2022-03-07 19:17:15 +01:00
[
{
"id" : 467129462 ,
"name" : "CVE-2022-0847" ,
"full_name" : "Udyz\/CVE-2022-0847" ,
"owner" : {
"login" : "Udyz" ,
"id" : 39673284 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/39673284?v=4" ,
"html_url" : "https:\/\/github.com\/Udyz"
} ,
"html_url" : "https:\/\/github.com\/Udyz\/CVE-2022-0847" ,
"description" : "This is the story of CVE-2022-0847, a vulnerability in the Linux kernel since 5.8 which allows overwriting data in arbitrary read-only files. This leads to privilege escalation because unprivileged processes can inject code into root processes." ,
"fork" : false ,
"created_at" : "2022-03-07T14:31:38Z" ,
2022-03-08 19:14:48 +01:00
"updated_at" : "2022-03-08T13:22:07Z" ,
2022-03-07 19:17:15 +01:00
"pushed_at" : "2022-03-07T14:31:39Z" ,
2022-03-08 19:14:48 +01:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
2022-03-07 19:17:15 +01:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2022-03-08 19:14:48 +01:00
"watchers" : 3 ,
2022-03-07 19:17:15 +01:00
"score" : 0
} ,
{
"id" : 467159035 ,
"name" : "CVE-2022-0847" ,
"full_name" : "bbaranoff\/CVE-2022-0847" ,
"owner" : {
"login" : "bbaranoff" ,
"id" : 37385191 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/37385191?v=4" ,
"html_url" : "https:\/\/github.com\/bbaranoff"
} ,
"html_url" : "https:\/\/github.com\/bbaranoff\/CVE-2022-0847" ,
"description" : "CVE-2022-0847" ,
"fork" : false ,
"created_at" : "2022-03-07T15:50:18Z" ,
2022-03-10 07:14:25 +01:00
"updated_at" : "2022-03-10T05:23:26Z" ,
2022-03-07 19:17:15 +01:00
"pushed_at" : "2022-03-07T15:52:23Z" ,
2022-03-10 07:14:25 +01:00
"stargazers_count" : 45 ,
"watchers_count" : 45 ,
2022-03-09 13:14:39 +01:00
"forks_count" : 21 ,
2022-03-07 19:17:15 +01:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-09 13:14:39 +01:00
"forks" : 21 ,
2022-03-10 07:14:25 +01:00
"watchers" : 45 ,
2022-03-07 19:17:15 +01:00
"score" : 0
} ,
{
"id" : 467200755 ,
"name" : "CVE-2022-0847" ,
"full_name" : "xndpxs\/CVE-2022-0847" ,
"owner" : {
"login" : "xndpxs" ,
"id" : 62086766 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/62086766?v=4" ,
"html_url" : "https:\/\/github.com\/xndpxs"
} ,
"html_url" : "https:\/\/github.com\/xndpxs\/CVE-2022-0847" ,
"description" : "Vulnerability in the Linux kernel since 5.8" ,
"fork" : false ,
"created_at" : "2022-03-07T17:51:02Z" ,
2022-03-09 19:17:31 +01:00
"updated_at" : "2022-03-09T15:12:40Z" ,
2022-03-07 19:17:15 +01:00
"pushed_at" : "2022-03-07T17:59:12Z" ,
2022-03-09 19:17:31 +01:00
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
2022-03-09 13:14:39 +01:00
"forks_count" : 5 ,
2022-03-07 19:17:15 +01:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-09 13:14:39 +01:00
"forks" : 5 ,
2022-03-09 19:17:31 +01:00
"watchers" : 5 ,
2022-03-07 19:17:15 +01:00
"score" : 0
2022-03-08 01:14:24 +01:00
} ,
{
"id" : 467215742 ,
"name" : "CVE-2022-0847" ,
"full_name" : "imfiver\/CVE-2022-0847" ,
"owner" : {
"login" : "imfiver" ,
"id" : 21257485 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/21257485?v=4" ,
"html_url" : "https:\/\/github.com\/imfiver"
} ,
"html_url" : "https:\/\/github.com\/imfiver\/CVE-2022-0847" ,
2022-03-08 07:14:29 +01:00
"description" : "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞( Dirty Cow) , 但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”" ,
2022-03-08 01:14:24 +01:00
"fork" : false ,
"created_at" : "2022-03-07T18:36:50Z" ,
2022-03-10 19:14:31 +01:00
"updated_at" : "2022-03-10T16:45:01Z" ,
2022-03-09 13:14:39 +01:00
