{"vulnerability": "CVE-2019-5736", "sightings": [{"uuid": "ffb734db-ef08-49b4-9e32-abc290dd3caa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-5736", "type": "seen", "source": "MISP/5c64330e-5558-43f7-b07b-6f5a0a021402", "content": "", "creation_timestamp": "2019-02-13T15:11:04.000000Z"}, {"uuid": "50a8b986-dfa3-4207-a232-41fdda2ba94f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-5736", "type": "seen", "source": "MISP/0c3d0270-4df2-43ab-aaf0-8a9696b4ad30", "content": "", "creation_timestamp": "2024-11-14T06:09:56.000000Z"}, {"uuid": "651e282c-90a8-4c34-a912-388398953274", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-5736", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:44.000000Z"}, {"uuid": "32fc43ac-15aa-4375-ad34-f947d0b2c843", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-5736", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:16.000000Z"}, {"uuid": "1d724835-7d0f-49da-b0cf-148751d9d267", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-5736", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lyoou2lhaa2a", "content": "", "creation_timestamp": "2025-09-13T02:05:24.785952Z"}, {"uuid": "171d7818-9c35-4147-9d4a-e7f480432a05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-5736", "type": "seen", "source": "https://bsky.app/profile/antitree.com/post/3lopafegkx225", "content": "", "creation_timestamp": "2025-05-09T01:07:24.275475Z"}, {"uuid": "717dc1fa-1c8e-4cd2-8723-620aa27ad6a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-5736", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/docker_runc_escape.rb", "content": "", "creation_timestamp": "2021-06-30T19:00:49.000000Z"}, {"uuid": "13013fcf-7820-48d3-90a2-0de272c6a8c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-5736", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lynbpdrwms2i", "content": "", "creation_timestamp": "2025-09-12T12:37:31.995903Z"}, {"uuid": "f801df3f-1b12-4c36-8098-5a50740a9929", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-5736", "type": "seen", "source": "https://gist.github.com/aw-junaid/8ab7fcee3ef7f4c33bc10ae9d90c1bca", "content": "", "creation_timestamp": "2026-01-30T18:57:00.000000Z"}, {"uuid": "6fbfdeac-2418-460e-8f82-3fccf9c1bb1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-5736", "type": "seen", "source": "https://gist.github.com/alon710/9f8ac831f6af9f331780b5f94d2f3689", "content": "", "creation_timestamp": "2026-01-24T21:32:17.000000Z"}, {"uuid": "d346e85b-fc8e-470c-9343-b064e2da79f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-5736", "type": "seen", "source": "https://gist.github.com/namishelex01/c45e91ffc78335e7a096670758f310e6", "content": "", "creation_timestamp": "2025-12-17T18:58:48.000000Z"}, {"uuid": "6db8cb6a-99fc-42e2-8d2f-655f6cb78b92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-5736", "type": "published-proof-of-concept", "source": "https://t.me/R0_Crew/947", "content": "POC Exploit for CVE-2019-5736 (vuln in runc package for the Docker)\n\nPOC1: https://github.com/ancat/scripts/blob/master/misc/runc-cve-2019-5736.c\n\nPOC2: https://github.com/feexd/pocs/tree/master/\nCVE-2019-5736 \n\n#poc #expdev #docker #darw1n", "creation_timestamp": "2019-02-28T09:04:37.000000Z"}, {"uuid": "dccb7993-e055-4823-86fb-e4cb2ff6ca92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-5736", "type": "seen", "source": "https://t.me/antichat/3584", "content": "[\u041f\u0435\u0440\u0435\u0432\u043e\u0434] \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2019-5736 \u0432 runc, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u0440\u0430\u0432\u0430 root \u043d\u0430 \u0445\u043e\u0441\u0442\u0435\nhttps://goo.gl/dMtqpC", "creation_timestamp": "2019-02-12T10:16:27.000000Z"}, {"uuid": "1e07a3e1-4a95-4391-b6e9-59f53365ebea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-5736", "type": "published-proof-of-concept", "source": "https://t.me/antichat/3577", "content": "CVE-2019-5736: runc container breakout (all versions)\nhttps://seclists.org/oss-sec/2019/q1/119", "creation_timestamp": "2019-02-12T09:12:54.000000Z"}, {"uuid": "8d372f8f-0ee7-4c56-99a2-133e428ffc79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-5736", "type": "seen", "source": "https://gist.github.com/podhmo/1168c22d1738865f4e2d61018afadf8e", "content": "", "creation_timestamp": "2026-04-10T18:28:46.000000Z"}, {"uuid": "7a387aa2-6223-421b-8669-327daab596fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-5736", "type": "published-proof-of-concept", "source": "https://t.me/antichat/3593", "content": "POC Exploit for CVE-2019-5736 (vuln in runc package for the Docker)\nhttps://github.com/feexd/pocs/tree/master/CVE-2019-5736 #poc #expdev #docker #darw1n", "creation_timestamp": "2019-02-12T19:29:06.000000Z"}, {"uuid": "beda4f72-f34b-414a-8111-ad3ea96618b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-5736", "type": "published-proof-of-concept", "source": "https://t.me/antichat/3646", "content": "CVE-2019-5736-PoC\nhttps://github.com/Frichetten/CVE-2019-5736-PoC", "creation_timestamp": "2019-02-15T21:09:08.000000Z"}, {"uuid": "0d66f2e9-3e67-42f3-99ac-d5988c1c7f98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-5736", "type": "published-proof-of-concept", "source": "https://t.me/antichat/3712", "content": "Breaking out of Docker via runC \u2013 Explaining CVE-2019-5736\nhttps://www.twistlock.com/labs-blog/breaking-docker-via-runc-explaining-cve-2019-5736/", "creation_timestamp": "2019-02-22T06:23:33.000000Z"}, {"uuid": "60bcfbc4-6c2c-46bd-b235-f0775ea84ff7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-5736", "type": "published-proof-of-concept", "source": "Telegram/RwMsOgYyZ61TQbvirXcgyGDBzDVknZZaFg6QyjxxhjsKSOI", "content": "", "creation_timestamp": "2023-03-09T02:18:23.000000Z"}, {"uuid": "52f6db3a-3e4d-4a12-9118-765edfe336a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-5736", "type": "exploited", "source": "https://t.me/BleepingComputer/4566", "content": "Vulnerable Docker Hosts Actively Abused in Cryptojacking Campaigns\n\nHundreds of vulnerable and exposed Docker hosts are being abused in cryptojacking campaigns after being compromised with the help of exploits designed to take advantage of the CVE-2019-5736 runc vulnerability discovered last month. [...]\n\nhttps://www.bleepingcomputer.com/news/security/vulnerable-docker-hosts-actively-abused-in-cryptojacking-campaigns/", "creation_timestamp": "2019-03-05T02:03:48.000000Z"}, {"uuid": "79e1e0ae-ad44-4daf-9b8c-7b2bf0b1010c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-5736", "type": "published-proof-of-concept", "source": "https://t.me/k8security/171", "content": "\u0418\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442 DEEPCE, \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u043a\u043e\u0442\u043e\u0440\u043e\u0433\u043e \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0430\u0431\u0440\u0435\u0432\u0438\u0430\u0442\u0443\u0440\u043e\u0439 \u043e\u0442 \u0444\u0440\u0430\u0437\u044b Docker Enumeration, Escalation of Privileges and Container Escapes. \u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u0433\u043e\u0432\u043e\u0440\u0438\u0442 \u0441\u0430\u043c\u043e \u0437\u0430 \u0441\u0435\u0431\u044f.