PoC-in-GitHub/2022/CVE-2022-0492.json
2023-09-28 21:53:01 +09:00

219 lines
No EOL
7.6 KiB
JSON

[
{
"id": 464299568,
"name": "can-ctr-escape-cve-2022-0492",
"full_name": "PaloAltoNetworks\/can-ctr-escape-cve-2022-0492",
"owner": {
"login": "PaloAltoNetworks",
"id": 4855743,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4855743?v=4",
"html_url": "https:\/\/github.com\/PaloAltoNetworks"
},
"html_url": "https:\/\/github.com\/PaloAltoNetworks\/can-ctr-escape-cve-2022-0492",
"description": "Test whether a container environment is vulnerable to container escapes via CVE-2022-0492",
"fork": false,
"created_at": "2022-02-28T01:25:26Z",
"updated_at": "2023-06-15T13:34:33Z",
"pushed_at": "2022-03-09T00:09:46Z",
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 46,
"score": 0,
"subscribers_count": 6
},
{
"id": 466710055,
"name": "CVE-2022-0492-Checker",
"full_name": "SofianeHamlaoui\/CVE-2022-0492-Checker",
"owner": {
"login": "SofianeHamlaoui",
"id": 16967174,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16967174?v=4",
"html_url": "https:\/\/github.com\/SofianeHamlaoui"
},
"html_url": "https:\/\/github.com\/SofianeHamlaoui\/CVE-2022-0492-Checker",
"description": "A script to check if a container environment is vulnerable to container escapes via CVE-2022-0492",
"fork": false,
"created_at": "2022-03-06T10:57:09Z",
"updated_at": "2023-09-28T11:36:45Z",
"pushed_at": "2022-03-12T13:45:32Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 11,
"score": 0,
"subscribers_count": 3
},
{
"id": 467038274,
"name": "CVE-2022-0492",
"full_name": "puckiestyle\/CVE-2022-0492",
"owner": {
"login": "puckiestyle",
"id": 57447087,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
"html_url": "https:\/\/github.com\/puckiestyle"
},
"html_url": "https:\/\/github.com\/puckiestyle\/CVE-2022-0492",
"description": null,
"fork": false,
"created_at": "2022-03-07T10:03:17Z",
"updated_at": "2023-08-08T03:40:16Z",
"pushed_at": "2022-03-07T10:03:26Z",
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 22,
"score": 0,
"subscribers_count": 2
},
{
"id": 468660841,
"name": "CVE-2022-0492",
"full_name": "chenaotian\/CVE-2022-0492",
"owner": {
"login": "chenaotian",
"id": 86546351,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86546351?v=4",
"html_url": "https:\/\/github.com\/chenaotian"
},
"html_url": "https:\/\/github.com\/chenaotian\/CVE-2022-0492",
"description": "CVE-2022-0492 EXP and Analysis write up",
"fork": false,
"created_at": "2022-03-11T08:02:46Z",
"updated_at": "2023-09-28T11:36:56Z",
"pushed_at": "2022-03-11T09:33:24Z",
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 23,
"score": 0,
"subscribers_count": 3
},
{
"id": 490291933,
"name": "device_renesas_kernel_AOSP10_r33_CVE-2022-0492",
"full_name": "Trinadh465\/device_renesas_kernel_AOSP10_r33_CVE-2022-0492",
"owner": {
"login": "Trinadh465",
"id": 102574296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
"html_url": "https:\/\/github.com\/Trinadh465"
},
"html_url": "https:\/\/github.com\/Trinadh465\/device_renesas_kernel_AOSP10_r33_CVE-2022-0492",
"description": null,
"fork": false,
"created_at": "2022-05-09T13:20:03Z",
"updated_at": "2023-03-10T01:12:55Z",
"pushed_at": "2022-05-09T13:23:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 529476500,
"name": "CVE-2022-0492-Container-Escape",
"full_name": "yoeelingBin\/CVE-2022-0492-Container-Escape",
"owner": {
"login": "yoeelingBin",
"id": 57822313,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57822313?v=4",
"html_url": "https:\/\/github.com\/yoeelingBin"
},
"html_url": "https:\/\/github.com\/yoeelingBin\/CVE-2022-0492-Container-Escape",
"description": "CVE-2022-0492-Container-Escape",
"fork": false,
"created_at": "2022-08-27T04:02:24Z",
"updated_at": "2022-09-16T14:15:14Z",
"pushed_at": "2022-08-28T08:19:56Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 603301567,
"name": "CVE-2022-0492-Docker-Breakout-Checker-and-PoC",
"full_name": "T1erno\/CVE-2022-0492-Docker-Breakout-Checker-and-PoC",
"owner": {
"login": "T1erno",
"id": 78065668,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78065668?v=4",
"html_url": "https:\/\/github.com\/T1erno"
},
"html_url": "https:\/\/github.com\/T1erno\/CVE-2022-0492-Docker-Breakout-Checker-and-PoC",
"description": "Docker Breakout Checker and PoC via CAP_SYS_ADMIN and via user namespaces (CVE-2022-0492)",
"fork": false,
"created_at": "2023-02-18T04:48:25Z",
"updated_at": "2023-05-30T00:56:36Z",
"pushed_at": "2023-02-18T05:28:02Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2022-0492",
"docker-breakout",
"hacking",
"pentesting",
"privesc"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]