PoC-in-GitHub/2025/CVE-2025-9074.json
2025-12-17 03:45:17 +09:00

304 lines
No EOL
11 KiB
JSON

[
{
"id": 1044105387,
"name": "CVE-2025-9074",
"full_name": "zenzue\/CVE-2025-9074",
"owner": {
"login": "zenzue",
"id": 19271340,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19271340?v=4",
"html_url": "https:\/\/github.com\/zenzue",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zenzue\/CVE-2025-9074",
"description": null,
"fork": false,
"created_at": "2025-08-25T07:36:35Z",
"updated_at": "2025-12-09T12:57:22Z",
"pushed_at": "2025-08-25T07:47:29Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 11,
"score": 0,
"subscribers_count": 0
},
{
"id": 1049963972,
"name": "CVE-2025-9074",
"full_name": "j3r1ch0123\/CVE-2025-9074",
"owner": {
"login": "j3r1ch0123",
"id": 110147529,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110147529?v=4",
"html_url": "https:\/\/github.com\/j3r1ch0123",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/j3r1ch0123\/CVE-2025-9074",
"description": "New vulnerability found in Docker. Credit for finding the vulnerability goes to Felix Boulet",
"fork": false,
"created_at": "2025-09-03T18:46:52Z",
"updated_at": "2025-12-13T21:04:44Z",
"pushed_at": "2025-09-03T18:54:41Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 7,
"score": 0,
"subscribers_count": 0
},
{
"id": 1060505002,
"name": "CVE-2025-9074",
"full_name": "pucagit\/CVE-2025-9074",
"owner": {
"login": "pucagit",
"id": 93117777,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93117777?v=4",
"html_url": "https:\/\/github.com\/pucagit",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/pucagit\/CVE-2025-9074",
"description": null,
"fork": false,
"created_at": "2025-09-20T03:31:16Z",
"updated_at": "2025-12-12T15:02:15Z",
"pushed_at": "2025-09-20T03:38:07Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 1111403249,
"name": "CVE-2025-9074-PoC",
"full_name": "BridgerAlderson\/CVE-2025-9074-PoC",
"owner": {
"login": "BridgerAlderson",
"id": 139403792,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/139403792?v=4",
"html_url": "https:\/\/github.com\/BridgerAlderson",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/BridgerAlderson\/CVE-2025-9074-PoC",
"description": "A vulnerability has been identified in Docker Desktop. A remote attacker could exploit this vulnerability to trigger security restriction bypass on the targeted system.",
"fork": false,
"created_at": "2025-12-06T21:38:19Z",
"updated_at": "2025-12-16T13:09:14Z",
"pushed_at": "2025-12-07T12:16:59Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
},
{
"id": 1111658273,
"name": "poc-2025-9074",
"full_name": "xwpdx0\/poc-2025-9074",
"owner": {
"login": "xwpdx0",
"id": 162915223,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/162915223?v=4",
"html_url": "https:\/\/github.com\/xwpdx0",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/xwpdx0\/poc-2025-9074",
"description": "Docker API CVE-2025-9074 PoC (Proof-Of-Concept). A sophisticated exploitation framework for CVE-2025-9074, targeting unauthenticated Docker API endpoints with an integrated interactive command shell.",
"fork": false,
"created_at": "2025-12-07T11:49:52Z",
"updated_at": "2025-12-09T22:49:51Z",
"pushed_at": "2025-12-09T22:49:48Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"api",
"cve-2025-9074",
"docker",
"docker-api",
"poc"
],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 0
},
{
"id": 1113003164,
"name": "CVE-2025-9074-Docker-Desktop-Container-Escape",
"full_name": "PtechAmanja\/CVE-2025-9074-Docker-Desktop-Container-Escape",
"owner": {
"login": "PtechAmanja",
"id": 91968404,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91968404?v=4",
"html_url": "https:\/\/github.com\/PtechAmanja",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/PtechAmanja\/CVE-2025-9074-Docker-Desktop-Container-Escape",
"description": " Proof of concept exploit for CVE-2025-9074 - Unauthenticated Docker Engine API container escape affecting Docker Desktop < 4.44.3 on Windows and macOS (CVSS 9.3)",
"fork": false,
"created_at": "2025-12-09T11:46:54Z",
"updated_at": "2025-12-15T17:27:14Z",
"pushed_at": "2025-12-09T12:34:39Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2025-9074",
"docker"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 1113530269,
"name": "CVE-2025-9074-PoC-Bash",
"full_name": "pppxo\/CVE-2025-9074-PoC-Bash",
"owner": {
"login": "pppxo",
"id": 50279784,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50279784?v=4",
"html_url": "https:\/\/github.com\/pppxo",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/pppxo\/CVE-2025-9074-PoC-Bash",
"description": null,
"fork": false,
"created_at": "2025-12-10T05:25:54Z",
"updated_at": "2025-12-11T06:30:15Z",
"pushed_at": "2025-12-10T05:56:31Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 1113970676,
"name": "CVE-2025-9074-POC",
"full_name": "3rendil\/CVE-2025-9074-POC",
"owner": {
"login": "3rendil",
"id": 146058402,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/146058402?v=4",
"html_url": "https:\/\/github.com\/3rendil",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/3rendil\/CVE-2025-9074-POC",
"description": "Proof-of-Concept exploit for CVE-2025-9074",
"fork": false,
"created_at": "2025-12-10T18:06:02Z",
"updated_at": "2025-12-10T18:20:43Z",
"pushed_at": "2025-12-10T18:11:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1116432087,
"name": "CVE-2025-9074_DAEMON_KILLER",
"full_name": "fsoc-ghost-0x\/CVE-2025-9074_DAEMON_KILLER",
"owner": {
"login": "fsoc-ghost-0x",
"id": 171997927,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/171997927?v=4",
"html_url": "https:\/\/github.com\/fsoc-ghost-0x",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/fsoc-ghost-0x\/CVE-2025-9074_DAEMON_KILLER",
"description": "The Ultimate DAEMON_KILLER. Control is an illusion. This Exploit forces CVE-2025-9074 to break the Docker cage. Advanced Container Escape & Root Escalation toolkit. Verify the vulnerability, take the host, destroy the logs. > We Are Fsociety_",
"fork": false,
"created_at": "2025-12-14T21:01:03Z",
"updated_at": "2025-12-15T02:59:55Z",
"pushed_at": "2025-12-15T02:59:52Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"bash",
"c0deghost",
"cve-2025-9074",
"docker",
"docker-escape",
"exploit",
"fsociety",
"linux-hacking",
"offensive-security",
"privilege-escalation",
"red-team",
"root",
"windows"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]