Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | kernel | kernel 5.17 rc3 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Test whether a container environment is vulnerable to container escapes via CVE-2022-0492 | https://github.com/PaloAltoNetworks/can-ctr-escape-cve-2022-0492 | POC Details |
| 2 | A script to check if a container environment is vulnerable to container escapes via CVE-2022-0492 | https://github.com/SofianeHamlaoui/CVE-2022-0492-Checker | POC Details |
| 3 | None | https://github.com/puckiestyle/CVE-2022-0492 | POC Details |
| 4 | CVE-2022-0492 EXP and Analysis write up | https://github.com/chenaotian/CVE-2022-0492 | POC Details |
| 5 | None | https://github.com/Trinadh465/device_renesas_kernel_AOSP10_r33_CVE-2022-0492 | POC Details |
| 6 | CVE-2022-0492-Container-Escape | https://github.com/yoeelingBin/CVE-2022-0492-Container-Escape | POC Details |
| 7 | Docker Breakout Checker and PoC via CAP_SYS_ADMIN and via user namespaces (CVE-2022-0492) | https://github.com/T1erno/CVE-2022-0492-Docker-Breakout-Checker-and-PoC | POC Details |
| 8 | None | https://github.com/bb33bb/CVE-2022-0492 | POC Details |
| 9 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%BA%91%E5%AE%89%E5%85%A8%E6%BC%8F%E6%B4%9E/Linux%20%E5%86%85%E6%A0%B8%20cgroup%20v1%20%E9%80%BB%E8%BE%91%E9%94%99%E8%AF%AF%E5%AF%BC%E8%87%B4%E5%AE%B9%E5%99%A8%E9%80%83%E9%80%B8%20CVE-2022-0492.md | POC Details |
| 10 | PoC for CVE-2022-0492 | https://github.com/Perimora/cve_2022_0492 | POC Details |
| 11 | CVE-2022-0492 | https://github.com/smallcat9612/CVE-2022-0492-Docker-Breakout-Checker-and-PoC | POC Details |
No public POC found.
Login to generate AI POCNo comments yet