versions 1.9.14 to 1.9.17). This exploit abuses the --chroot option and a malicious nsswitch.conf to execute arbitrary code as root. ⚠️ For educational and authorized testing only. | https://github.com/0p5cur/CVE-2025-32463-POC | POC详情 |
| 85 | CVE-2025-32463 | https://github.com/gmh5225/Blackash-CVE-2025-32463 | POC详情 |
| 86 | CVE-2025-32463 | https://github.com/SpycioKon/CVE-2025-32463 | POC详情 |
| 87 | C reimplementation of chwoot PoC | https://github.com/vpr-labs/CVE-2025-32463 | POC详情 |
| 88 | None | https://github.com/danilo1992-sys/CVE-2025-32463 | POC详情 |
| 89 | Sudo before 1.9.17p1 allows local users to obtain root access by using /etc/nsswitch.conf from a user-controlled directory with the --chroot (-R) option. | https://github.com/projectdiscovery/nuclei-templates/blob/main/code/cves/2025/CVE-2025-32463.yaml | POC详情 |
未找到公开 POC。
登录以生成 AI POCZaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.