PoC-in-GitHub/2022/CVE-2022-0492.json
2025-01-08 09:32:44 +09:00

226 lines
No EOL
7.9 KiB
JSON

[
{
"id": 464299568,
"name": "can-ctr-escape-cve-2022-0492",
"full_name": "PaloAltoNetworks\/can-ctr-escape-cve-2022-0492",
"owner": {
"login": "PaloAltoNetworks",
"id": 4855743,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4855743?v=4",
"html_url": "https:\/\/github.com\/PaloAltoNetworks",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/PaloAltoNetworks\/can-ctr-escape-cve-2022-0492",
"description": "Test whether a container environment is vulnerable to container escapes via CVE-2022-0492",
"fork": false,
"created_at": "2022-02-28T01:25:26Z",
"updated_at": "2024-11-05T04:01:34Z",
"pushed_at": "2022-03-09T00:09:46Z",
"stargazers_count": 47,
"watchers_count": 47,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 47,
"score": 0,
"subscribers_count": 6
},
{
"id": 466710055,
"name": "CVE-2022-0492-Checker",
"full_name": "SofianeHamlaoui\/CVE-2022-0492-Checker",
"owner": {
"login": "SofianeHamlaoui",
"id": 16967174,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16967174?v=4",
"html_url": "https:\/\/github.com\/SofianeHamlaoui",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/SofianeHamlaoui\/CVE-2022-0492-Checker",
"description": "A script to check if a container environment is vulnerable to container escapes via CVE-2022-0492",
"fork": false,
"created_at": "2022-03-06T10:57:09Z",
"updated_at": "2024-08-12T20:21:17Z",
"pushed_at": "2022-03-12T13:45:32Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 9,
"score": 0,
"subscribers_count": 3
},
{
"id": 468660841,
"name": "CVE-2022-0492",
"full_name": "chenaotian\/CVE-2022-0492",
"owner": {
"login": "chenaotian",
"id": 86546351,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86546351?v=4",
"html_url": "https:\/\/github.com\/chenaotian",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/chenaotian\/CVE-2022-0492",
"description": "CVE-2022-0492 EXP and Analysis write up",
"fork": false,
"created_at": "2022-03-11T08:02:46Z",
"updated_at": "2024-08-12T20:21:27Z",
"pushed_at": "2022-03-11T09:33:24Z",
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 28,
"score": 0,
"subscribers_count": 3
},
{
"id": 471620496,
"name": "CVE-2022-0492",
"full_name": "bb33bb\/CVE-2022-0492",
"owner": {
"login": "bb33bb",
"id": 5463104,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5463104?v=4",
"html_url": "https:\/\/github.com\/bb33bb",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/bb33bb\/CVE-2022-0492",
"description": null,
"fork": false,
"created_at": "2022-03-19T07:13:56Z",
"updated_at": "2023-12-23T11:27:56Z",
"pushed_at": "2022-03-07T10:03:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 490291933,
"name": "device_renesas_kernel_AOSP10_r33_CVE-2022-0492",
"full_name": "Trinadh465\/device_renesas_kernel_AOSP10_r33_CVE-2022-0492",
"owner": {
"login": "Trinadh465",
"id": 102574296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
"html_url": "https:\/\/github.com\/Trinadh465",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Trinadh465\/device_renesas_kernel_AOSP10_r33_CVE-2022-0492",
"description": null,
"fork": false,
"created_at": "2022-05-09T13:20:03Z",
"updated_at": "2023-03-10T01:12:55Z",
"pushed_at": "2022-05-09T13:23:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 529476500,
"name": "CVE-2022-0492-Container-Escape",
"full_name": "yoeelingBin\/CVE-2022-0492-Container-Escape",
"owner": {
"login": "yoeelingBin",
"id": 57822313,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57822313?v=4",
"html_url": "https:\/\/github.com\/yoeelingBin",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/yoeelingBin\/CVE-2022-0492-Container-Escape",
"description": "CVE-2022-0492-Container-Escape",
"fork": false,
"created_at": "2022-08-27T04:02:24Z",
"updated_at": "2022-09-16T14:15:14Z",
"pushed_at": "2022-08-28T08:19:56Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 603301567,
"name": "CVE-2022-0492-Docker-Breakout-Checker-and-PoC",
"full_name": "T1erno\/CVE-2022-0492-Docker-Breakout-Checker-and-PoC",
"owner": {
"login": "T1erno",
"id": 78065668,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78065668?v=4",
"html_url": "https:\/\/github.com\/T1erno",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/T1erno\/CVE-2022-0492-Docker-Breakout-Checker-and-PoC",
"description": "Docker Breakout Checker and PoC via CAP_SYS_ADMIN and via user namespaces (CVE-2022-0492)",
"fork": false,
"created_at": "2023-02-18T04:48:25Z",
"updated_at": "2024-12-07T15:11:22Z",
"pushed_at": "2023-02-18T05:28:02Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2022-0492",
"docker-breakout",
"hacking",
"pentesting",
"privesc"
],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}
]