\n\n\u0414\u043b\u044f \u043c\u0430\u043a\u0441\u0438\u043c\u0430\u043b\u044c\u043d\u043e\u0439 \u0441\u043e\u0432\u043c\u0435\u0441\u0442\u0438\u043c\u043e\u0441\u0442\u0438 \u0432\u0435\u0441\u044c \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442 \u043d\u0430\u043f\u0438\u0441\u0430\u043d \u043d\u0430 sh \u0431\u0435\u0437 \u043a\u0430\u043a\u0438\u0445-\u043b\u0438\u0431\u043e \u0437\u0430\u0432\u0438\u0441\u0438\u043c\u043e\u0441\u0442\u0435\u0439 (1234 LoC). \u041d\u043e \u0434\u043b\u044f \u0440\u044f\u0434\u0430 \u0437\u0430\u0434\u0430\u0447 \u043e\u043d \u0432\u0441\u0435 \u0436\u0435 \u043e\u0436\u0438\u0434\u0430\u0435\u0442 \u0447\u0442\u043e \u0432\u043d\u0443\u0442\u0440\u0438 \u0442\u0430\u043a\u0436\u0435 \u043e\u043a\u0430\u0436\u0443\u0442\u0441\u044f \u0442\u0443\u043b\u0437\u044b: curl, nmap, nslookup, dig. \u0422\u0430\u043a\u0436\u0435 \u0443\u0447\u0438\u0442\u044b\u0432\u0430\u0439\u0442\u0435, \u0447\u0442\u043e \u043f\u0440\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0440\u044f\u0434\u0430 \u0432\u0435\u043a\u0442\u043e\u0440\u043e\u0432 \u043e\u043d \u043c\u043e\u0436\u0435\u0442 \u0441\u043e\u0437\u0434\u0430\u0432\u0430\u0442\u044c \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u044b, \u043f\u0435\u0440\u0435\u0437\u0430\u043f\u0443\u0441\u043a\u0430\u0442\u044c runC, \u0447\u0442\u043e \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043c\u043e\u0436\u0435\u0442 \u043d\u0430\u0432\u0440\u0435\u0434\u0438\u0442\u044c \u0441\u0438\u0441\u0442\u0435\u043c\u0435 - \u0431\u0443\u0434\u044c\u0442\u0435 \u043e\u0441\u0442\u043e\u0440\u043e\u0436\u043d\u044b. \u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u0435\u0441\u0442\u044c \u043a\u043b\u0430\u0441\u0441\u043d\u0430\u044f \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0441\u043a\u0430\u0447\u0430\u0442\u044c \u0438 \u0437\u0430\u043f\u0443\u0441\u0442\u0438\u0442\u044c \u0435\u0433\u043e \u0431\u0435\u0437 \u0437\u0430\u043f\u0438\u0441\u0438 \u043d\u0430 \u0434\u0438\u0441\u043a:\n\nwget -O - https://github.com/stealthcopter/deepce/raw/master/deepce.sh | sh\n\n\u041f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u043c\u044b\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u044b:\n- DOCKER     - \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 docker group\n- PRIVILEGED - \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u0430 \n- SOCK       - \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 docker sock \n- CVE-2019-5736\n- CVE-2019-5021\n- CVE-2019-13139\n\n\u041f\u0440\u0438\u043c\u0435\u043d\u0438\u043c\u043e \u043b\u0438 \u044d\u0442\u043e \u0432 Kubernetes? \u0414\u0430! \u0418\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442 \u0434\u0430\u0436\u0435 \u0437\u043d\u0430\u0435\u0442 \u043f\u0440\u043e kubectl ;)", "creation_timestamp": "2020-12-22T08:12:31.000000Z"}, {"uuid": "4ccf1d7f-953e-4163-bf16-81dd5194f4f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-5736", "type": "published-proof-of-concept", "source": "Telegram/ZQhPX1V8GYQ5EYOevxB04s5FpxIRBluCF7hhQG6fyoTGOeU", "content": "", "creation_timestamp": "2025-06-25T15:00:05.000000Z"}, {"uuid": "20c95d2a-af10-4a4b-b4e7-1ca74bc500da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-5736", "type": "published-proof-of-concept", "source": "https://t.me/tech_b0lt_Genona/306", "content": "POC Exploit\nhttps://github.com/feexd/pocs/tree/master/CVE-2019-5736", "creation_timestamp": "2019-02-13T01:59:09.000000Z"}, {"uuid": "88c9f49a-85f0-406e-a535-e2ebf4620d8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-5736", "type": "seen", "source": "https://t.me/sec_devops/268", "content": "Container Breakouts\n\n\u0421\u0435\u0440\u0438\u044f \u0441\u0442\u0430\u0442\u0435\u0439, \u043f\u043e\u0441\u0432\u044f\u0449\u0435\u043d\u043d\u0430\u044f \u0442\u043e\u043c\u0443, \u043a\u0430\u043a \u043f\u0440\u043e\u0438\u0441\u0445\u043e\u0434\u0438\u0442 \u0432\u044b\u0445\u043e\u0434 \u0437\u0430 \u043f\u0440\u0435\u0434\u0435\u043b\u044b \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u0430. \u041e\u0431 \u044d\u0442\u043e\u0439 \u0443\u0433\u0440\u043e\u0437\u0435 \u0447\u0430\u0441\u0442\u043e \u043c\u043e\u0436\u043d\u043e \u0443\u0441\u043b\u044b\u0448\u0430\u0442\u044c \u043e\u0442 \u043c\u0430\u0440\u043a\u0435\u0442\u043e\u043b\u043e\u0433\u043e\u0432 \u0440\u0435\u0448\u0435\u043d\u0438\u0439 \u043f\u043e Container Runtime Security, \u043d\u043e \u0432\u0440\u0435\u043c\u044f \u0440\u0430\u0437\u043e\u0431\u0440\u0430\u0442\u044c\u0441\u044f, \u043a\u0430\u043a \u044d\u0442\u043e \u043f\u0440\u043e\u0438\u0441\u0445\u043e\u0434\u0438\u0442 \u043d\u0430 \u0441\u0430\u043c\u043e\u043c \u0434\u0435\u043b\u0435.\n\nPart 1: Access to root directory of the Host\nPart 2: Privileged Container\nPart 3: Docker Socket\n\n\u0422\u0430\u043a\u0436\u0435 \u0430\u0432\u0442\u043e\u0440 \u043f\u0440\u0435\u0434\u043b\u0430\u0433\u0430\u0435\u0442 \u043f\u043e\u0437\u043d\u0430\u043a\u043e\u043c\u0438\u0442\u044c\u0441\u044f \u0441 CVE-2019-5736, CVE-2019-14271, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0441\u043e \u0441\u0442\u0430\u0442\u044c\u0435\u0439 \"Abusing Privileged and Unprivileged Linux Containers \"\n\n\u0414\u043b\u044f \u0442\u043e\u0433\u043e, \u0447\u0442\u043e\u0431\u044b \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0442\u0438\u0442\u044c \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0432\u044b\u0445\u043e\u0434\u0430 \u0437\u0430 \u043f\u0440\u0435\u0434\u0435\u043b\u044b \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u0430, Clint Gibler \u043d\u0430\u043f\u0438\u0441\u0430\u043b \u043e\u0442\u0434\u0435\u043b\u044c\u043d\u044b\u0439 \u043f\u0435\u0440\u0435\u0447\u0435\u043d\u044c \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u043e\u0432 \u0442\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f.\n\n#docker #ops #attack", "creation_timestamp": "2020-10-21T16:14:44.000000Z"}, {"uuid": "17442027-a82a-4c88-811e-b1b1087c7153", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-5736", "type": "seen", "source": "Telegram/g4VoE1BR7-TYgtzouRuMiVqJdsK3u_wFqegphm1gCtpEwg", "content": "", "creation_timestamp": "2023-11-14T23:11:28.000000Z"}, {"uuid": "25bc5280-2ae4-4d36-add9-4f0c12047e85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-5736", "type": "exploited", "source": "https://t.me/thehackernews/196", "content": "New high severity \"RunC\" vulnerability (CVE-2019-5736) lets attackers escape #Linux container to gain root access on host machine.\n\nAffected Systems/Services \u2192 Docker, Kubernetes, Debian, Red Hat, Ubuntu, Google Cloud, Amazon AWS and more.\n\nhttps://thehackernews.com/2019/02/linux-container-runc-docker.html", "creation_timestamp": "2019-02-12T10:20:09.000000Z"}, {"uuid": "26db9a9b-39d6-4aa9-87cb-db25d4ba6ea6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-5736", "type": "published-proof-of-concept", "source": "https://t.me/true_secator/2091", "content": "\u200b\u200bMicrosoft \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u043f\u0430\u0442\u0447 \u0434\u043b\u044f \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 Azurescape.