"pushed_at" : "2022-03-09T08:40:29Z" ,
2022-03-10 19:14:31 +01:00
"stargazers_count" : 108 ,
"watchers_count" : 108 ,
"forks_count" : 36 ,
2022-03-08 01:14:24 +01:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-10 19:14:31 +01:00
"forks" : 36 ,
"watchers" : 108 ,
2022-03-08 01:14:24 +01:00
"score" : 0
} ,
{
"id" : 467221382 ,
"name" : "CVE-2022-0847-DirtyPipe-Exploit" ,
"full_name" : "Arinerron\/CVE-2022-0847-DirtyPipe-Exploit" ,
"owner" : {
"login" : "Arinerron" ,
"id" : 3926753 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/3926753?v=4" ,
"html_url" : "https:\/\/github.com\/Arinerron"
} ,
"html_url" : "https:\/\/github.com\/Arinerron\/CVE-2022-0847-DirtyPipe-Exploit" ,
2022-03-08 13:16:36 +01:00
"description" : "A root exploit for CVE-2022-0847 (Dirty Pipe)" ,
2022-03-08 01:14:24 +01:00
"fork" : false ,
"created_at" : "2022-03-07T18:55:20Z" ,
2022-03-11 01:14:29 +01:00
"updated_at" : "2022-03-11T00:15:10Z" ,
2022-03-08 13:16:36 +01:00
"pushed_at" : "2022-03-08T06:20:05Z" ,
2022-03-11 01:14:29 +01:00
"stargazers_count" : 689 ,
"watchers_count" : 689 ,
"forks_count" : 138 ,
2022-03-08 01:14:24 +01:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-11 01:14:29 +01:00
"forks" : 138 ,
"watchers" : 689 ,
2022-03-08 01:14:24 +01:00
"score" : 0
} ,
{
"id" : 467240173 ,
"name" : "CVE-2022-0847" ,
"full_name" : "2xYuan\/CVE-2022-0847" ,
"owner" : {
"login" : "2xYuan" ,
"id" : 101141051 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/101141051?v=4" ,
"html_url" : "https:\/\/github.com\/2xYuan"
} ,
"html_url" : "https:\/\/github.com\/2xYuan\/CVE-2022-0847" ,
"description" : "66666" ,
"fork" : false ,
"created_at" : "2022-03-07T19:56:37Z" ,
"updated_at" : "2022-03-07T19:58:56Z" ,
"pushed_at" : "2022-03-07T19:56:38Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 467257098 ,
"name" : "Dirty-Pipe" ,
"full_name" : "carlosevieira\/Dirty-Pipe" ,
"owner" : {
"login" : "carlosevieira" ,
"id" : 24918013 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/24918013?v=4" ,
"html_url" : "https:\/\/github.com\/carlosevieira"
} ,
"html_url" : "https:\/\/github.com\/carlosevieira\/Dirty-Pipe" ,
"description" : "CVE-2022-0847 exploit one liner" ,
"fork" : false ,
"created_at" : "2022-03-07T20:57:34Z" ,
2022-03-09 01:14:20 +01:00
"updated_at" : "2022-03-08T21:06:02Z" ,
2022-03-08 01:14:24 +01:00
"pushed_at" : "2022-03-07T21:01:15Z" ,
2022-03-09 01:14:20 +01:00
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
2022-03-08 07:14:29 +01:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2022-03-09 01:14:20 +01:00
"watchers" : 5 ,
2022-03-08 07:14:29 +01:00
"score" : 0
} ,
{
"id" : 467317090 ,
"name" : "CVE-2022-0847" ,
"full_name" : "lucksec\/CVE-2022-0847" ,
"owner" : {
"login" : "lucksec" ,
"id" : 59011386 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/59011386?v=4" ,
"html_url" : "https:\/\/github.com\/lucksec"
} ,
"html_url" : "https:\/\/github.com\/lucksec\/CVE-2022-0847" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-03-08T01:17:09Z" ,
"updated_at" : "2022-03-08T01:18:02Z" ,
"pushed_at" : "2022-03-08T01:50:39Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2022-03-09 13:14:39 +01:00
"forks_count" : 3 ,
2022-03-08 07:14:29 +01:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-09 13:14:39 +01:00
"forks" : 3 ,
2022-03-08 07:14:29 +01:00
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 467355450 ,
"name" : "cve-2022-0847dirtypipe-exploit" ,
"full_name" : "rahul1406\/cve-2022-0847dirtypipe-exploit" ,
"owner" : {
"login" : "rahul1406" ,
