Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | kernel | Linux Kernel 5.17 rc6 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | This is the story of CVE-2022-0847, a vulnerability in the Linux kernel since 5.8 which allows overwriting data in arbitrary read-only files. This leads to privilege escalation because unprivileged processes can inject code into root processes. | https://github.com/Udyz/CVE-2022-0847 | POC Details |
| 2 | CVE-2022-0847 | https://github.com/bbaranoff/CVE-2022-0847 | POC Details |
| 3 | Vulnerability in the Linux kernel since 5.8 | https://github.com/xndpxs/CVE-2022-0847 | POC Details |
| 4 | CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe” | https://github.com/r1is/CVE-2022-0847 | POC Details |
| 5 | A root exploit for CVE-2022-0847 (Dirty Pipe) | https://github.com/Arinerron/CVE-2022-0847-DirtyPipe-Exploit | POC Details |
| 6 | 66666 | https://github.com/2xYuan/CVE-2022-0847 | POC Details |
| 7 | CVE-2022-0847 exploit one liner | https://github.com/crowsec-edtech/Dirty-Pipe | POC Details |
| 8 | None | https://github.com/lucksec/CVE-2022-0847 | POC Details |
| 9 | CVE-2022-0487 | https://github.com/si1ent-le/CVE-2022-0847 | POC Details |
| 10 | None | https://github.com/bohr777/cve-2022-0847dirtypipe-exploit | POC Details |
| 11 | Linux Kernel Local Privilege Escalation Vulnerability CVE-2022-0847. | https://github.com/antx-code/CVE-2022-0847 | POC Details |
| 12 | An exploit for CVE-2022-0847 dirty-pipe vulnerability | https://github.com/cspshivam/CVE-2022-0847-dirty-pipe-exploit | POC Details |
| 13 | CVE-2022-0847 DirtyPipe Exploit. | https://github.com/febinrev/dirtypipez-exploit | POC Details |
| 14 | CVE-2022-0847: Linux Kernel Privilege Escalation Vulnerability | https://github.com/ahrixia/CVE_2022_0847 | POC Details |
| 15 | The Dirty Pipe Vulnerability | https://github.com/knqyf263/CVE-2022-0847 | POC Details |
| 16 | None | https://github.com/puckiestyle/CVE-2022-0847 | POC Details |
| 17 | Implementation of Max Kellermann's exploit for CVE-2022-0847 | https://github.com/0xIronGoat/dirty-pipe | POC Details |
| 18 | None | https://github.com/ITMarcin2211/CVE-2022-0847-DirtyPipe-Exploit | POC Details |
| 19 | Docker exploit | https://github.com/mrchucu1/CVE-2022-0847-Docker | POC Details |
| 20 | Bash script to check for CVE-2022-0847 "Dirty Pipe" | https://github.com/basharkey/CVE-2022-0847-dirty-pipe-checker | POC Details |
| 21 | CVE-2022-0847 | https://github.com/4luc4rdr5290/CVE-2022-0847 | POC Details |
| 22 | A “Dirty Pipe” vulnerability with CVE-2022-0847 and a CVSS score of 7.8 has been identified, affecting Linux Kernel 5.8 and higher. The vulnerability allows attackers to overwrite data in read-only files. Threat actors can exploit this vulnerability to privilege themselves with code injection. | https://github.com/dadhee/CVE-2022-0847_DirtyPipeExploit | POC Details |
| 23 | None | https://github.com/Greetdawn/CVE-2022-0847-DirtyPipe | POC Details |
| 24 | CVE-2022-0847 | https://github.com/Al1ex/CVE-2022-0847 | POC Details |
| 25 | None | https://github.com/Mustafa1986/CVE-2022-0847-DirtyPipe-Exploit | POC Details |
| 26 | Dirty Pipe (CVE-2022-0847) PoC that hijacks a SUID binary to spawn. a root shell. (and attempts to restore the damaged binary as well) | https://github.com/nanaao/Dirtypipe-exploit | POC Details |