\n\n\u041a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440 Azure (ACI) \u043e\u0442 Microsoft - \u044d\u0442\u043e \u043e\u0431\u043b\u0430\u0447\u043d\u0430\u044f \u0441\u043b\u0443\u0436\u0431\u0430, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f\u043c \u0440\u0430\u0437\u0432\u0435\u0440\u0442\u044b\u0432\u0430\u0442\u044c \u043f\u0430\u043a\u0435\u0442\u043d\u044b\u0435 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f (\u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u044b) \u0432 \u043e\u0431\u043b\u0430\u043a\u0435. \u041a\u043e\u0433\u0434\u0430 \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u044b \u0440\u0430\u0437\u0432\u0435\u0440\u043d\u0443\u0442\u044b, ACI \u0438\u0437\u043e\u043b\u0438\u0440\u0443\u0435\u0442 \u0438\u0445 \u043e\u0442 \u0434\u0440\u0443\u0433\u0438\u0445 \u0437\u0430\u043f\u0443\u0449\u0435\u043d\u043d\u044b\u0445 \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u043e\u0432, \u0447\u0442\u043e\u0431\u044b \u043e\u043d\u0438 \u043d\u0435 \u043c\u043e\u0433\u043b\u0438 \u0441\u043e\u0432\u043c\u0435\u0441\u0442\u043d\u043e \u0440\u0430\u0431\u043e\u0442\u0430\u0442\u044c \u0432 \u043f\u0430\u043c\u044f\u0442\u0438 \u0438 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u043e\u0432\u0430\u0442\u044c \u0434\u0440\u0443\u0433 \u0441 \u0434\u0440\u0443\u0433\u043e\u043c.\n\n\u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0445\u0430\u043a\u0435\u0440\u0430\u043c \u043f\u043e\u043b\u0443\u0447\u0430\u0442\u044c \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u043d\u0430\u0434 \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u0430\u043c\u0438 Azure, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u0432 \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u0430\u0445 \u0434\u0440\u0443\u0433\u0438\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0438 \u043f\u043e\u043b\u0443\u0447\u0430\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a\u043e \u0432\u0441\u0435\u043c \u0434\u0430\u043d\u043d\u044b\u043c, \u0440\u0430\u0437\u0432\u0435\u0440\u043d\u0443\u0442\u044b\u043c \u043d\u0430 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0435.\n\n\u041d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u0442\u043e, \u0447\u0442\u043e \u0432 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u0441\u043e\u0431\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0433\u043e \u0440\u0430\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044f Microsoft \u043d\u0435 \u0432\u044b\u044f\u0432\u0438\u043b\u0430 \u043d\u0438 \u0430\u0442\u0430\u043a Azurescape, \u043d\u0438 \u043f\u0440\u0438\u0437\u043d\u0430\u043a\u043e\u0432 \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u0432 \u043a\u043b\u0430\u0441\u0442\u0435\u0440\u0430\u0445, \u0442\u0435\u043c \u043d\u0435 \u043c\u0435\u043d\u0435\u0435 \u043e\u043f\u043e\u0432\u0435\u0441\u0442\u0438\u043b\u0430 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u0436\u0435\u0440\u0442\u0432 \u0438\u0437 \u0447\u0438\u0441\u043b\u0430 \u0441\u0432\u043e\u0438\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439. \u0418 \u043d\u0435 \u0437\u0440\u044f.\n\n\u0412\u0435\u0434\u044c \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0432\u0448\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0443 Palo Alto Networks \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u043b\u0438 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 Azurescape.\u00a0\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u043b\u0438, \u0447\u0442\u043e \u0432 ACI \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u043a\u043e\u0434 RunC v1.0.0-rc2, \u0434\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0430\u0436 2016 \u0433\u043e\u0434\u043e\u043c, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u043b \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u043c\u043d\u043e\u0433\u043e\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u0438\u0435 \u043a\u043b\u0430\u0441\u0442\u0435\u0440\u044b Kubernetes, \u0432 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0440\u0430\u0437\u043c\u0435\u0449\u0435\u043d\u044b ACI.