Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape) | https://github.com/q3k/cve-2019-5736-poc | POC Details |
| 2 | PoC for CVE-2019-5736 | https://github.com/Frichetten/CVE-2019-5736-PoC | POC Details |
| 3 | runc容器逃逸漏洞预警 | https://github.com/jas502n/CVE-2019-5736 | POC Details |
| 4 | None | https://github.com/likescam/CVE-2019-5736 | POC Details |
| 5 | None | https://github.com/likescam/cve-2019-5736-poc | POC Details |
| 6 | getshell test | https://github.com/agppp/cve-2019-5736-poc | POC Details |
| 7 | None | https://github.com/b3d3c/poc-cve-2019-5736 | POC Details |
| 8 | CVE-2019-5736 POCs | https://github.com/twistlock/RunC-CVE-2019-5736 | POC Details |
| 9 | None | https://github.com/yyqs2008/CVE-2019-5736-PoC-2 | POC Details |
| 10 | https://nvd.nist.gov/vuln/detail/CVE-2019-5736 poc of CVE-2019-5736 | https://github.com/zyriuse75/CVE-2019-5736-PoC | POC Details |
| 11 | None | https://github.com/stillan00b/CVE-2019-5736 | POC Details |
| 12 | Exploit for the CVE-2019-5736 runc vulnerability | https://github.com/milloni/cve-2019-5736-exp | POC Details |
| 13 | Docker runc CVE-2019-5736 exploit Dockerfile. Credits : https://github.com/Frichetten/CVE-2019-5736-PoC.git | https://github.com/panzouh/Docker-Runc-Exploit | POC Details |
| 14 | Proof of concept code for breaking out of docker via runC | https://github.com/RyanNgWH/CVE-2019-5736-POC | POC Details |
| 15 | None | https://github.com/Lee-SungYoung/cve-2019-5736-study | POC Details |
| 16 | None | https://github.com/chosam2/cve-2019-5736-poc | POC Details |
| 17 | Code sample for using exploit CVE-2019-5736 to mine bitcoin with no association to original container or user. | https://github.com/epsteina16/Docker-Escape-Miner | POC Details |
| 18 | None | https://github.com/geropl/CVE-2019-5736 | POC Details |
| 19 | CVE-2019-5736 implemented in a self-written container runtime to understand the exploit. | https://github.com/GiverOfGifts/CVE-2019-5736-Custom-Runtime | POC Details |
| 20 | None | https://github.com/Billith/CVE-2019-5736-PoC | POC Details |
| 21 | None | https://github.com/BBRathnayaka/POC-CVE-2019-5736 | POC Details |
| 22 | CVE-2019-5736 | https://github.com/shen54/IT19172088 | POC Details |
| 23 | None | https://github.com/crypticdante/CVE-2019-5736 | POC Details |
| 24 | Modified version of CVE-2019-5736-PoC by Frichetten | https://github.com/fahmifj/Docker-breakout-runc | POC Details |
| 25 | None | https://github.com/Asbatel/CVE-2019-5736_POC | POC Details |
| 26 | None | https://github.com/takumak/cve-2019-5736-reproducer | POC Details |
| 27 | None | https://github.com/si1ent-le/CVE-2019-5736 | POC Details |
| 28 | None | https://github.com/H3xL00m/CVE-2019-5736 | POC Details |
| 29 | None | https://github.com/n3ov4n1sh/CVE-2019-5736 | POC Details |
| 30 | None | https://github.com/c0d3cr4f73r/CVE-2019-5736 | POC Details |
| 31 | None | https://github.com/Sp3c73rSh4d0w/CVE-2019-5736 | POC Details |
| 32 | None | https://github.com/0xwh1pl4sh/CVE-2019-5736 | POC Details |
| 33 | None | https://github.com/N3rdyN3xus/CVE-2019-5736 | POC Details |
| 34 | None | https://github.com/NyxByt3/CVE-2019-5736 | POC Details |
| 35 | None | https://github.com/likekabin/CVE-2019-5736 | POC Details |
| 36 | None | https://github.com/likekabin/cve-2019-5736-poc | POC Details |
| 37 | None | https://github.com/h3xcr4ck3r/CVE-2019-5736 | POC Details |
| 38 | None | https://github.com/n3rdh4x0r/CVE-2019-5736 | POC Details |
| 39 | Description of the Project goes here | https://github.com/sonyavalo/CVE-2019-5736-attack-and-security-mechanism | POC Details |
| 40 | In this project, we found a recent attack through the malicious container and implemented a security mechanism to stop it. | https://github.com/sonyavalo/CVE-2019-5736-Dockerattack-and-security-mechanism | POC Details |
| 41 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%BA%91%E5%AE%89%E5%85%A8%E6%BC%8F%E6%B4%9E/Docker%20runC%20%E6%BC%8F%E6%B4%9E%E5%AF%BC%E8%87%B4%E5%AE%B9%E5%99%A8%E9%80%83%E9%80%B8%20CVE-2019-5736.md | POC Details |
| 42 | None | https://github.com/h3x0v3rl0rd/CVE-2019-5736 | POC Details |
| 43 | C-based PoC for CVE-2019-5736 | https://github.com/Perimora/cve_2019-5736-PoC | POC Details |
| 44 | None | https://github.com/h-wookie/cve-2019-5736-poc | POC Details |
| 45 | This repository provides a high-fidelity technical deconstruction and production-ready exploitation suite for CVE-2019-5736. It demonstrates how a root user inside a container can achieve a Host Root Shell by overwriting the host runc binary using an OverlayFS mount and ld.so.preload manipulation. | https://github.com/sastraadiwiguna-purpleeliteteaming/Holistic-Deconstruction-of-CVE-2019-5736- | POC Details |
No public POC found.
Login to generate AI POCNo comments yet