"id" : 47823841 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/47823841?v=4" ,
"html_url" : "https:\/\/github.com\/rahul1406"
} ,
"html_url" : "https:\/\/github.com\/rahul1406\/cve-2022-0847dirtypipe-exploit" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-03-08T03:56:03Z" ,
2022-03-09 07:14:55 +01:00
"updated_at" : "2022-03-09T01:22:58Z" ,
2022-03-11 01:14:29 +01:00
"pushed_at" : "2022-03-10T18:17:01Z" ,
2022-03-09 07:14:55 +01:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2022-03-09 13:14:39 +01:00
"forks_count" : 5 ,
2022-03-08 07:14:29 +01:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-09 13:14:39 +01:00
"forks" : 5 ,
2022-03-09 07:14:55 +01:00
"watchers" : 2 ,
2022-03-08 07:14:29 +01:00
"score" : 0
} ,
{
"id" : 467367761 ,
"name" : "CVE-2022-0847" ,
"full_name" : "si1ent-le\/CVE-2022-0847" ,
"owner" : {
"login" : "si1ent-le" ,
"id" : 56815669 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/56815669?v=4" ,
"html_url" : "https:\/\/github.com\/si1ent-le"
} ,
"html_url" : "https:\/\/github.com\/si1ent-le\/CVE-2022-0847" ,
"description" : "CVE-2022-0487" ,
"fork" : false ,
"created_at" : "2022-03-08T04:51:02Z" ,
"updated_at" : "2022-03-08T05:15:14Z" ,
"pushed_at" : "2022-03-08T05:18:15Z" ,
2022-03-08 01:14:24 +01:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2022-03-09 13:14:39 +01:00
"forks_count" : 3 ,
2022-03-08 13:16:36 +01:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-09 13:14:39 +01:00
"forks" : 3 ,
2022-03-08 13:16:36 +01:00
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 467439184 ,
"name" : "CVE-2022-0847" ,
"full_name" : "antx-code\/CVE-2022-0847" ,
"owner" : {
"login" : "antx-code" ,
"id" : 7877940 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/7877940?v=4" ,
"html_url" : "https:\/\/github.com\/antx-code"
} ,
"html_url" : "https:\/\/github.com\/antx-code\/CVE-2022-0847" ,
"description" : "Linux Kernel Local Privilege Escalation Vulnerability CVE-2022-0847." ,
"fork" : false ,
"created_at" : "2022-03-08T09:10:51Z" ,
2022-03-11 01:14:29 +01:00
"updated_at" : "2022-03-10T19:58:48Z" ,
2022-03-08 13:16:36 +01:00
"pushed_at" : "2022-03-08T09:14:25Z" ,
2022-03-11 01:14:29 +01:00
"stargazers_count" : 37 ,
"watchers_count" : 37 ,
2022-03-10 13:14:35 +01:00
"forks_count" : 12 ,
2022-03-08 13:16:36 +01:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-10 13:14:35 +01:00
"forks" : 12 ,
2022-03-11 01:14:29 +01:00
"watchers" : 37 ,
2022-03-08 13:16:36 +01:00
"score" : 0
} ,
{
"id" : 467468720 ,
"name" : "CVE-2022-0847-dirty-pipe-exploit" ,
"full_name" : "cspshivam\/CVE-2022-0847-dirty-pipe-exploit" ,
"owner" : {
"login" : "cspshivam" ,
"id" : 59191514 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/59191514?v=4" ,
"html_url" : "https:\/\/github.com\/cspshivam"
} ,
"html_url" : "https:\/\/github.com\/cspshivam\/CVE-2022-0847-dirty-pipe-exploit" ,
"description" : "An exploit for CVE-2022-0847 dirty-pipe vulnerability" ,
"fork" : false ,
"created_at" : "2022-03-08T10:40:07Z" ,
2022-03-09 13:14:39 +01:00
"updated_at" : "2022-03-09T07:15:27Z" ,
2022-03-08 13:16:36 +01:00
"pushed_at" : "2022-03-08T11:15:00Z" ,
2022-03-09 13:14:39 +01:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 2 ,
2022-03-08 13:16:36 +01:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-09 13:14:39 +01:00
"forks" : 2 ,
"watchers" : 1 ,
2022-03-08 13:16:36 +01:00
"score" : 0
} ,
{
"id" : 467490371 ,
"name" : "dirtypipez-exploit" ,
"full_name" : "febinrev\/dirtypipez-exploit" ,
"owner" : {
"login" : "febinrev" ,
