2022-03-08 03:17:15 +09:00
[
{
"id" : 467129462 ,
"name" : "CVE-2022-0847" ,
"full_name" : "Udyz\/CVE-2022-0847" ,
"owner" : {
"login" : "Udyz" ,
"id" : 39673284 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/39673284?v=4" ,
"html_url" : "https:\/\/github.com\/Udyz"
} ,
"html_url" : "https:\/\/github.com\/Udyz\/CVE-2022-0847" ,
"description" : "This is the story of CVE-2022-0847, a vulnerability in the Linux kernel since 5.8 which allows overwriting data in arbitrary read-only files. This leads to privilege escalation because unprivileged processes can inject code into root processes." ,
"fork" : false ,
"created_at" : "2022-03-07T14:31:38Z" ,
2022-03-09 03:14:48 +09:00
"updated_at" : "2022-03-08T13:22:07Z" ,
2022-03-08 03:17:15 +09:00
"pushed_at" : "2022-03-07T14:31:39Z" ,
2022-03-09 03:14:48 +09:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
2022-03-08 03:17:15 +09:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2022-03-09 03:14:48 +09:00
"watchers" : 3 ,
2022-03-08 03:17:15 +09:00
"score" : 0
} ,
{
"id" : 467159035 ,
"name" : "CVE-2022-0847" ,
"full_name" : "bbaranoff\/CVE-2022-0847" ,
"owner" : {
"login" : "bbaranoff" ,
"id" : 37385191 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/37385191?v=4" ,
"html_url" : "https:\/\/github.com\/bbaranoff"
} ,
"html_url" : "https:\/\/github.com\/bbaranoff\/CVE-2022-0847" ,
"description" : "CVE-2022-0847" ,
"fork" : false ,
"created_at" : "2022-03-07T15:50:18Z" ,
2022-03-15 03:14:44 +09:00
"updated_at" : "2022-03-14T15:07:23Z" ,
2022-03-08 03:17:15 +09:00
"pushed_at" : "2022-03-07T15:52:23Z" ,
2022-03-15 03:14:44 +09:00
"stargazers_count" : 46 ,
"watchers_count" : 46 ,
2022-03-12 15:14:20 +09:00
"forks_count" : 22 ,
2022-03-08 03:17:15 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-12 15:14:20 +09:00
"forks" : 22 ,
2022-03-15 03:14:44 +09:00
"watchers" : 46 ,
2022-03-08 03:17:15 +09:00
"score" : 0
} ,
{
"id" : 467200755 ,
"name" : "CVE-2022-0847" ,
"full_name" : "xndpxs\/CVE-2022-0847" ,
"owner" : {
"login" : "xndpxs" ,
"id" : 62086766 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/62086766?v=4" ,
"html_url" : "https:\/\/github.com\/xndpxs"
} ,
"html_url" : "https:\/\/github.com\/xndpxs\/CVE-2022-0847" ,
"description" : "Vulnerability in the Linux kernel since 5.8" ,
"fork" : false ,
"created_at" : "2022-03-07T17:51:02Z" ,
2022-03-10 03:17:31 +09:00
"updated_at" : "2022-03-09T15:12:40Z" ,
2022-03-08 03:17:15 +09:00
"pushed_at" : "2022-03-07T17:59:12Z" ,
2022-03-10 03:17:31 +09:00
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
2022-03-09 21:14:39 +09:00
"forks_count" : 5 ,
2022-03-08 03:17:15 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-09 21:14:39 +09:00
"forks" : 5 ,
2022-03-10 03:17:31 +09:00
"watchers" : 5 ,
2022-03-08 03:17:15 +09:00
"score" : 0
2022-03-08 09:14:24 +09:00
} ,
{
"id" : 467215742 ,
"name" : "CVE-2022-0847" ,
"full_name" : "imfiver\/CVE-2022-0847" ,
"owner" : {
"login" : "imfiver" ,
"id" : 21257485 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/21257485?v=4" ,
"html_url" : "https:\/\/github.com\/imfiver"
} ,
"html_url" : "https:\/\/github.com\/imfiver\/CVE-2022-0847" ,
2022-03-08 15:14:29 +09:00
"description" : "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞( Dirty Cow) , 但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”" ,
2022-03-08 09:14:24 +09:00
"fork" : false ,
"created_at" : "2022-03-07T18:36:50Z" ,
2022-03-15 03:14:44 +09:00
"updated_at" : "2022-03-14T18:02:47Z" ,
2022-03-09 21:14:39 +09:00
"pushed_at" : "2022-03-09T08:40:29Z" ,
2022-03-14 21:14:45 +09:00
"stargazers_count" : 143 ,
"watchers_count" : 143 ,
2022-03-15 03:14:44 +09:00
"forks_count" : 46 ,
2022-03-08 09:14:24 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-15 03:14:44 +09:00
"forks" : 46 ,
2022-03-14 21:14:45 +09:00
"watchers" : 143 ,
2022-03-08 09:14:24 +09:00
"score" : 0
} ,
{
"id" : 467221382 ,
"name" : "CVE-2022-0847-DirtyPipe-Exploit" ,
"full_name" : "Arinerron\/CVE-2022-0847-DirtyPipe-Exploit" ,
"owner" : {
"login" : "Arinerron" ,
"id" : 3926753 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/3926753?v=4" ,
"html_url" : "https:\/\/github.com\/Arinerron"
} ,
"html_url" : "https:\/\/github.com\/Arinerron\/CVE-2022-0847-DirtyPipe-Exploit" ,
2022-03-08 21:16:36 +09:00
"description" : "A root exploit for CVE-2022-0847 (Dirty Pipe)" ,
2022-03-08 09:14:24 +09:00
"fork" : false ,
"created_at" : "2022-03-07T18:55:20Z" ,
2022-03-15 03:14:44 +09:00