\u00a0\n\n\u0414\u0435\u043b\u043e \u0432 \u0442\u043e\u043c, \u0447\u0442\u043e \u044d\u0442\u043e\u0442 \u043a\u043e\u0434 \u0441\u043e\u0434\u0435\u0440\u0436\u0430\u043b \u043e\u0448\u0438\u0431\u043a\u0438, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0435 \u0435\u0449\u0451 \u0432 2019 \u0433\u043e\u0434\u0443, \u043e\u0434\u043d\u0430 \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 CVE-2019-5736 \u043a\u0430\u043a \u0440\u0430\u0437 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u043b\u0430 \u0432\u044b\u0445\u043e\u0434 \u0438\u0437 \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u0430 \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043a\u043e\u0434\u0430 \u0441 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u043d\u044b\u043c\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438 \u043d\u0430 \u0431\u0430\u0437\u043e\u0432\u043e\u043c \u0445\u043e\u0441\u0442\u0435, \u0443\u0437\u043b\u0435 Kubernetes.\n\n\u0412\u0435\u043a\u0442\u043e\u0440 \u0430\u0442\u0430\u043a\u0438 Azurescape \u0440\u0435\u0430\u043b\u0438\u0437\u0443\u0435\u0442\u0441\u044f \u043f\u0443\u0442\u0451\u043c \u043f\u0435\u0440\u0435\u0445\u0432\u0430\u0442\u0430 \u0432 \u0442\u0440\u0430\u0444\u0438\u043a\u0435 \u043d\u0430 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c \u0443\u0437\u043b\u0435 \u0437\u0430\u043f\u0440\u043e\u0441\u0430 \u0441 \u0442\u043e\u043a\u0435\u043d\u043e\u043c JWT \u0432 \u0437\u0430\u0433\u043e\u043b\u043e\u0432\u043a\u0435 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438.\u00a0\n\n\u041a\u0430\u043a \u044d\u0442\u043e \u0432\u044b\u0433\u043b\u044f\u0434\u0438\u0442 \u043d\u0430 \u043f\u0440\u0430\u043a\u0442\u0438\u043a\u0435 - \u0441\u043c\u043e\u0442\u0440\u0438\u0442\u0435 \u043d\u0430 \u0432\u0438\u0434\u0435\u043e\ud83d\udc47", "creation_timestamp": "2021-09-10T16:43:56.000000Z"}, {"uuid": "6d8b9835-1a20-44f3-801f-369aa57d66b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-5736", "type": "seen", "source": "https://t.me/canyoupwnme/5108", "content": "CVE-2019-5736: runc container breakout (all versions)\nhttps://seclists.org/oss-sec/2019/q1/119", "creation_timestamp": "2019-02-12T10:01:48.000000Z"}, {"uuid": "6e637989-8c08-4898-bed4-e325311b2373", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-5736", "type": "exploited", "source": "https://t.me/xakep_ru/6074", "content": "\u0423\u044f\u0437\u0432\u0438\u043c\u044b\u0435 Docker-\u0445\u043e\u0441\u0442\u044b \u043d\u0430\u0445\u043e\u0434\u044f\u0442\u0441\u044f \u043f\u043e\u0434 \u0443\u0433\u0440\u043e\u0437\u043e\u0439 \u0437\u0430\u0440\u0430\u0436\u0435\u043d\u0438\u044f \u043c\u0430\u0439\u043d\u0435\u0440\u0430\u043c\u0438\n\n\u042d\u043a\u0441\u043f\u0435\u0440\u0442\u044b Imperva \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u044e\u0442, \u0447\u0442\u043e \u0441\u043e\u0442\u043d\u0438 Docker-\u0445\u043e\u0441\u0442\u043e\u0432 \u0432\u0441\u0435 \u0435\u0449\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u044b \u043f\u0435\u0440\u0435\u0434 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u043e\u0439 CVE-2019-5736, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u043e\u0439 \u0432 \u043f\u0440\u043e\u0448\u043b\u043e\u043c \u043c\u0435\u0441\u044f\u0446\u0435.