Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux 7 | - | cpe:/o:redhat:enterprise_linux:7 | |
| Red Hat | Red Hat Enterprise Linux 8 | - | cpe:/o:redhat:enterprise_linux:8 | |
| Red Hat | Red Hat Enterprise Linux 9 | - | cpe:/o:redhat:enterprise_linux:9 |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/iamgithubber/CVE-2025-6018-19-exploit | POC Details |
| 2 | Exploit for CVE-2025-6019 | https://github.com/dreysanox/CVE-2025-6018_Poc | POC Details |
| 3 | CVE-2025-6018 Poc and Exploit | https://github.com/ibrahmsql/CVE-2025-6018 | POC Details |
| 4 | CVE-2025-6018 | https://github.com/B1ack4sh/Blackash-CVE-2025-6018 | POC Details |
| 5 | CVE-2025-6018 | https://github.com/Ashwesker/Blackash-CVE-2025-6018 | POC Details |
| 6 | None | https://github.com/euxem/Analyse-faille-de-s-curit-CVE-2025-6018-CVE-2025-6019 | POC Details |
| 7 | CVE-2025-6018 | https://github.com/Ashwesker/Ashwesker-CVE-2025-6018 | POC Details |
| 8 | This is just a quick note on how to exploit these vulnerabilities to get root. | https://github.com/AzureADTrent/CVE-2025-6018-and-CVE-2025-6019-Privilege-Escalation | POC Details |
| 9 | CVE-2025-6018 + CVE-2025-6019 Privilege Escalation Exploit | https://github.com/muyuanlove/CVE-2025-6018-CVE-2025-6019-Privilege-Escalation-Exploit | POC Details |
| 10 | Exploit Chain of CVE-2025-6018 to CVE-2025-6019 | https://github.com/0rionCollector/Exploit-Chain-CVE-2025-6018-6019 | POC Details |
| 11 | A Proof of Concept for chaining CVE-2025-6018 (PAM/Polkit Active Session Bypass) and CVE-2025-6019 (libblockdev SUID Mount Flaw) to achieve Local Privilege Escalation (LPE) on vulnerable Linux systems. | https://github.com/MichaelVenturella/CVE-2025-6018-6019-PoC | POC Details |
| 12 | Auto exploit for CVE-2025-6018 & CVE-2025-6019 based on https://github.com/0rionCollector/Exploit-Chain-CVE-2025-6018-6019 | https://github.com/Goultarde/CVE-2025-6018_CVE-2025-6019_autopwn | POC Details |
| 13 | CVE-2025-6018 (pam LPE unpriv->allow_active), CVE-2025-6019 (udisks LPE allow_active->root) in sh | https://github.com/matesz44/CVE-2025-6018-19 | POC Details |
| 14 | CVE-2025-6018 CVE-2025-6019 PoC Exploit - Local Privilege Escalation in openSUSE/SUSE Linux Enterprise 15 - PAM bypass + udisks2 XFS race condition LPE to root | https://github.com/DesertDemons/CVE-2025-6018-6019 | POC Details |
| 15 | Vulnerability chaining leads to privilege escalation | https://github.com/localh0ste/CVE-2025-6018-and-CVE-2025-6019 | POC Details |
| 16 | Privilege escalation exploit chain (CVE-2025-6018 + CVE-2025-6019) for openSUSE Leap 15.6 | https://github.com/MaxKappa/opensuse-leap-privesc-exploit | POC Details |
| 17 | None | https://github.com/iOxsec/CVE-2025-6018-CVE-2025-6019-Privilege-Escalation-Exploit | POC Details |
No public POC found.
Login to generate AI POCZaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.