"updated_at" : "2022-03-14T18:06:35Z" ,
2022-03-08 21:16:36 +09:00
"pushed_at" : "2022-03-08T06:20:05Z" ,
2022-03-15 03:14:44 +09:00
"stargazers_count" : 816 ,
"watchers_count" : 816 ,
"forks_count" : 158 ,
2022-03-08 09:14:24 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-15 03:14:44 +09:00
"forks" : 158 ,
"watchers" : 816 ,
2022-03-08 09:14:24 +09:00
"score" : 0
} ,
{
"id" : 467240173 ,
"name" : "CVE-2022-0847" ,
"full_name" : "2xYuan\/CVE-2022-0847" ,
"owner" : {
"login" : "2xYuan" ,
"id" : 101141051 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/101141051?v=4" ,
"html_url" : "https:\/\/github.com\/2xYuan"
} ,
"html_url" : "https:\/\/github.com\/2xYuan\/CVE-2022-0847" ,
"description" : "66666" ,
"fork" : false ,
"created_at" : "2022-03-07T19:56:37Z" ,
"updated_at" : "2022-03-07T19:58:56Z" ,
"pushed_at" : "2022-03-07T19:56:38Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 467257098 ,
"name" : "Dirty-Pipe" ,
"full_name" : "carlosevieira\/Dirty-Pipe" ,
"owner" : {
"login" : "carlosevieira" ,
"id" : 24918013 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/24918013?v=4" ,
"html_url" : "https:\/\/github.com\/carlosevieira"
} ,
"html_url" : "https:\/\/github.com\/carlosevieira\/Dirty-Pipe" ,
"description" : "CVE-2022-0847 exploit one liner" ,
"fork" : false ,
"created_at" : "2022-03-07T20:57:34Z" ,
2022-03-09 09:14:20 +09:00
"updated_at" : "2022-03-08T21:06:02Z" ,
2022-03-08 09:14:24 +09:00
"pushed_at" : "2022-03-07T21:01:15Z" ,
2022-03-09 09:14:20 +09:00
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
2022-03-08 15:14:29 +09:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2022-03-09 09:14:20 +09:00
"watchers" : 5 ,
2022-03-08 15:14:29 +09:00
"score" : 0
} ,
{
"id" : 467317090 ,
"name" : "CVE-2022-0847" ,
"full_name" : "lucksec\/CVE-2022-0847" ,
"owner" : {
"login" : "lucksec" ,
"id" : 59011386 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/59011386?v=4" ,
"html_url" : "https:\/\/github.com\/lucksec"
} ,
"html_url" : "https:\/\/github.com\/lucksec\/CVE-2022-0847" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-03-08T01:17:09Z" ,
"updated_at" : "2022-03-08T01:18:02Z" ,
"pushed_at" : "2022-03-08T01:50:39Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2022-03-09 21:14:39 +09:00
"forks_count" : 3 ,
2022-03-08 15:14:29 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-09 21:14:39 +09:00
"forks" : 3 ,
2022-03-08 15:14:29 +09:00
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 467355450 ,
"name" : "cve-2022-0847dirtypipe-exploit" ,
"full_name" : "rahul1406\/cve-2022-0847dirtypipe-exploit" ,
"owner" : {
"login" : "rahul1406" ,
"id" : 47823841 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/47823841?v=4" ,
"html_url" : "https:\/\/github.com\/rahul1406"
} ,
"html_url" : "https:\/\/github.com\/rahul1406\/cve-2022-0847dirtypipe-exploit" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-03-08T03:56:03Z" ,
2022-03-09 15:14:55 +09:00
"updated_at" : "2022-03-09T01:22:58Z" ,
2022-03-11 09:14:29 +09:00
"pushed_at" : "2022-03-10T18:17:01Z" ,
2022-03-09 15:14:55 +09:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2022-03-09 21:14:39 +09:00
"forks_count" : 5 ,
2022-03-08 15:14:29 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-09 21:14:39 +09:00
"forks" : 5 ,
2022-03-09 15:14:55 +09:00
"watchers" : 2 ,
2022-03-08 15:14:29 +09:00
"score" : 0
} ,
{
"id" : 467367761 ,
"name" : "CVE-2022-0847" ,
"full_name" : "si1ent-le\/CVE-2022-0847" ,
"owner" : {
"login" : "si1ent-le" ,
"id" : 56815669 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/56815669?v=4" ,
"html_url" : "https:\/\/github.com\/si1ent-le"
} ,
"html_url" : "https:\/\/github.com\/si1ent-le\/CVE-2022-0847" ,
"description" : "CVE-2022-0487" ,
"fork" : false ,
"created_at" : "2022-03-08T04:51:02Z" ,
"updated_at" : "2022-03-08T05:15:14Z" ,
"pushed_at" : "2022-03-08T05:18:15Z" ,
2022-03-08 09:14:24 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2022-03-09 21:14:39 +09:00
"forks_count" : 3 ,
2022-03-08 21:16:36 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-09 21:14:39 +09:00
"forks" : 3 ,
2022-03-08 21:16:36 +09:00
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 467439184 ,
"name" : "CVE-2022-0847" ,
"full_name" : "antx-code\/CVE-2022-0847" ,
"owner" : {
"login" : "antx-code" ,
"id" : 7877940 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/7877940?v=4" ,
"html_url" : "https:\/\/github.com\/antx-code"
} ,
"html_url" : "https:\/\/github.com\/antx-code\/CVE-2022-0847" ,