| 27 | None | https://github.com/AyoubNajim/cve-2022-0847dirtypipe-exploit | POC Details |
| 28 | None | https://github.com/pentestblogin/pentestblog-CVE-2022-0847 | POC Details |
| 29 | Dirty Pipe POC | https://github.com/gyaansastra/CVE-2022-0847 | POC Details |
| 30 | Container Excape PoC for CVE-2022-0847 "DirtyPipe" | https://github.com/DataDog/dirtypipe-container-breakout-poc | POC Details |
| 31 | A root exploit for CVE-2022-0847 (Dirty Pipe) | https://github.com/babyshen/CVE-2022-0847 | POC Details |
| 32 | None | https://github.com/edsonjt81/CVE-2022-0847-Linux | POC Details |
| 33 | CVE-2022-0847 POC and Docker and Analysis write up | https://github.com/chenaotian/CVE-2022-0847 | POC Details |
| 34 | CVE-2022-0847-DirtyPipe-Exploit | https://github.com/V0WKeep3r/CVE-2022-0847-DirtyPipe-Exploit | POC Details |
| 35 | None | https://github.com/al4xs/CVE-2022-0847-Dirty-Pipe | POC Details |
| 36 | None | https://github.com/Greetdawn/CVE-2022-0847-DirtyPipe- | POC Details |
| 37 | A Python-based DirtyPipe (CVE-2022-0847) POC to pop a root shell | https://github.com/crusoe112/DirtyPipePython | POC Details |
| 38 | CVE-2022-0847 Python exploit to get root or write a no write permission, immutable or read-only mounted file. | https://github.com/nanaao/dirtyPipe-automaticRoot | POC Details |
| 39 | my personal exploit of CVE-2022-0847(dirty pipe) | https://github.com/arttnba3/CVE-2022-0847 | POC Details |
| 40 | A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability. | https://github.com/AlexisAhmed/CVE-2022-0847-DirtyPipe-Exploits | POC Details |
| 41 | CVE-2022-0847 (Dirty Pipe) is an arbitrary file overwrite vulnerability that allows escalation of privileges by modifying or overwriting arbitrary read-only files e.g. /etc/passwd, /etc/shadow. | https://github.com/sa-infinity8888/Dirty-Pipe-CVE-2022-0847 | POC Details |
| 42 | Dirty Pipe (CVE-2022-0847) zafiyeti kontrolü | https://github.com/realbatuhan/dirtypipetester | POC Details |
| 43 | dirtypipe | https://github.com/CYB3RK1D/CVE-2022-0847-POC | POC Details |
| 44 | CVE-2022-0847 POC | https://github.com/breachnix/dirty-pipe-poc | POC Details |
| 45 | Implementation of CVE-2022-0847 as a shellcode | https://github.com/Shotokhan/cve_2022_0847_shellcode | POC Details |
| 46 | None | https://github.com/githublihaha/DirtyPIPE-CVE-2022-0847 | POC Details |
| 47 | Python script to check if your kernel is vulnerable to Dirty pipe CVE-2022-0847 | https://github.com/MrP1xel/CVE-2022-0847-dirty-pipe-kernel-checker | POC Details |
| 48 | PoC Container Breakout for DirtyPipe Vulnerability CVE-2022-0847 | https://github.com/jpts/CVE-2022-0847-DirtyPipe-Container-Breakout | POC Details |
| 49 | Hacked up Dirty Pipe (CVE-2022-0847) PoC that hijacks a SUID binary to spawn a root shell. (and attempts to restore the damaged binary as well) | https://github.com/LudovicPatho/CVE-2022-0847_dirty-pipe | POC Details |
| 50 | pwncat module that automatically exploits CVE-2022-0847 (dirtypipe) | https://github.com/DanaEpp/pwncat_dirtypipe | POC Details |
| 51 | Dirty Pipe - CVE-2022-0847 | https://github.com/tmoneypenny/CVE-2022-0847 | POC Details |
