尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux 7 | - | cpe:/o:redhat:enterprise_linux:7 | |
| Red Hat | Red Hat Enterprise Linux 8 | - | cpe:/o:redhat:enterprise_linux:8 | |
| Red Hat | Red Hat Enterprise Linux 9 | - | cpe:/o:redhat:enterprise_linux:9 |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | None | https://github.com/iamgithubber/CVE-2025-6018-19-exploit | POC详情 |
| 2 | Exploit for CVE-2025-6019 | https://github.com/dreysanox/CVE-2025-6018_Poc | POC详情 |
| 3 | CVE-2025-6018 Poc and Exploit | https://github.com/ibrahmsql/CVE-2025-6018 | POC详情 |
| 4 | CVE-2025-6018 | https://github.com/B1ack4sh/Blackash-CVE-2025-6018 | POC详情 |
| 5 | CVE-2025-6018 | https://github.com/Ashwesker/Blackash-CVE-2025-6018 | POC详情 |
| 6 | None | https://github.com/euxem/Analyse-faille-de-s-curit-CVE-2025-6018-CVE-2025-6019 | POC详情 |
| 7 | CVE-2025-6018 | https://github.com/Ashwesker/Ashwesker-CVE-2025-6018 | POC详情 |
| 8 | This is just a quick note on how to exploit these vulnerabilities to get root. | https://github.com/AzureADTrent/CVE-2025-6018-and-CVE-2025-6019-Privilege-Escalation | POC详情 |
| 9 | CVE-2025-6018 + CVE-2025-6019 Privilege Escalation Exploit | https://github.com/muyuanlove/CVE-2025-6018-CVE-2025-6019-Privilege-Escalation-Exploit | POC详情 |
| 10 | Exploit Chain of CVE-2025-6018 to CVE-2025-6019 | https://github.com/0rionCollector/Exploit-Chain-CVE-2025-6018-6019 | POC详情 |
| 11 | A Proof of Concept for chaining CVE-2025-6018 (PAM/Polkit Active Session Bypass) and CVE-2025-6019 (libblockdev SUID Mount Flaw) to achieve Local Privilege Escalation (LPE) on vulnerable Linux systems. | https://github.com/MichaelVenturella/CVE-2025-6018-6019-PoC | POC详情 |
| 12 | Auto exploit for CVE-2025-6018 & CVE-2025-6019 based on https://github.com/0rionCollector/Exploit-Chain-CVE-2025-6018-6019 | https://github.com/Goultarde/CVE-2025-6018_CVE-2025-6019_autopwn | POC详情 |
| 13 | CVE-2025-6018 (pam LPE unpriv->allow_active), CVE-2025-6019 (udisks LPE allow_active->root) in sh | https://github.com/matesz44/CVE-2025-6018-19 | POC详情 |
| 14 | CVE-2025-6018 CVE-2025-6019 PoC Exploit - Local Privilege Escalation in openSUSE/SUSE Linux Enterprise 15 - PAM bypass + udisks2 XFS race condition LPE to root | https://github.com/DesertDemons/CVE-2025-6018-6019 | POC详情 |
| 15 | Vulnerability chaining leads to privilege escalation | https://github.com/localh0ste/CVE-2025-6018-and-CVE-2025-6019 | POC详情 |
| 16 | Privilege escalation exploit chain (CVE-2025-6018 + CVE-2025-6019) for openSUSE Leap 15.6 | https://github.com/MaxKappa/opensuse-leap-privesc-exploit | POC详情 |
| 17 | None | https://github.com/iOxsec/CVE-2025-6018-CVE-2025-6019-Privilege-Escalation-Exploit | POC详情 |
未找到公开 POC。
登录以生成 AI POCZaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.