"description" : "Linux Kernel Local Privilege Escalation Vulnerability CVE-2022-0847." ,
"fork" : false ,
"created_at" : "2022-03-08T09:10:51Z" ,
2022-03-14 09:14:52 +09:00
"updated_at" : "2022-03-13T22:32:24Z" ,
2022-03-08 21:16:36 +09:00
"pushed_at" : "2022-03-08T09:14:25Z" ,
2022-03-14 09:14:52 +09:00
"stargazers_count" : 48 ,
"watchers_count" : 48 ,
"forks_count" : 17 ,
2022-03-08 21:16:36 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-14 09:14:52 +09:00
"forks" : 17 ,
"watchers" : 48 ,
2022-03-08 21:16:36 +09:00
"score" : 0
} ,
{
"id" : 467468720 ,
"name" : "CVE-2022-0847-dirty-pipe-exploit" ,
"full_name" : "cspshivam\/CVE-2022-0847-dirty-pipe-exploit" ,
"owner" : {
"login" : "cspshivam" ,
"id" : 59191514 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/59191514?v=4" ,
"html_url" : "https:\/\/github.com\/cspshivam"
} ,
"html_url" : "https:\/\/github.com\/cspshivam\/CVE-2022-0847-dirty-pipe-exploit" ,
"description" : "An exploit for CVE-2022-0847 dirty-pipe vulnerability" ,
"fork" : false ,
"created_at" : "2022-03-08T10:40:07Z" ,
2022-03-09 21:14:39 +09:00
"updated_at" : "2022-03-09T07:15:27Z" ,
2022-03-08 21:16:36 +09:00
"pushed_at" : "2022-03-08T11:15:00Z" ,
2022-03-09 21:14:39 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 2 ,
2022-03-08 21:16:36 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-09 21:14:39 +09:00
"forks" : 2 ,
"watchers" : 1 ,
2022-03-08 21:16:36 +09:00
"score" : 0
} ,
{
"id" : 467490371 ,
"name" : "dirtypipez-exploit" ,
"full_name" : "febinrev\/dirtypipez-exploit" ,
"owner" : {
"login" : "febinrev" ,
"id" : 52229330 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/52229330?v=4" ,
"html_url" : "https:\/\/github.com\/febinrev"
} ,
"html_url" : "https:\/\/github.com\/febinrev\/dirtypipez-exploit" ,
"description" : "CVE-2022-0847 DirtyPipe Exploit." ,
"fork" : false ,
"created_at" : "2022-03-08T11:49:40Z" ,
2022-03-14 15:14:28 +09:00
"updated_at" : "2022-03-14T01:20:21Z" ,
2022-03-08 21:16:36 +09:00
"pushed_at" : "2022-03-08T11:52:22Z" ,
2022-03-14 15:14:28 +09:00
"stargazers_count" : 19 ,
"watchers_count" : 19 ,
"forks_count" : 11 ,
2022-03-09 03:14:48 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-14 15:14:28 +09:00
"forks" : 11 ,
"watchers" : 19 ,
2022-03-09 03:14:48 +09:00
"score" : 0
} ,
{
"id" : 467507788 ,
"name" : "CVE_2022_0847" ,
"full_name" : "ahrixia\/CVE_2022_0847" ,
"owner" : {
"login" : "ahrixia" ,
"id" : 35935843 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/35935843?v=4" ,
"html_url" : "https:\/\/github.com\/ahrixia"
} ,
"html_url" : "https:\/\/github.com\/ahrixia\/CVE_2022_0847" ,
"description" : "CVE-2022-0847: Linux Kernel Privilege Escalation Vulnerability" ,
"fork" : false ,
"created_at" : "2022-03-08T12:43:43Z" ,
2022-03-15 03:14:44 +09:00
"updated_at" : "2022-03-14T16:58:49Z" ,
2022-03-09 03:14:48 +09:00
"pushed_at" : "2022-03-08T13:15:35Z" ,
2022-03-15 03:14:44 +09:00
"stargazers_count" : 9 ,
"watchers_count" : 9 ,
2022-03-14 21:14:45 +09:00
"forks_count" : 8 ,
2022-03-09 03:14:48 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-14 21:14:45 +09:00
"forks" : 8 ,
2022-03-15 03:14:44 +09:00
"watchers" : 9 ,
2022-03-09 03:14:48 +09:00
"score" : 0
} ,
{
"id" : 467530713 ,
"name" : "CVE-2022-0847" ,
"full_name" : "knqyf263\/CVE-2022-0847" ,
"owner" : {
"login" : "knqyf263" ,
"id" : 2253692 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4" ,
"html_url" : "https:\/\/github.com\/knqyf263"
} ,
"html_url" : "https:\/\/github.com\/knqyf263\/CVE-2022-0847" ,
"description" : "The Dirty Pipe Vulnerability" ,
"fork" : false ,
"created_at" : "2022-03-08T13:48:55Z" ,
2022-03-15 03:14:44 +09:00
"updated_at" : "2022-03-14T15:50:23Z" ,
2022-03-09 03:14:48 +09:00
"pushed_at" : "2022-03-08T13:54:08Z" ,
2022-03-15 03:14:44 +09:00
"stargazers_count" : 38 ,
"watchers_count" : 38 ,
2022-03-14 15:14:28 +09:00
"forks_count" : 5 ,
2022-03-09 03:14:48 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-14 15:14:28 +09:00
"forks" : 5 ,
2022-03-15 03:14:44 +09:00
"watchers" : 38 ,
2022-03-09 03:14:48 +09:00
"score" : 0
} ,
{
"id" : 467552702 ,
"name" : "CVE-2022-0847" ,
"full_name" : "puckiestyle\/CVE-2022-0847" ,
"owner" : {
"login" : "puckiestyle" ,
"id" : 57447087 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4" ,
"html_url" : "https:\/\/github.com\/puckiestyle"
} ,
"html_url" : "https:\/\/github.com\/puckiestyle\/CVE-2022-0847" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-03-08T14:46:21Z" ,