| 52 | Exploit for Dirty-Pipe (CVE-2022-0847) | https://github.com/scopion/dirty-pipe | POC Details |
| 53 | Presentation slides and supplementary material | https://github.com/stfnw/Debugging_Dirty_Pipe_CVE-2022-0847 | POC Details |
| 54 | DirtyPipe: Exploit for a new Linux vulnerability known as 'Dirty Pipe(CVE-2022-0847)' allows local users to gain root privileges. The vulnerability is tracked as CVE-2022-0847 and allows a non-privileged user to inject and overwrite data in read-only files, including SUID processes that run as root. | https://github.com/drapl0n/dirtypipe | POC Details |
| 55 | Linux “Dirty Pipe” vulnerability gives unprivileged users root access | https://github.com/0xr1l3s/CVE-2022-0847 | POC Details |
| 56 | Dirty Pipe Vulnerability Detection Script - RHSB-2022-002 Dirty Pipe - kernel arbitrary file manipulation - (CVE-2022-0847) | https://github.com/mhanief/dirtypipe | POC Details |
| 57 | None | https://github.com/tufanturhan/CVE-2022-0847-L-nux-PrivEsc | POC Details |
| 58 | Scripted Linux Privilege Escalation for the CVE-2022-0847 "Dirty Pipe" vulnerability | https://github.com/rexpository/linux-privilege-escalation | POC Details |
| 59 | Files required to demonstrate CVE-2022-0847 vulnerability in Linux Kernel v5.8 | https://github.com/isaiahsimeone/COMP3320-VAPT | POC Details |
| 60 | This repository is developed to analysis and understand DirtyPipe exploit CVE-2022-0847 | https://github.com/VinuKalana/DirtyPipe-CVE-2022-0847 | POC Details |
| 61 | A Simple bash script that patches the CVE-2022-0847 (dirty pipe) kernel vulnerability on Debian 11 | https://github.com/ih3na/debian11-dirty_pipe-patcher | POC Details |
| 62 | CVE-2022-0847 used to achieve container escape 利用CVE-2022-0847 (Dirty Pipe) 实现容器逃逸 | https://github.com/greenhandatsjtu/CVE-2022-0847-Container-Escape | POC Details |
| 63 | A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability. | https://github.com/flux10n/CVE-2022-0847-DirtyPipe-Exploits | POC Details |
| 64 | An eBPF detection program for CVE-2022-0847 | https://github.com/airbus-cert/dirtypipe-ebpf_detection | POC Details |
| 65 | exp of CVE-2022-0847 | https://github.com/edr1412/Dirty-Pipe | POC Details |
| 66 | COMPILED | https://github.com/eduquintanilha/CVE-2022-0847-DirtyPipe-Exploits | POC Details |
| 67 | Modified dirtypipe script into auto root without have to search a file manually to hijack suid binary. | https://github.com/EagleTube/CVE-2022-0847 | POC Details |
| 68 | CVE-2022-0847 used to achieve container escape 利用CVE-2022-0847 (Dirty Pipe) 实现容器逃逸 | https://github.com/yoeelingBin/CVE-2022-0847-Container-Escape | POC Details |
| 69 | None | https://github.com/cont3mpt/CVE-2022-0847 | POC Details |
| 70 | Proof-of-concept exploit for the Dirty Pipe vulnerability (CVE-2022-0847) | https://github.com/notl0cal/dpipe | POC Details |
| 71 | CVE-2022-0847(Dirty Pipe) vulnerability exploits. | https://github.com/Gustavo-Nogueira/Dirty-Pipe-Exploits | POC Details |
| 72 | Compled version of CVE-2022-0847 aka Dirty Pipe. Just one shot to root them all :D | https://github.com/b4dboy17/Dirty-Pipe-Oneshot | POC Details |
| 73 | None | https://github.com/edsonjt81/CVE-2022-0847-DirtyPipe- | POC Details |