"id" : 52229330 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/52229330?v=4" ,
"html_url" : "https:\/\/github.com\/febinrev"
} ,
"html_url" : "https:\/\/github.com\/febinrev\/dirtypipez-exploit" ,
"description" : "CVE-2022-0847 DirtyPipe Exploit." ,
"fork" : false ,
"created_at" : "2022-03-08T11:49:40Z" ,
2022-03-11 01:14:29 +01:00
"updated_at" : "2022-03-10T22:39:01Z" ,
2022-03-08 13:16:36 +01:00
"pushed_at" : "2022-03-08T11:52:22Z" ,
2022-03-11 01:14:29 +01:00
"stargazers_count" : 11 ,
"watchers_count" : 11 ,
2022-03-10 01:14:15 +01:00
"forks_count" : 6 ,
2022-03-08 19:14:48 +01:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-10 01:14:15 +01:00
"forks" : 6 ,
2022-03-11 01:14:29 +01:00
"watchers" : 11 ,
2022-03-08 19:14:48 +01:00
"score" : 0
} ,
{
"id" : 467507788 ,
"name" : "CVE_2022_0847" ,
"full_name" : "ahrixia\/CVE_2022_0847" ,
"owner" : {
"login" : "ahrixia" ,
"id" : 35935843 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/35935843?v=4" ,
"html_url" : "https:\/\/github.com\/ahrixia"
} ,
"html_url" : "https:\/\/github.com\/ahrixia\/CVE_2022_0847" ,
"description" : "CVE-2022-0847: Linux Kernel Privilege Escalation Vulnerability" ,
"fork" : false ,
"created_at" : "2022-03-08T12:43:43Z" ,
2022-03-10 13:14:35 +01:00
"updated_at" : "2022-03-10T07:12:50Z" ,
2022-03-08 19:14:48 +01:00
"pushed_at" : "2022-03-08T13:15:35Z" ,
2022-03-10 13:14:35 +01:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 3 ,
2022-03-08 19:14:48 +01:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-10 13:14:35 +01:00
"forks" : 3 ,
"watchers" : 1 ,
2022-03-08 19:14:48 +01:00
"score" : 0
} ,
{
"id" : 467530713 ,
"name" : "CVE-2022-0847" ,
"full_name" : "knqyf263\/CVE-2022-0847" ,
"owner" : {
"login" : "knqyf263" ,
"id" : 2253692 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4" ,
"html_url" : "https:\/\/github.com\/knqyf263"
} ,
"html_url" : "https:\/\/github.com\/knqyf263\/CVE-2022-0847" ,
"description" : "The Dirty Pipe Vulnerability" ,
"fork" : false ,
"created_at" : "2022-03-08T13:48:55Z" ,
2022-03-11 01:14:29 +01:00
"updated_at" : "2022-03-10T23:11:42Z" ,
2022-03-08 19:14:48 +01:00
"pushed_at" : "2022-03-08T13:54:08Z" ,
2022-03-11 01:14:29 +01:00
"stargazers_count" : 24 ,
"watchers_count" : 24 ,
"forks_count" : 3 ,
2022-03-08 19:14:48 +01:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-11 01:14:29 +01:00
"forks" : 3 ,
"watchers" : 24 ,
2022-03-08 19:14:48 +01:00
"score" : 0
} ,
{
"id" : 467552702 ,
"name" : "CVE-2022-0847" ,
"full_name" : "puckiestyle\/CVE-2022-0847" ,
"owner" : {
"login" : "puckiestyle" ,
"id" : 57447087 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4" ,
"html_url" : "https:\/\/github.com\/puckiestyle"
} ,
"html_url" : "https:\/\/github.com\/puckiestyle\/CVE-2022-0847" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-03-08T14:46:21Z" ,
"updated_at" : "2022-03-08T15:35:41Z" ,
2022-03-10 13:14:35 +01:00
"pushed_at" : "2022-03-10T08:10:40Z" ,
2022-03-08 19:14:48 +01:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2022-03-09 13:14:39 +01:00
"forks_count" : 1 ,
2022-03-08 19:14:48 +01:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-09 13:14:39 +01:00
"forks" : 1 ,
2022-03-08 19:14:48 +01:00
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 467569839 ,
"name" : "dirty-pipe" ,
"full_name" : "0xIronGoat\/dirty-pipe" ,
"owner" : {
"login" : "0xIronGoat" ,
"id" : 14928858 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/14928858?v=4" ,
"html_url" : "https:\/\/github.com\/0xIronGoat"
} ,