"updated_at" : "2022-03-08T15:35:41Z" ,
2022-03-10 21:14:35 +09:00
"pushed_at" : "2022-03-10T08:10:40Z" ,
2022-03-09 03:14:48 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2022-03-09 21:14:39 +09:00
"forks_count" : 1 ,
2022-03-09 03:14:48 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-09 21:14:39 +09:00
"forks" : 1 ,
2022-03-09 03:14:48 +09:00
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 467569839 ,
"name" : "dirty-pipe" ,
"full_name" : "0xIronGoat\/dirty-pipe" ,
"owner" : {
"login" : "0xIronGoat" ,
"id" : 14928858 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/14928858?v=4" ,
"html_url" : "https:\/\/github.com\/0xIronGoat"
} ,
"html_url" : "https:\/\/github.com\/0xIronGoat\/dirty-pipe" ,
"description" : "Implementation of Max Kellermann's exploit for CVE-2022-0847" ,
"fork" : false ,
"created_at" : "2022-03-08T15:30:45Z" ,
2022-03-10 03:17:31 +09:00
"updated_at" : "2022-03-09T15:43:22Z" ,
2022-03-09 03:14:48 +09:00
"pushed_at" : "2022-03-08T15:47:53Z" ,
2022-03-10 03:17:31 +09:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
2022-03-09 21:14:39 +09:00
"forks_count" : 1 ,
2022-03-09 03:14:48 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-09 21:14:39 +09:00
"forks" : 1 ,
2022-03-10 03:17:31 +09:00
"watchers" : 3 ,
2022-03-09 03:14:48 +09:00
"score" : 0
} ,
{
"id" : 467570864 ,
"name" : "CVE-2022-0847-DirtyPipe-Exploit" ,
"full_name" : "ITMarcin2211\/CVE-2022-0847-DirtyPipe-Exploit" ,
"owner" : {
"login" : "ITMarcin2211" ,
"id" : 60057530 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/60057530?v=4" ,
"html_url" : "https:\/\/github.com\/ITMarcin2211"
} ,
"html_url" : "https:\/\/github.com\/ITMarcin2211\/CVE-2022-0847-DirtyPipe-Exploit" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-03-08T15:33:39Z" ,
"updated_at" : "2022-03-08T15:34:46Z" ,
"pushed_at" : "2022-03-08T15:36:53Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2022-03-09 09:14:20 +09:00
"forks_count" : 1 ,
2022-03-09 03:14:48 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-09 09:14:20 +09:00
"forks" : 1 ,
2022-03-09 03:14:48 +09:00
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 467602577 ,
"name" : "CVE-2022-0847-Docker" ,
"full_name" : "mrchucu1\/CVE-2022-0847-Docker" ,
"owner" : {
"login" : "mrchucu1" ,
"id" : 12802120 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/12802120?v=4" ,
"html_url" : "https:\/\/github.com\/mrchucu1"
} ,
"html_url" : "https:\/\/github.com\/mrchucu1\/CVE-2022-0847-Docker" ,
"description" : "Docker exploit" ,
"fork" : false ,
"created_at" : "2022-03-08T17:02:40Z" ,
"updated_at" : "2022-03-08T17:05:05Z" ,
"pushed_at" : "2022-03-08T17:05:01Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 467606236 ,
"name" : "CVE-2022-0847-dirty-pipe-checker" ,
"full_name" : "basharkey\/CVE-2022-0847-dirty-pipe-checker" ,
"owner" : {
"login" : "basharkey" ,
"id" : 15859442 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/15859442?v=4" ,
"html_url" : "https:\/\/github.com\/basharkey"
} ,
"html_url" : "https:\/\/github.com\/basharkey\/CVE-2022-0847-dirty-pipe-checker" ,
"description" : "Bash script to check for CVE-2022-0847 \"Dirty Pipe\"" ,
"fork" : false ,
"created_at" : "2022-03-08T17:13:24Z" ,
2022-03-15 03:14:44 +09:00
"updated_at" : "2022-03-14T13:16:20Z" ,
2022-03-09 09:14:20 +09:00
"pushed_at" : "2022-03-08T19:53:16Z" ,
2022-03-15 03:14:44 +09:00
"stargazers_count" : 15 ,
"watchers_count" : 15 ,
2022-03-14 03:14:13 +09:00
"forks_count" : 3 ,
2022-03-09 09:14:20 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-14 03:14:13 +09:00
"forks" : 3 ,
2022-03-15 03:14:44 +09:00
"watchers" : 15 ,
2022-03-09 09:14:20 +09:00
"score" : 0
} ,
{
"id" : 467662886 ,
"name" : "CVE-2022-0847" ,
"full_name" : "4luc4rdr5290\/CVE-2022-0847" ,
"owner" : {
"login" : "4luc4rdr5290" ,
"id" : 19316088 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/19316088?v=4" ,
"html_url" : "https:\/\/github.com\/4luc4rdr5290"
} ,
"html_url" : "https:\/\/github.com\/4luc4rdr5290\/CVE-2022-0847" ,
"description" : "CVE-2022-0847" ,
"fork" : false ,
"created_at" : "2022-03-08T20:18:28Z" ,
"updated_at" : "2022-03-08T20:33:46Z" ,
"pushed_at" : "2022-03-08T20:41:15Z" ,
2022-03-08 21:16:36 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2022-03-08 09:14:24 +09:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-03-09 15:14:55 +09:00
} ,
{
"id" : 467741460 ,
"name" : "CVE-2022-0847_DirtyPipeExploit" ,