| 74 | Resources required for building Pluralsight CVE-2022-0847 lab | https://github.com/Turzum/ps-lab-cve-2022-0847 | POC Details |
| 75 | 修改版CVE-2022-0847 | https://github.com/qwert419/linux- | POC Details |
| 76 | CVE-2022-0847 | https://github.com/DataFox/CVE-2022-0847 | POC Details |
| 77 | Dirty Pipe Kernel Vulnerability Exploit | https://github.com/pmihsan/Dirty-Pipe-CVE-2022-0847 | POC Details |
| 78 | None | https://github.com/ajith737/Dirty-Pipe-CVE-2022-0847-POCs | POC Details |
| 79 | This is a repo to showcase the dirty pipe Linux Kernel Vulnerability. | https://github.com/mutur4/CVE-2022-0847 | POC Details |
| 80 | None | https://github.com/orsuprasad/CVE-2022-0847-DirtyPipe-Exploits | POC Details |
| 81 | None | https://github.com/4bhishek0/CVE-2022-0847-Poc | POC Details |
| 82 | A simple exploit that uses dirtypipe to inject shellcode into runC entrypoint to implement container escapes. | https://github.com/JlSakuya/CVE-2022-0847-container-escape | POC Details |
| 83 | check cve-2022-0847 | https://github.com/jonathanbest7/cve-2022-0847 | POC Details |
| 84 | POC Exploit to add user to Sudo for CVE-2022-0847 Dirty Pipe Vulnerability | https://github.com/0xeremus/dirty-pipe-poc | POC Details |
| 85 | An eBPF program to detect attacks on CVE-2022-0847 | https://github.com/h4ckm310n/CVE-2022-0847-eBPF | POC Details |
| 86 | Using CVE-2022-0847, "Dirty Pipe Exploit", to pop a reverse bash shell for arbitrary code execution on a foreign machine. | https://github.com/joeymeech/CVE-2022-0847-Exploit-Implementation | POC Details |
| 87 | CVE: CVE-2022-0847 | https://github.com/pashayogi/DirtyPipe | POC Details |
| 88 | Working Dirty Pipe (CVE-2022-0847) exploit tool with root access and file overwrites. | https://github.com/n3rada/DirtyPipe | POC Details |
| 89 | Bash script to check if kernel is vulnerable | https://github.com/ayushx007/CVE-2022-0847-dirty-pipe-checker | POC Details |
| 90 | None | https://github.com/ayushx007/CVE-2022-0847-DirtyPipe-Exploits | POC Details |
| 91 | None | https://github.com/solomon12354/CVE-2022-0847-Dirty_Pipe_virus | POC Details |
| 92 | None | https://github.com/nu1l-ptr/CVE-2022-0847-Poc | POC Details |
| 93 | None | https://github.com/letsr00t/CVE-2022-0847 | POC Details |
| 94 | None | https://github.com/solomon12354/LockingGirl-----CVE-2022-0847-Dirty_Pipe_virus | POC Details |
| 95 | None | https://github.com/xsxtw/CVE-2022-0847 | POC Details |
| 96 | A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability. | https://github.com/jxpsx/CVE-2022-0847-DirtyPipe-Exploits | POC Details |
| 97 | None | https://github.com/Asbatel/CBDS_CVE-2022-0847_POC | POC Details |
| 98 | None | https://github.com/muhammad1596/CVE-2022-0847-dirty-pipe-checker | POC Details |
| 99 | None | https://github.com/muhammad1596/CVE-2022-0847-DirtyPipe-Exploits | POC Details |
| 100 | This is the story of CVE-2022-0847, a vulnerability in the Linux kernel since 5.8 which allows overwriting data in arbitrary read-only files. This leads to privilege escalation because unprivileged processes can inject code into root processes. | https://github.com/CPT-Jack-A-Castle/CVE-2022-0847 | POC Details |
| 101 | Linux Kernel Local Privilege Escalation Vulnerability CVE-2022-0847. | https://github.com/ZZ-SOCMAP/CVE-2022-0847 | POC Details |