"html_url" : "https:\/\/github.com\/0xIronGoat\/dirty-pipe" ,
"description" : "Implementation of Max Kellermann's exploit for CVE-2022-0847" ,
"fork" : false ,
"created_at" : "2022-03-08T15:30:45Z" ,
2022-03-09 19:17:31 +01:00
"updated_at" : "2022-03-09T15:43:22Z" ,
2022-03-08 19:14:48 +01:00
"pushed_at" : "2022-03-08T15:47:53Z" ,
2022-03-09 19:17:31 +01:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
2022-03-09 13:14:39 +01:00
"forks_count" : 1 ,
2022-03-08 19:14:48 +01:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-09 13:14:39 +01:00
"forks" : 1 ,
2022-03-09 19:17:31 +01:00
"watchers" : 3 ,
2022-03-08 19:14:48 +01:00
"score" : 0
} ,
{
"id" : 467570864 ,
"name" : "CVE-2022-0847-DirtyPipe-Exploit" ,
"full_name" : "ITMarcin2211\/CVE-2022-0847-DirtyPipe-Exploit" ,
"owner" : {
"login" : "ITMarcin2211" ,
"id" : 60057530 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/60057530?v=4" ,
"html_url" : "https:\/\/github.com\/ITMarcin2211"
} ,
"html_url" : "https:\/\/github.com\/ITMarcin2211\/CVE-2022-0847-DirtyPipe-Exploit" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-03-08T15:33:39Z" ,
"updated_at" : "2022-03-08T15:34:46Z" ,
"pushed_at" : "2022-03-08T15:36:53Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2022-03-09 01:14:20 +01:00
"forks_count" : 1 ,
2022-03-08 19:14:48 +01:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-09 01:14:20 +01:00
"forks" : 1 ,
2022-03-08 19:14:48 +01:00
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 467602577 ,
"name" : "CVE-2022-0847-Docker" ,
"full_name" : "mrchucu1\/CVE-2022-0847-Docker" ,
"owner" : {
"login" : "mrchucu1" ,
"id" : 12802120 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/12802120?v=4" ,
"html_url" : "https:\/\/github.com\/mrchucu1"
} ,
"html_url" : "https:\/\/github.com\/mrchucu1\/CVE-2022-0847-Docker" ,
"description" : "Docker exploit" ,
"fork" : false ,
"created_at" : "2022-03-08T17:02:40Z" ,
"updated_at" : "2022-03-08T17:05:05Z" ,
"pushed_at" : "2022-03-08T17:05:01Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 467606236 ,
"name" : "CVE-2022-0847-dirty-pipe-checker" ,
"full_name" : "basharkey\/CVE-2022-0847-dirty-pipe-checker" ,
"owner" : {
"login" : "basharkey" ,
"id" : 15859442 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/15859442?v=4" ,
"html_url" : "https:\/\/github.com\/basharkey"
} ,
"html_url" : "https:\/\/github.com\/basharkey\/CVE-2022-0847-dirty-pipe-checker" ,
"description" : "Bash script to check for CVE-2022-0847 \"Dirty Pipe\"" ,
"fork" : false ,
"created_at" : "2022-03-08T17:13:24Z" ,
"updated_at" : "2022-03-08T17:14:12Z" ,
2022-03-09 01:14:20 +01:00
"pushed_at" : "2022-03-08T19:53:16Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 467662886 ,
"name" : "CVE-2022-0847" ,
"full_name" : "4luc4rdr5290\/CVE-2022-0847" ,
"owner" : {
"login" : "4luc4rdr5290" ,
"id" : 19316088 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/19316088?v=4" ,
"html_url" : "https:\/\/github.com\/4luc4rdr5290"
} ,
"html_url" : "https:\/\/github.com\/4luc4rdr5290\/CVE-2022-0847" ,
"description" : "CVE-2022-0847" ,
"fork" : false ,
"created_at" : "2022-03-08T20:18:28Z" ,
"updated_at" : "2022-03-08T20:33:46Z" ,
"pushed_at" : "2022-03-08T20:41:15Z" ,
2022-03-08 13:16:36 +01:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2022-03-08 01:14:24 +01:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-03-09 07:14:55 +01:00
} ,
{
"id" : 467741460 ,
"name" : "CVE-2022-0847_DirtyPipeExploit" ,
"full_name" : "dadhee\/CVE-2022-0847_DirtyPipeExploit" ,
"owner" : {
"login" : "dadhee" ,