"full_name" : "dadhee\/CVE-2022-0847_DirtyPipeExploit" ,
"owner" : {
"login" : "dadhee" ,
"id" : 37909237 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/37909237?v=4" ,
"html_url" : "https:\/\/github.com\/dadhee"
} ,
"html_url" : "https:\/\/github.com\/dadhee\/CVE-2022-0847_DirtyPipeExploit" ,
"description" : "A “Dirty Pipe” vulnerability with CVE-2022-0847 and a CVSS score of 7.8 has been identified, affecting Linux Kernel 5.8 and higher. The vulnerability allows attackers to overwrite data in read-only files. Threat actors can exploit this vulnerability to privilege themselves with code injection." ,
"fork" : false ,
"created_at" : "2022-03-09T01:55:04Z" ,
2022-03-09 21:14:39 +09:00
"updated_at" : "2022-03-09T07:16:19Z" ,
2022-03-09 15:14:55 +09:00
"pushed_at" : "2022-03-09T02:01:28Z" ,
2022-03-09 21:14:39 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 1 ,
2022-03-09 15:14:55 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-09 21:14:39 +09:00
"forks" : 1 ,
"watchers" : 1 ,
2022-03-09 15:14:55 +09:00
"score" : 0
} ,
{
"id" : 467753868 ,
"name" : "CVE-2022-0847-DirtyPipe" ,
"full_name" : "Greetdawn\/CVE-2022-0847-DirtyPipe" ,
"owner" : {
"login" : "Greetdawn" ,
"id" : 28551913 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/28551913?v=4" ,
"html_url" : "https:\/\/github.com\/Greetdawn"
} ,
"html_url" : "https:\/\/github.com\/Greetdawn\/CVE-2022-0847-DirtyPipe" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-03-09T02:47:06Z" ,
"updated_at" : "2022-03-09T02:52:32Z" ,
2022-03-11 15:14:19 +09:00
"pushed_at" : "2022-03-11T02:55:37Z" ,
2022-03-09 15:14:55 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 467753881 ,
"name" : "CVE-2022-0847" ,
"full_name" : "Al1ex\/CVE-2022-0847" ,
"owner" : {
"login" : "Al1ex" ,
"id" : 38161463 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4" ,
"html_url" : "https:\/\/github.com\/Al1ex"
} ,
"html_url" : "https:\/\/github.com\/Al1ex\/CVE-2022-0847" ,
"description" : "CVE-2022-0847" ,
"fork" : false ,
"created_at" : "2022-03-09T02:47:08Z" ,
2022-03-10 15:14:25 +09:00
"updated_at" : "2022-03-10T05:44:56Z" ,
2022-03-09 15:14:55 +09:00
"pushed_at" : "2022-03-09T02:47:32Z" ,
2022-03-10 15:14:25 +09:00
"stargazers_count" : 13 ,
"watchers_count" : 13 ,
"forks_count" : 5 ,
2022-03-09 15:14:55 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"cve-2022-0847"
] ,
"visibility" : "public" ,
2022-03-10 15:14:25 +09:00
"forks" : 5 ,
"watchers" : 13 ,
2022-03-09 15:14:55 +09:00
"score" : 0
} ,
{
2022-03-09 21:14:39 +09:00
"id" : 467788339 ,
"name" : "CVE-2022-0847-DirtyPipe-Exploit" ,
"full_name" : "Mustafa1986\/CVE-2022-0847-DirtyPipe-Exploit" ,
"owner" : {
"login" : "Mustafa1986" ,
"id" : 27927358 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/27927358?v=4" ,
"html_url" : "https:\/\/github.com\/Mustafa1986"
} ,
"html_url" : "https:\/\/github.com\/Mustafa1986\/CVE-2022-0847-DirtyPipe-Exploit" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-03-09T05:22:20Z" ,
2022-03-11 09:14:29 +09:00
"updated_at" : "2022-03-10T18:50:04Z" ,
2022-03-09 21:14:39 +09:00
"pushed_at" : "2022-03-09T06:16:23Z" ,
2022-03-11 09:14:29 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2022-03-09 21:14:39 +09:00
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
2022-03-11 09:14:29 +09:00
"watchers" : 1 ,
2022-03-09 21:14:39 +09:00
"score" : 0
} ,
{
"id" : 467818101 ,
2022-03-09 15:14:55 +09:00
"name" : "Dirtypipe-exploit" ,
2022-03-09 21:14:39 +09:00
"full_name" : "nanaao\/Dirtypipe-exploit" ,
2022-03-09 15:14:55 +09:00
"owner" : {
2022-03-09 21:14:39 +09:00
"login" : "nanaao" ,
"id" : 77666853 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/77666853?v=4" ,
"html_url" : "https:\/\/github.com\/nanaao"
2022-03-09 15:14:55 +09:00
} ,
2022-03-09 21:14:39 +09:00
"html_url" : "https:\/\/github.com\/nanaao\/Dirtypipe-exploit" ,
2022-03-09 15:14:55 +09:00
"description" : "Dirty Pipe (CVE-2022-0847) PoC that hijacks a SUID binary to spawn. a root shell. (and attempts to restore the damaged binary as well)" ,
"fork" : false ,
2022-03-09 21:14:39 +09:00
"created_at" : "2022-03-09T07:16:57Z" ,
"updated_at" : "2022-03-09T11:39:58Z" ,
2022-03-09 15:14:55 +09:00
"pushed_at" : "2022-03-09T04:43:00Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
2022-03-09 21:14:39 +09:00
"id" : 467872655 ,
"name" : "cve-2022-0847dirtypipe-exploit" ,
"full_name" : "AyoubNajim\/cve-2022-0847dirtypipe-exploit" ,
2022-03-09 15:14:55 +09:00
"owner" : {
2022-03-09 21:14:39 +09:00