\n\nhttps://xakep.ru/2019/03/06/docker-miners/", "creation_timestamp": "2019-03-06T09:35:14.000000Z"}, {"uuid": "8e035a03-f33a-4155-8c76-6e5d331ccfcf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-5736", "type": "published-proof-of-concept", "source": "https://t.me/DC8044_Info/79", "content": "UPDATED \nthe CVE-2019-5736 container breakout PoC to not destroy runc on the host (i.e. non-destructive) and moved it to a repo\nhttps://github.com/singe/container-breakouts/blob/master/cve-2019-5736/safe_exploit.py", "creation_timestamp": "2019-02-14T10:18:24.000000Z"}, {"uuid": "522d7102-800b-4f45-aec4-68d5c370b33b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-5736", "type": "published-proof-of-concept", "source": "https://t.me/SecLabNews/4293", "content": "\u041d\u0430 \u043f\u043e\u0440\u0442\u0430\u043b\u0435 GitHub \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d PoC-\u043a\u043e\u0434 \u0434\u043b\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 (CVE-2019-5736) \u0432 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0435 \u0434\u043b\u044f \u0437\u0430\u043f\u0443\u0441\u043a\u0430 \u0438\u0437\u043e\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u043e\u0432 RunC, \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0449\u0435\u0439 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u0435 \u043e\u0431\u043b\u0430\u0447\u043d\u044b\u0435 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b, \u0432\u043a\u043b\u044e\u0447\u0430\u044f AWS \u0438 Google Cloud, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0440\u044f\u0434 \u0434\u0438\u0441\u0442\u0440\u0438\u0431\u0443\u0442\u0438\u0432\u043e\u0432 Linux.    \n\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442 \u0434\u043b\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 RunC", "creation_timestamp": "2019-02-19T09:34:33.000000Z"}, {"uuid": "d7c9f855-f628-474b-9339-75f2a8f5560a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-5736", "type": "exploited", "source": "https://t.me/SecLabNews/4414", "content": "\u0421\u043e\u0442\u043d\u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0445 \u0447\u0435\u0440\u0435\u0437 \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0445\u043e\u0441\u0442\u043e\u0432 Docker \u0441\u0442\u0430\u043b\u0438 \u0436\u0435\u0440\u0442\u0432\u0430\u043c\u0438 \u043a\u0440\u0438\u043f\u0442\u043e\u0434\u0436\u0435\u043a\u0438\u043d\u0433\u0430. \u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0432\u0437\u043b\u043e\u043c\u0430\u043b\u0438 \u0438\u0445 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u0430 \u0434\u043b\u044f \u043d\u0435\u0434\u0430\u0432\u043d\u043e \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2019-5736 \u0438 \u0443\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u044e\u0442 \u043c\u0430\u0439\u043d\u0435\u0440\u044b \u043a\u0440\u0438\u043f\u0442\u043e\u0432\u0430\u043b\u044e\u0442.    \n\u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0432\u0437\u043b\u0430\u043c\u044b\u0432\u0430\u044e\u0442 \u0445\u043e\u0441\u0442\u044b Docker \u0438 \u0443\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u044e\u0442 \u043a\u0440\u0438\u043f\u0442\u043e\u043c\u0430\u0439\u043d\u0435\u0440\u044b", "creation_timestamp": "2019-03-06T08:17:03.000000Z"}, {"uuid": "2d6408a8-e289-4635-94cf-c8b9dcdc24df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-5736", "type": "exploited", "source": "https://t.me/SecLabNews/4238", "content": "\u0412 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0435 \u0434\u043b\u044f \u0437\u0430\u043f\u0443\u0441\u043a\u0430 \u0438\u0437\u043e\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u043e\u0432 RunC \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0430 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c (CVE-2019-5736), \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u044e\u0449\u0430\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0438\u0437 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u0430 \u0438\u0437\u043c\u0435\u043d\u0438\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u043d\u044f\u0435\u043c\u044b\u0439 \u0444\u0430\u0439\u043b RunC \u0438 