| 102 | None | https://github.com/JustinYe377/CTF-CVE-2022-0847 | POC Details |
| 103 | The **Dirty Pipe exploit (CVE-2022-0847)** is a Linux kernel vulnerability (v5.8+) allowing unprivileged attackers to overwrite arbitrary files via a flaw in the pipe mechanism. This leads to privilege escalation, granting root access. Similar to Dirty Cow but easier to exploit. Fix: Update to a patched kernel version. | https://github.com/mithunmadhukuttan/Dirty-Pipe-Exploit | POC Details |
| 104 | CVE-2022-0847 | https://github.com/Mephierr/DirtyPipe_exploit | POC Details |
| 105 | None | https://github.com/RogelioPumajulca/CVE-2022-0847 | POC Details |
| 106 | None | https://github.com/osungjinwoo/CVE-2022-0847-Dirty-Pipe | POC Details |
| 107 | Proof of concept for CVE-2022-0847 | https://github.com/karanlvm/DirtyPipe-Exploit | POC Details |
| 108 | A root exploit for CVE-2022-0847 (Dirty Pipe) | https://github.com/cypherlobo/DirtyPipe-BSI | POC Details |
| 109 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E6%93%8D%E4%BD%9C%E7%B3%BB%E7%BB%9F%E6%BC%8F%E6%B4%9E/Linux%20DirtyPipe%20%E6%9D%83%E9%99%90%E6%8F%90%E5%8D%87%E6%BC%8F%E6%B4%9E%20CVE-2022-0847.md | POC Details |
| 110 | exp of CVE-2022-0847 | https://github.com/zzzchuu/Dirty-Pipe | POC Details |
| 111 | A Simple bash script that patches the CVE-2022-0847 (dirty pipe) kernel vulnerability on Debian 11 | https://github.com/ihenakaarachchi/debian11-dirty_pipe-patcher | POC Details |
| 112 | Simple Exploit for Dirty Pipe Vulnerability (CVE-2022-0847) This repository contains a simple proof of concept (PoC) for the Dirty Pipe vulnerability (CVE-2022-0847), which affects Linux kernel versions 5.8 to 5.16. This exploit demonstrates local privilege escalation by leveraging improper handling of pipe buffers in the kernel. | https://github.com/byteReaper77/Dirty-Pipe | POC Details |
| 113 | None | https://github.com/DelphineTan/Murdoch-CVE-2022-0847 | POC Details |
| 114 | DirtyPipe (CVE-2022-0847) exploit written in Rust | https://github.com/morgenm/dirtypipe | POC Details |
| 115 | None | https://github.com/Scouserr/cve-2022-0847-poc-dockerimage | POC Details |
| 116 | exploit of CVE-2022-0847 which directly remove password of the root account | https://github.com/Shadow-Spinner/CVE-2022-0847 | POC Details |
| 117 | None | https://github.com/honeyvig/CVE-2022-0847-DirtyPipe-Exploit | POC Details |
| 118 | None | https://github.com/gladiator-07/CVE-2022-0847 | POC Details |
| 119 | CVE-2022-0847(Linux 内核本地提权漏洞) | https://github.com/xiaoLvChen/CVE-2022-0847 | POC Details |
| 120 | Very rough PoC for detecting/reproducing CVE-2022-0847 (dirty pipe) through random generation of syscalls and differential fuzzing against a model. | https://github.com/stfnw/reproducer-poc-CVE-2022-0847 | POC Details |
| 121 | Exploiting CVE-2022-0847 - written by : Antonius (w1sdom) | https://github.com/bluedragonsecurity/Linux-Kernel-Dirty-Pipe-Exploitation-Logic-Bug- | POC Details |
| 122 | This tool demonstrates the application of fundamental physics discoveries to cybersecurity. | https://github.com/SimoesCTT/Chrono-Drip-Temporal-Viscosity-Exploitation-Framework-CVE-2022-0847 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet