Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape) | https://github.com/q3k/cve-2019-5736-poc | POC Details |
| 2 | PoC for CVE-2019-5736 | https://github.com/Frichetten/CVE-2019-5736-PoC | POC Details |
| 3 | runc容器逃逸漏洞预警 | https://github.com/jas502n/CVE-2019-5736 | POC Details |
| 4 | None | https://github.com/likescam/CVE-2019-5736 | POC Details |
| 5 | None | https://github.com/likescam/cve-2019-5736-poc | POC Details |
| 6 | getshell test | https://github.com/agppp/cve-2019-5736-poc | POC Details |
| 7 | None | https://github.com/b3d3c/poc-cve-2019-5736 | POC Details |
| 8 | CVE-2019-5736 POCs | https://github.com/twistlock/RunC-CVE-2019-5736 | POC Details |
| 9 | None | https://github.com/yyqs2008/CVE-2019-5736-PoC-2 | POC Details |
| 10 | https://nvd.nist.gov/vuln/detail/CVE-2019-5736 poc of CVE-2019-5736 | https://github.com/zyriuse75/CVE-2019-5736-PoC | POC Details |
| 11 | None | https://github.com/stillan00b/CVE-2019-5736 | POC Details |
| 12 | Exploit for the CVE-2019-5736 runc vulnerability | https://github.com/milloni/cve-2019-5736-exp | POC Details |
| 13 | Docker runc CVE-2019-5736 exploit Dockerfile. Credits : https://github.com/Frichetten/CVE-2019-5736-PoC.git | https://github.com/panzouh/Docker-Runc-Exploit | POC Details |
| 14 | Proof of concept code for breaking out of docker via runC | https://github.com/RyanNgWH/CVE-2019-5736-POC | POC Details |
| 15 | None | https://github.com/Lee-SungYoung/cve-2019-5736-study | POC Details |
| 16 | None | https://github.com/chosam2/cve-2019-5736-poc | POC Details |
| 17 | Code sample for using exploit CVE-2019-5736 to mine bitcoin with no association to original container or user. | https://github.com/epsteina16/Docker-Escape-Miner | POC Details |
| 18 | None | https://github.com/geropl/CVE-2019-5736 | POC Details |
| 19 | CVE-2019-5736 implemented in a self-written container runtime to understand the exploit. | https://github.com/GiverOfGifts/CVE-2019-5736-Custom-Runtime | POC Details |
| 20 | None | https://github.com/Billith/CVE-2019-5736-PoC | POC Details |
| 21 | None | https://github.com/BBRathnayaka/POC-CVE-2019-5736 | POC Details |
| 22 | CVE-2019-5736 | https://github.com/shen54/IT19172088 | POC Details |
| 23 | None | https://github.com/crypticdante/CVE-2019-5736 | POC Details |
| 24 | Modified version of CVE-2019-5736-PoC by Frichetten | https://github.com/fahmifj/Docker-breakout-runc | POC Details |
| 25 | None | https://github.com/Asbatel/CVE-2019-5736_POC | POC Details |
| 26 | None | https://github.com/takumak/cve-2019-5736-reproducer | POC Details |
| 27 | None | https://github.com/si1ent-le/CVE-2019-5736 | POC Details |
| 28 | None | https://github.com/H3xL00m/CVE-2019-5736 | POC Details |
| 29 | None | https://github.com/n3ov4n1sh/CVE-2019-5736 | POC Details |
| 30 | None | https://github.com/c0d3cr4f73r/CVE-2019-5736 | POC Details |
| 31 | None | https://github.com/Sp3c73rSh4d0w/CVE-2019-5736 | POC Details |
| 32 | None | https://github.com/0xwh1pl4sh/CVE-2019-5736 | POC Details |
| 33 | None | https://github.com/N3rdyN3xus/CVE-2019-5736 | POC Details |
| 34 | None | https://github.com/NyxByt3/CVE-2019-5736 | POC Details |
| 35 | None | https://github.com/likekabin/CVE-2019-5736 | POC Details |
| 36 | None | https://github.com/likekabin/cve-2019-5736-poc | POC Details |
| 37 | None | https://github.com/h3xcr4ck3r/CVE-2019-5736 | POC Details |
| 38 | None | https://github.com/n3rdh4x0r/CVE-2019-5736 | POC Details |
| 39 | Description of the Project goes here | https://github.com/sonyavalo/CVE-2019-5736-attack-and-security-mechanism | POC Details |
| 40 | In this project, we found a recent attack through the malicious container and implemented a security mechanism to stop it. | https://github.com/sonyavalo/CVE-2019-5736-Dockerattack-and-security-mechanism | POC Details |
| 41 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%BA%91%E5%AE%89%E5%85%A8%E6%BC%8F%E6%B4%9E/Docker%20runC%20%E6%BC%8F%E6%B4%9E%E5%AF%BC%E8%87%B4%E5%AE%B9%E5%99%A8%E9%80%83%E9%80%B8%20CVE-2019-5736.md | POC Details |
| 42 | None | https://github.com/h3x0v3rl0rd/CVE-2019-5736 | POC Details |
| 43 | C-based PoC for CVE-2019-5736 | https://github.com/Perimora/cve_2019-5736-PoC | POC Details |
| 44 | None | https://github.com/h-wookie/cve-2019-5736-poc | POC Details |
| 45 | This repository provides a high-fidelity technical deconstruction and production-ready exploitation suite for CVE-2019-5736. It demonstrates how a root user inside a container can achieve a Host Root Shell by overwriting the host runc binary using an OverlayFS mount and ld.so.preload manipulation. | https://github.com/sastraadiwiguna-purpleeliteteaming/Holistic-Deconstruction-of-CVE-2019-5736- | POC Details |
No public POC found.
Login to generate AI POC| CVE-2019-7722 | PMD 安全漏洞 | |
| CVE-2019-7748 | DbNinja 跨站脚本漏洞 | |
| CVE-2019-7747 | DbNinja 安全漏洞 | |
| CVE-2019-7738 | C.P.Sub 跨站请求伪造漏洞 | |
| CVE-2019-7737 | Verydows 跨站请求伪造漏洞 | |
| CVE-2019-6489 | 多款Lexmark产品输入验证错误漏洞 | |
| CVE-2018-18569 | Dundas BI server 安全漏洞 | |
| CVE-2019-7736 | D-Link DIR-600M C1 授权问题漏洞 | |
| CVE-2019-7733 | LIVE555 Media Server 输入验证错误漏洞 | |
| CVE-2019-7732 | LIVE555 资源管理错误漏洞 | |
| CVE-2019-7731 | MyWebSQL 代码注入漏洞 | |
| CVE-2019-7730 | MyWebSQL 跨站请求伪造漏洞 | |
| CVE-2018-15588 | MailMate 输入验证错误漏洞 | |
| CVE-2018-15587 | GNOME Evolution 数据伪造问题漏洞 | |
| CVE-2018-15586 | Enigmail 数据伪造问题漏洞 | |
| CVE-2018-20772 | Frog CMS 代码注入漏洞 | |
| CVE-2019-6975 | Django 资源管理错误漏洞 | |
| CVE-2018-20587 | Bitcoin Core和Bitcoin Knots 访问控制错误漏洞 | |
| CVE-2019-7721 | nc-cms 安全漏洞 | |
| CVE-2019-7720 | taocms 代码注入漏洞 |
Showing top 20 of 31 CVEs. View all on vendor page → →
No comments yet