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u0440\u0430\u0432\u0430 \u0441\u0443\u043f\u0435\u0440\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u043d\u0430 \u0445\u043e\u0441\u0442-\u0441\u0438\u0441\u0442\u0435\u043c\u0435. \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0432\u0441\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u043d\u043e\u0439 \u0438\u0437\u043e\u043b\u044f\u0446\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0449\u0438\u0435 RunC, \u0432\u043a\u043b\u044e\u0447\u0430\u044f Docker, containerd, Podman \u0438 CRI-O. \u041a\u0430\u043a \u043e\u0442\u043c\u0435\u0447\u0430\u0435\u0442\u0441\u044f, \u043f\u043e\u0445\u043e\u0436\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0442\u0430\u043a\u0436\u0435 \u043f\u0440\u0438\u0441\u0443\u0442\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0430\u0445 LXC \u0438 Apache Mesos.    \n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 RunC \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043a\u043e\u0434 \u0441 \u043f\u0440\u0430\u0432\u0430\u043c\u0438 \u0441\u0443\u043f\u0435\u0440\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u043d\u0430 \u0445\u043e\u0441\u0442\u0430\u0445 Docker", "creation_timestamp": "2019-02-12T11:04:03.000000Z"}, {"uuid": "922ec591-dda0-4007-9a9b-3c3869810b28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-5736", "type": "published-proof-of-concept", "source": "https://t.me/canyoupwnme/5125", "content": "CVE-2019-5736-PoC\nhttps://github.com/Frichetten/CVE-2019-5736-PoC", "creation_timestamp": "2019-02-15T22:04:06.000000Z"}, {"uuid": "0277a5b2-3b6e-4cd4-81f1-dd835d406dd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-5736", "type": "published-proof-of-concept", "source": "https://t.me/canyoupwnme/5154", "content": "Breaking out of Docker via runC \u2013 Explaining CVE-2019-5736\nhttps://www.twistlock.com/labs-blog/breaking-docker-via-runc-explaining-cve-2019-5736/", "creation_timestamp": "2019-02-21T23:05:05.000000Z"}, {"uuid": "a51286a8-0f5d-4182-99ca-f95dfa05aa94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-5736", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/168", "content": "#exploit\n1. PoC for CVE-2019-5736:\nhttps://github.com/Frichetten/CVE-2019-5736-PoC\n\n2. CVE-2019-6111:\nOpenSSH 7.9 - scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server/MiTM attacker can overwrite arbitrary files in the scp client target directory\nhttps://github.com/53n7hu/SNP\n\n3. CVE-2019-6225:\nvoucher_swap - Exploiting MIG reference counting in iOS 12\nhttps://googleprojectzero.blogspot.com/2019/01/voucherswap-exploiting-mig-reference.html\n\n4. Exploiting Malwarebytes Anti-Exploit\nhttps://acru3l.github.io/2019/02/02/exploiting-mb-anti-exploit", "creation_timestamp": "2024-10-08T14:36:45.000000Z"}, {"uuid": "e6d525b4-68c8-4d9f-977f-a8ead0a24773", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-5736", "type": "exploited", "source": "https://t.me/DC8044_Info/75", "content": "\u041a\u043e\u0434 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u0430 \u0434\u043b\u044f CVE-2019-5736 \u0432 runc, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0435\u0439 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u0440\u0430\u0432\u0430 root \u043d\u0430 \u0445\u043e\u0441\u0442\u0435, \u043b\u0438\u043a\u043d\u0443\u043b\u0438 \u0432 \u043f\u0430\u0431\u043b\u0438\u043a \u0440\u0430\u043d\u044c\u0448\u0435 \u0437\u0430\u043f\u043b\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e CRD.\nhttps://gist.github.com/singe/0ad4078848d85dc0d03f9f9013796e45\n\u0414\u0435\u0442\u0430\u043b\u0438: https://habr.com/ru/company/flant/blog/439964/", "creation_timestamp": "2019-02-13T10:34:55.000000Z"}]}