"id" : 37909237 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/37909237?v=4" ,
"html_url" : "https:\/\/github.com\/dadhee"
} ,
"html_url" : "https:\/\/github.com\/dadhee\/CVE-2022-0847_DirtyPipeExploit" ,
"description" : "A “Dirty Pipe” vulnerability with CVE-2022-0847 and a CVSS score of 7.8 has been identified, affecting Linux Kernel 5.8 and higher. The vulnerability allows attackers to overwrite data in read-only files. Threat actors can exploit this vulnerability to privilege themselves with code injection." ,
"fork" : false ,
"created_at" : "2022-03-09T01:55:04Z" ,
2022-03-09 13:14:39 +01:00
"updated_at" : "2022-03-09T07:16:19Z" ,
2022-03-09 07:14:55 +01:00
"pushed_at" : "2022-03-09T02:01:28Z" ,
2022-03-09 13:14:39 +01:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 1 ,
2022-03-09 07:14:55 +01:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-09 13:14:39 +01:00
"forks" : 1 ,
"watchers" : 1 ,
2022-03-09 07:14:55 +01:00
"score" : 0
} ,
{
"id" : 467753868 ,
"name" : "CVE-2022-0847-DirtyPipe" ,
"full_name" : "Greetdawn\/CVE-2022-0847-DirtyPipe" ,
"owner" : {
"login" : "Greetdawn" ,
"id" : 28551913 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/28551913?v=4" ,
"html_url" : "https:\/\/github.com\/Greetdawn"
} ,
"html_url" : "https:\/\/github.com\/Greetdawn\/CVE-2022-0847-DirtyPipe" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-03-09T02:47:06Z" ,
"updated_at" : "2022-03-09T02:52:32Z" ,
"pushed_at" : "2022-03-09T02:54:31Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 467753881 ,
"name" : "CVE-2022-0847" ,
"full_name" : "Al1ex\/CVE-2022-0847" ,
"owner" : {
"login" : "Al1ex" ,
"id" : 38161463 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4" ,
"html_url" : "https:\/\/github.com\/Al1ex"
} ,
"html_url" : "https:\/\/github.com\/Al1ex\/CVE-2022-0847" ,
"description" : "CVE-2022-0847" ,
"fork" : false ,
"created_at" : "2022-03-09T02:47:08Z" ,
2022-03-10 07:14:25 +01:00
"updated_at" : "2022-03-10T05:44:56Z" ,
2022-03-09 07:14:55 +01:00
"pushed_at" : "2022-03-09T02:47:32Z" ,
2022-03-10 07:14:25 +01:00
"stargazers_count" : 13 ,
"watchers_count" : 13 ,
"forks_count" : 5 ,
2022-03-09 07:14:55 +01:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"cve-2022-0847"
] ,
"visibility" : "public" ,
2022-03-10 07:14:25 +01:00
"forks" : 5 ,
"watchers" : 13 ,
2022-03-09 07:14:55 +01:00
"score" : 0
} ,
{
2022-03-09 13:14:39 +01:00
"id" : 467788339 ,
"name" : "CVE-2022-0847-DirtyPipe-Exploit" ,
"full_name" : "Mustafa1986\/CVE-2022-0847-DirtyPipe-Exploit" ,
"owner" : {
"login" : "Mustafa1986" ,
"id" : 27927358 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/27927358?v=4" ,
"html_url" : "https:\/\/github.com\/Mustafa1986"
} ,
"html_url" : "https:\/\/github.com\/Mustafa1986\/CVE-2022-0847-DirtyPipe-Exploit" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-03-09T05:22:20Z" ,
2022-03-11 01:14:29 +01:00
"updated_at" : "2022-03-10T18:50:04Z" ,
2022-03-09 13:14:39 +01:00
"pushed_at" : "2022-03-09T06:16:23Z" ,
2022-03-11 01:14:29 +01:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2022-03-09 13:14:39 +01:00
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
2022-03-11 01:14:29 +01:00
"watchers" : 1 ,
2022-03-09 13:14:39 +01:00
"score" : 0
} ,
{
"id" : 467818101 ,
2022-03-09 07:14:55 +01:00
"name" : "Dirtypipe-exploit" ,
2022-03-09 13:14:39 +01:00
"full_name" : "nanaao\/Dirtypipe-exploit" ,
2022-03-09 07:14:55 +01:00
"owner" : {
2022-03-09 13:14:39 +01:00
"login" : "nanaao" ,
"id" : 77666853 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/77666853?v=4" ,