"login" : "AyoubNajim" ,
"id" : 68334573 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/68334573?v=4" ,
"html_url" : "https:\/\/github.com\/AyoubNajim"
2022-03-09 15:14:55 +09:00
} ,
2022-03-09 21:14:39 +09:00
"html_url" : "https:\/\/github.com\/AyoubNajim\/cve-2022-0847dirtypipe-exploit" ,
2022-03-09 15:14:55 +09:00
"description" : null ,
"fork" : false ,
2022-03-09 21:14:39 +09:00
"created_at" : "2022-03-09T10:05:53Z" ,
2022-03-11 09:14:29 +09:00
"updated_at" : "2022-03-10T22:58:10Z" ,
2022-03-09 21:14:39 +09:00
"pushed_at" : "2022-03-09T10:16:13Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 467878952 ,
"name" : "pentestblog-CVE-2022-0847" ,
"full_name" : "pentestblogin\/pentestblog-CVE-2022-0847" ,
"owner" : {
"login" : "pentestblogin" ,
"id" : 70894330 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/70894330?v=4" ,
"html_url" : "https:\/\/github.com\/pentestblogin"
} ,
"html_url" : "https:\/\/github.com\/pentestblogin\/pentestblog-CVE-2022-0847" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-03-09T10:24:42Z" ,
"updated_at" : "2022-03-09T10:26:10Z" ,
"pushed_at" : "2022-03-09T10:26:07Z" ,
2022-03-09 15:14:55 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-03-10 03:17:31 +09:00
} ,
{
"id" : 467990193 ,
"name" : "CVE-2022-0847" ,
"full_name" : "gyaansastra\/CVE-2022-0847" ,
"owner" : {
"login" : "gyaansastra" ,
"id" : 35690123 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/35690123?v=4" ,
"html_url" : "https:\/\/github.com\/gyaansastra"
} ,
"html_url" : "https:\/\/github.com\/gyaansastra\/CVE-2022-0847" ,
"description" : "Dirty Pipe POC" ,
"fork" : false ,
"created_at" : "2022-03-09T15:44:58Z" ,
2022-03-13 03:14:18 +09:00
"updated_at" : "2022-03-12T17:30:19Z" ,
2022-03-10 03:17:31 +09:00
"pushed_at" : "2022-03-09T15:45:01Z" ,
2022-03-13 03:14:18 +09:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2022-03-12 09:16:08 +09:00
"forks_count" : 2 ,
2022-03-10 03:17:31 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-12 09:16:08 +09:00
"forks" : 2 ,
2022-03-13 03:14:18 +09:00
"watchers" : 2 ,
2022-03-10 03:17:31 +09:00
"score" : 0
} ,
{
"id" : 468013377 ,
"name" : "CVE-2022-0847" ,
"full_name" : "T4t4ru\/CVE-2022-0847" ,
"owner" : {
"login" : "T4t4ru" ,
"id" : 100865104 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/100865104?v=4" ,
"html_url" : "https:\/\/github.com\/T4t4ru"
} ,
"html_url" : "https:\/\/github.com\/T4t4ru\/CVE-2022-0847" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-03-09T16:47:36Z" ,
"updated_at" : "2022-03-09T16:54:55Z" ,
2022-03-11 03:14:31 +09:00
"pushed_at" : "2022-03-10T13:57:29Z" ,
2022-03-10 03:17:31 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-03-10 15:14:25 +09:00
} ,
{
"id" : 468143759 ,
"name" : "CVE-2022-0847" ,
"full_name" : "babyshen\/CVE-2022-0847" ,
"owner" : {
"login" : "babyshen" ,
"id" : 11402197 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/11402197?v=4" ,
"html_url" : "https:\/\/github.com\/babyshen"
} ,
"html_url" : "https:\/\/github.com\/babyshen\/CVE-2022-0847" ,
"description" : "A root exploit for CVE-2022-0847 (Dirty Pipe)" ,
"fork" : false ,
"created_at" : "2022-03-10T00:54:11Z" ,
"updated_at" : "2022-03-10T01:00:55Z" ,
"pushed_at" : "2022-03-10T01:02:13Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 468148868 ,
"name" : "CVE-2022-0847-Linux" ,
"full_name" : "edsonjt81\/CVE-2022-0847-Linux" ,
"owner" : {
"login" : "edsonjt81" ,
"id" : 27496739 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/27496739?v=4" ,
"html_url" : "https:\/\/github.com\/edsonjt81"
} ,
"html_url" : "https:\/\/github.com\/edsonjt81\/CVE-2022-0847-Linux" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-03-10T01:18:26Z" ,
"updated_at" : "2022-03-10T01:18:36Z" ,
"pushed_at" : "2022-03-10T01:18:33Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 468151065 ,
"name" : "CVE-2022-0847" ,
"full_name" : "chenaotian\/CVE-2022-0847" ,
"owner" : {
"login" : "chenaotian" ,
"id" : 86546351 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/86546351?v=4" ,
"html_url" : "https:\/\/github.com\/chenaotian"
} ,
"html_url" : "https:\/\/github.com\/chenaotian\/CVE-2022-0847" ,
"description" : "CVE-2022-0847 POC and Docker and Analysis write up" ,
"fork" : false ,
"created_at" : "2022-03-10T01:27:29Z" ,
"updated_at" : "2022-03-10T06:07:10Z" ,
"pushed_at" : "2022-03-10T01:31:57Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 1 ,
"score" : 0
2022-03-11 03:14:31 +09:00
} ,
{
"id" : 468352446 ,
"name" : "CVE-2022-0847-DirtyPipe-Exploit" ,
"full_name" : "V0WKeep3r\/CVE-2022-0847-DirtyPipe-Exploit" ,
"owner" : {
"login" : "V0WKeep3r" ,
"id" : 78677532 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/78677532?v=4" ,
"html_url" : "https:\/\/github.com\/V0WKeep3r"
} ,
"html_url" : "https:\/\/github.com\/V0WKeep3r\/CVE-2022-0847-DirtyPipe-Exploit" ,
"description" : "CVE-2022-0847-DirtyPipe-Exploit" ,
"fork" : false ,
"created_at" : "2022-03-10T13:23:52Z" ,
"updated_at" : "2022-03-10T13:40:33Z" ,
"pushed_at" : "2022-03-10T13:41:19Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2022-03-11 15:14:19 +09:00
"forks_count" : 1 ,
2022-03-11 03:14:31 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-11 15:14:19 +09:00
"forks" : 1 ,
2022-03-11 03:14:31 +09:00
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 468416712 ,
"name" : "CVE-2022-0847-Dirty-Pipe" ,
"full_name" : "michaelklaan\/CVE-2022-0847-Dirty-Pipe" ,
"owner" : {
"login" : "michaelklaan" ,
"id" : 40411471 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/40411471?v=4" ,
"html_url" : "https:\/\/github.com\/michaelklaan"
} ,
"html_url" : "https:\/\/github.com\/michaelklaan\/CVE-2022-0847-Dirty-Pipe" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-03-10T16:09:16Z" ,
"updated_at" : "2022-03-10T16:10:15Z" ,
"pushed_at" : "2022-03-10T16:09:25Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-03-11 09:14:29 +09:00
} ,
{
"id" : 468496897 ,
"name" : "dirtyPipe-automaticRoot" ,
"full_name" : "terabitSec\/dirtyPipe-automaticRoot" ,
"owner" : {
"login" : "terabitSec" ,
"id" : 100799842 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/100799842?v=4" ,
"html_url" : "https:\/\/github.com\/terabitSec"
} ,
"html_url" : "https:\/\/github.com\/terabitSec\/dirtyPipe-automaticRoot" ,
"description" : "CVE-2022-0847 Python exploit to get root or write a no write permission, immutable or read-only mounted file." ,
"fork" : false ,
"created_at" : "2022-03-10T20:15:07Z" ,
2022-03-13 09:14:07 +09:00
"updated_at" : "2022-03-12T22:42:12Z" ,
2022-03-12 09:16:08 +09:00
"pushed_at" : "2022-03-11T22:27:18Z" ,
2022-03-13 09:14:07 +09:00
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
2022-03-12 15:14:20 +09:00
"forks_count" : 1 ,
2022-03-11 09:14:29 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"cve-2022-0847" ,
"dirty-pipe" ,
"exploit" ,
"privilege-escalation-exploits" ,
"python3-10"
] ,
"visibility" : "public" ,
2022-03-12 15:14:20 +09:00
"forks" : 1 ,
2022-03-13 09:14:07 +09:00
"watchers" : 4 ,
2022-03-11 15:14:19 +09:00
"score" : 0
} ,
{
"id" : 468586082 ,
"name" : "CVE-2022-0847-DirtyPipe-" ,
"full_name" : "Greetdawn\/CVE-2022-0847-DirtyPipe-" ,
"owner" : {
"login" : "Greetdawn" ,
"id" : 28551913 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/28551913?v=4" ,
"html_url" : "https:\/\/github.com\/Greetdawn"
} ,
"html_url" : "https:\/\/github.com\/Greetdawn\/CVE-2022-0847-DirtyPipe-" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-03-11T02:51:54Z" ,
"updated_at" : "2022-03-11T02:51:54Z" ,
"pushed_at" : "2022-03-11T02:51:55Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
2022-03-11 09:14:29 +09:00
"score" : 0
2022-03-11 21:14:28 +09:00
} ,
{
"id" : 468666839 ,
"name" : "DirtyPipePython" ,
"full_name" : "crusoe112\/DirtyPipePython" ,
"owner" : {
"login" : "crusoe112" ,
"id" : 6531586 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/6531586?v=4" ,
"html_url" : "https:\/\/github.com\/crusoe112"
} ,
"html_url" : "https:\/\/github.com\/crusoe112\/DirtyPipePython" ,
"description" : "A Python-based DirtyPipe (CVE-2022-0847) POC to pop a root shell" ,
"fork" : false ,
"created_at" : "2022-03-11T08:22:56Z" ,
"updated_at" : "2022-03-11T10:59:23Z" ,
"pushed_at" : "2022-03-11T08:31:54Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 1 ,
"score" : 0
2022-03-12 21:14:12 +09:00
} ,
{
"id" : 469063637 ,
"name" : "CVE-2022-0847" ,
"full_name" : "arttnba3\/CVE-2022-0847" ,
"owner" : {
"login" : "arttnba3" ,
"id" : 28689148 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/28689148?v=4" ,
"html_url" : "https:\/\/github.com\/arttnba3"
} ,
"html_url" : "https:\/\/github.com\/arttnba3\/CVE-2022-0847" ,
"description" : "my personal exploit of CVE-2022-0847(dirty pipe)" ,
"fork" : false ,
"created_at" : "2022-03-12T11:31:46Z" ,
2022-03-14 15:14:28 +09:00
"updated_at" : "2022-03-14T04:59:50Z" ,
2022-03-15 03:14:44 +09:00
"pushed_at" : "2022-03-14T17:51:29Z" ,
2022-03-14 15:14:28 +09:00
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
2022-03-13 09:14:07 +09:00
"forks_count" : 1 ,
2022-03-12 21:14:12 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-13 09:14:07 +09:00
"forks" : 1 ,
2022-03-14 15:14:28 +09:00
"watchers" : 4 ,
2022-03-12 21:14:12 +09:00
"score" : 0
2022-03-13 09:14:07 +09:00
} ,
{
"id" : 469198555 ,
"name" : "CVE-2022-0847-DirtyPipe-Exploits" ,
"full_name" : "AlexisAhmed\/CVE-2022-0847-DirtyPipe-Exploits" ,
"owner" : {
"login" : "AlexisAhmed" ,
"id" : 13276084 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/13276084?v=4" ,
"html_url" : "https:\/\/github.com\/AlexisAhmed"
} ,
"html_url" : "https:\/\/github.com\/AlexisAhmed\/CVE-2022-0847-DirtyPipe-Exploits" ,
"description" : "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability." ,
"fork" : false ,
"created_at" : "2022-03-12T20:57:24Z" ,
2022-03-15 03:14:44 +09:00
"updated_at" : "2022-03-14T17:00:45Z" ,
2022-03-14 21:14:45 +09:00
"pushed_at" : "2022-03-14T07:40:23Z" ,
2022-03-15 03:14:44 +09:00
"stargazers_count" : 64 ,
"watchers_count" : 64 ,
"forks_count" : 13 ,
2022-03-13 15:14:12 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-15 03:14:44 +09:00
"forks" : 13 ,
"watchers" : 64 ,
2022-03-13 15:14:12 +09:00
"score" : 0
} ,
{
"id" : 469282891 ,
"name" : "Dirty-Pipe-CVE-2022-0847" ,
"full_name" : "sa-infinity8888\/Dirty-Pipe-CVE-2022-0847" ,
"owner" : {
"login" : "sa-infinity8888" ,
"id" : 95272899 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/95272899?v=4" ,
"html_url" : "https:\/\/github.com\/sa-infinity8888"
} ,
"html_url" : "https:\/\/github.com\/sa-infinity8888\/Dirty-Pipe-CVE-2022-0847" ,
"description" : "CVE-2022-0847 (Dirty Pipe) is an arbitrary file overwrite vulnerability that allows escalation of privileges by modifying or overwriting arbitrary read-only files e.g. \/etc\/passwd, \/etc\/shadow." ,
"fork" : false ,
"created_at" : "2022-03-13T05:51:06Z" ,
"updated_at" : "2022-03-13T06:07:15Z" ,
"pushed_at" : "2022-03-13T06:02:30Z" ,
2022-03-13 09:14:07 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2022-03-13 15:14:12 +09:00
"forks_count" : 0 ,
2022-03-13 09:14:07 +09:00
"allow_forking" : true ,
"is_template" : false ,
2022-03-13 15:14:12 +09:00
"topics" : [
"cve-2022-0847" ,
"cybersecurity" ,
"dirtypipe"
] ,
2022-03-13 09:14:07 +09:00
"visibility" : "public" ,
2022-03-13 15:14:12 +09:00
"forks" : 0 ,
2022-03-13 09:14:07 +09:00
"watchers" : 0 ,
"score" : 0
2022-03-14 09:14:52 +09:00
} ,
{
"id" : 469473653 ,
"name" : "dirtypipetester" ,
"full_name" : "realbatuhan\/dirtypipetester" ,
"owner" : {
"login" : "realbatuhan" ,
"id" : 68564239 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/68564239?v=4" ,
"html_url" : "https:\/\/github.com\/realbatuhan"
} ,
"html_url" : "https:\/\/github.com\/realbatuhan\/dirtypipetester" ,
"description" : "Dirty Pipe (CVE-2022-0847) zafiyeti kontrolü " ,
"fork" : false ,
"created_at" : "2022-03-13T19:30:14Z" ,
2022-03-14 15:14:28 +09:00
"updated_at" : "2022-03-14T05:00:16Z" ,
2022-03-14 09:14:52 +09:00
"pushed_at" : "2022-03-13T19:49:29Z" ,
2022-03-14 15:14:28 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2022-03-14 09:14:52 +09:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2022-03-14 15:14:28 +09:00
"watchers" : 1 ,
2022-03-14 09:14:52 +09:00
"score" : 0
2022-03-15 03:14:44 +09:00
} ,
{
"id" : 469743112 ,
"name" : "CVE-2022-0847-POC" ,
"full_name" : "CYB3RK1D\/CVE-2022-0847-POC" ,
"owner" : {
"login" : "CYB3RK1D" ,
"id" : 37270599 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/37270599?v=4" ,
"html_url" : "https:\/\/github.com\/CYB3RK1D"
} ,
"html_url" : "https:\/\/github.com\/CYB3RK1D\/CVE-2022-0847-POC" ,
"description" : "dirtypipe" ,
"fork" : false ,
"created_at" : "2022-03-14T13:21:25Z" ,
"updated_at" : "2022-03-14T13:30:37Z" ,
"pushed_at" : "2022-03-14T13:29:03Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 469794565 ,
"name" : "dirty-pipe-poc" ,
"full_name" : "breachnix\/dirty-pipe-poc" ,
"owner" : {
"login" : "breachnix" ,
"id" : 84611050 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/84611050?v=4" ,
"html_url" : "https:\/\/github.com\/breachnix"
} ,
"html_url" : "https:\/\/github.com\/breachnix\/dirty-pipe-poc" ,
"description" : "CVE-2022-0847 POC" ,
"fork" : false ,
"created_at" : "2022-03-14T15:32:25Z" ,
"updated_at" : "2022-03-14T18:00:25Z" ,
"pushed_at" : "2022-03-14T18:01:22Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-03-08 03:17:15 +09:00
}
]