"html_url" : "https:\/\/github.com\/nanaao"
2022-03-09 07:14:55 +01:00
} ,
2022-03-09 13:14:39 +01:00
"html_url" : "https:\/\/github.com\/nanaao\/Dirtypipe-exploit" ,
2022-03-09 07:14:55 +01:00
"description" : "Dirty Pipe (CVE-2022-0847) PoC that hijacks a SUID binary to spawn. a root shell. (and attempts to restore the damaged binary as well)" ,
"fork" : false ,
2022-03-09 13:14:39 +01:00
"created_at" : "2022-03-09T07:16:57Z" ,
"updated_at" : "2022-03-09T11:39:58Z" ,
2022-03-09 07:14:55 +01:00
"pushed_at" : "2022-03-09T04:43:00Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
2022-03-09 13:14:39 +01:00
"id" : 467872655 ,
"name" : "cve-2022-0847dirtypipe-exploit" ,
"full_name" : "AyoubNajim\/cve-2022-0847dirtypipe-exploit" ,
2022-03-09 07:14:55 +01:00
"owner" : {
2022-03-09 13:14:39 +01:00
"login" : "AyoubNajim" ,
"id" : 68334573 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/68334573?v=4" ,
"html_url" : "https:\/\/github.com\/AyoubNajim"
2022-03-09 07:14:55 +01:00
} ,
2022-03-09 13:14:39 +01:00
"html_url" : "https:\/\/github.com\/AyoubNajim\/cve-2022-0847dirtypipe-exploit" ,
2022-03-09 07:14:55 +01:00
"description" : null ,
"fork" : false ,
2022-03-09 13:14:39 +01:00
"created_at" : "2022-03-09T10:05:53Z" ,
2022-03-11 01:14:29 +01:00
"updated_at" : "2022-03-10T22:58:10Z" ,
2022-03-09 13:14:39 +01:00
"pushed_at" : "2022-03-09T10:16:13Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 467878952 ,
"name" : "pentestblog-CVE-2022-0847" ,
"full_name" : "pentestblogin\/pentestblog-CVE-2022-0847" ,
"owner" : {
"login" : "pentestblogin" ,
"id" : 70894330 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/70894330?v=4" ,
"html_url" : "https:\/\/github.com\/pentestblogin"
} ,
"html_url" : "https:\/\/github.com\/pentestblogin\/pentestblog-CVE-2022-0847" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-03-09T10:24:42Z" ,
"updated_at" : "2022-03-09T10:26:10Z" ,
"pushed_at" : "2022-03-09T10:26:07Z" ,
2022-03-09 07:14:55 +01:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-03-09 19:17:31 +01:00
} ,
{
"id" : 467990193 ,
"name" : "CVE-2022-0847" ,
"full_name" : "gyaansastra\/CVE-2022-0847" ,
"owner" : {
"login" : "gyaansastra" ,
"id" : 35690123 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/35690123?v=4" ,
"html_url" : "https:\/\/github.com\/gyaansastra"
} ,
"html_url" : "https:\/\/github.com\/gyaansastra\/CVE-2022-0847" ,
"description" : "Dirty Pipe POC" ,
"fork" : false ,
"created_at" : "2022-03-09T15:44:58Z" ,
"updated_at" : "2022-03-09T15:45:37Z" ,
"pushed_at" : "2022-03-09T15:45:01Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 1 ,
"score" : 0
} ,
{
"id" : 468013377 ,
"name" : "CVE-2022-0847" ,
"full_name" : "T4t4ru\/CVE-2022-0847" ,
"owner" : {
"login" : "T4t4ru" ,
"id" : 100865104 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/100865104?v=4" ,
"html_url" : "https:\/\/github.com\/T4t4ru"
} ,
"html_url" : "https:\/\/github.com\/T4t4ru\/CVE-2022-0847" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-03-09T16:47:36Z" ,
"updated_at" : "2022-03-09T16:54:55Z" ,
2022-03-10 19:14:31 +01:00
"pushed_at" : "2022-03-10T13:57:29Z" ,
2022-03-09 19:17:31 +01:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-03-10 07:14:25 +01:00
} ,
{
"id" : 468143759 ,
"name" : "CVE-2022-0847" ,
"full_name" : "babyshen\/CVE-2022-0847" ,
"owner" : {
"login" : "babyshen" ,
"id" : 11402197 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/11402197?v=4" ,
"html_url" : "https:\/\/github.com\/babyshen"
} ,
"html_url" : "https:\/\/github.com\/babyshen\/CVE-2022-0847" ,
"description" : "A root exploit for CVE-2022-0847 (Dirty Pipe)" ,
"fork" : false ,
"created_at" : "2022-03-10T00:54:11Z" ,
"updated_at" : "2022-03-10T01:00:55Z" ,
"pushed_at" : "2022-03-10T01:02:13Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 468148868 ,
"name" : "CVE-2022-0847-Linux" ,
"full_name" : "edsonjt81\/CVE-2022-0847-Linux" ,
"owner" : {
"login" : "edsonjt81" ,
"id" : 27496739 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/27496739?v=4" ,
"html_url" : "https:\/\/github.com\/edsonjt81"
} ,
"html_url" : "https:\/\/github.com\/edsonjt81\/CVE-2022-0847-Linux" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-03-10T01:18:26Z" ,
"updated_at" : "2022-03-10T01:18:36Z" ,
"pushed_at" : "2022-03-10T01:18:33Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 468151065 ,
"name" : "CVE-2022-0847" ,
"full_name" : "chenaotian\/CVE-2022-0847" ,
"owner" : {
"login" : "chenaotian" ,
"id" : 86546351 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/86546351?v=4" ,
"html_url" : "https:\/\/github.com\/chenaotian"
} ,
"html_url" : "https:\/\/github.com\/chenaotian\/CVE-2022-0847" ,
"description" : "CVE-2022-0847 POC and Docker and Analysis write up" ,
"fork" : false ,
"created_at" : "2022-03-10T01:27:29Z" ,
"updated_at" : "2022-03-10T06:07:10Z" ,
"pushed_at" : "2022-03-10T01:31:57Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 1 ,
"score" : 0
2022-03-10 19:14:31 +01:00
} ,
{
"id" : 468352446 ,
"name" : "CVE-2022-0847-DirtyPipe-Exploit" ,
"full_name" : "V0WKeep3r\/CVE-2022-0847-DirtyPipe-Exploit" ,
"owner" : {
"login" : "V0WKeep3r" ,
"id" : 78677532 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/78677532?v=4" ,
"html_url" : "https:\/\/github.com\/V0WKeep3r"
} ,
"html_url" : "https:\/\/github.com\/V0WKeep3r\/CVE-2022-0847-DirtyPipe-Exploit" ,
"description" : "CVE-2022-0847-DirtyPipe-Exploit" ,
"fork" : false ,
"created_at" : "2022-03-10T13:23:52Z" ,
"updated_at" : "2022-03-10T13:40:33Z" ,
"pushed_at" : "2022-03-10T13:41:19Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 468416712 ,
"name" : "CVE-2022-0847-Dirty-Pipe" ,
"full_name" : "michaelklaan\/CVE-2022-0847-Dirty-Pipe" ,
"owner" : {
"login" : "michaelklaan" ,
"id" : 40411471 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/40411471?v=4" ,
"html_url" : "https:\/\/github.com\/michaelklaan"
} ,
"html_url" : "https:\/\/github.com\/michaelklaan\/CVE-2022-0847-Dirty-Pipe" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-03-10T16:09:16Z" ,
"updated_at" : "2022-03-10T16:10:15Z" ,
"pushed_at" : "2022-03-10T16:09:25Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-03-11 01:14:29 +01:00
} ,
{
"id" : 468496897 ,
"name" : "dirtyPipe-automaticRoot" ,
"full_name" : "terabitSec\/dirtyPipe-automaticRoot" ,
"owner" : {
"login" : "terabitSec" ,
"id" : 100799842 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/100799842?v=4" ,
"html_url" : "https:\/\/github.com\/terabitSec"
} ,
"html_url" : "https:\/\/github.com\/terabitSec\/dirtyPipe-automaticRoot" ,
"description" : "CVE-2022-0847 Python exploit to get root or write a no write permission, immutable or read-only mounted file." ,
"fork" : false ,
"created_at" : "2022-03-10T20:15:07Z" ,
"updated_at" : "2022-03-10T20:47:19Z" ,
"pushed_at" : "2022-03-10T22:09:09Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"cve-2022-0847" ,
"dirty-pipe" ,
"exploit" ,
"privilege-escalation-exploits" ,
"python3-10"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0
2022-03-07 19:17:15 +01:00
}
]