Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Docker | Docker Desktop | 4.25 ~ 4.44.3 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/zenzue/CVE-2025-9074 | POC Details |
| 2 | New vulnerability found in Docker. Credit for finding the vulnerability goes to Felix Boulet | https://github.com/j3r1ch0123/CVE-2025-9074 | POC Details |
| 3 | None | https://github.com/pucagit/CVE-2025-9074 | POC Details |
| 4 | Proof-of-Concept exploit for CVE-2025-9074 - Unauthenticated Docker API exposure allowing arbitrary container creation and host filesystem access. | https://github.com/OilSeller2001/PoC-for-CVE-2025-9074 | POC Details |
| 5 | A vulnerability has been identified in Docker Desktop. A remote attacker could exploit this vulnerability to trigger security restriction bypass on the targeted system. | https://github.com/BridgerAlderson/CVE-2025-9074-PoC | POC Details |
| 6 | Docker API CVE-2025-9074 PoC (Proof-Of-Concept). A sophisticated exploitation framework for CVE-2025-9074, targeting unauthenticated Docker API endpoints with an integrated interactive command shell. | https://github.com/xwpdx0/poc-2025-9074 | POC Details |
| 7 | Proof of concept exploit for CVE-2025-9074 - Unauthenticated Docker Engine API container escape affecting Docker Desktop < 4.44.3 on Windows and macOS (CVSS 9.3) | https://github.com/PtechAmanja/CVE-2025-9074-Docker-Desktop-Container-Escape | POC Details |
| 8 | None | https://github.com/pppxo/CVE-2025-9074-PoC-Bash | POC Details |
| 9 | Proof-of-Concept exploit for CVE-2025-9074 | https://github.com/3rendil/CVE-2025-9074-POC | POC Details |
| 10 | The Ultimate DAEMON_KILLER. Control is an illusion. This Exploit forces CVE-2025-9074 to break the Docker cage. Advanced Container Escape & Root Escalation toolkit. Verify the vulnerability, take the host, destroy the logs. > We Are Fsociety_ | https://github.com/fsoc-ghost-0x/CVE-2025-9074_DAEMON_KILLER | POC Details |
| 11 | None | https://github.com/zaydbf/CVE-2025-9074-Poc | POC Details |
| 12 | 一个功能强大的 Docker 远程 API 漏洞利用工具,用于 CVE-2025-9074 漏洞的安全研究和测试。 | https://github.com/Shaoshi17/CVE-2025-9074-Docker-Exploit | POC Details |
| 13 | 🚀 Exploit CVE-2025-9074 with this Docker escape framework, simplifying API vulnerabilities and enhancing security testing for developers and researchers. | https://github.com/KvzinNcpx7/CVE-2025-9074_DAEMON_KILLER | POC Details |
| 14 | 🛠️ Exploit CVE-2025-9074 using this API exploitation framework designed for Docker environments, enhancing your security assessment capabilities. | https://github.com/KvzinNcpx7/kvzinncpx7.github.io | POC Details |
| 15 | 一个容器逃逸漏洞POC | https://github.com/x0da6h/POC-for-CVE-2025-9074 | POC Details |
| 16 | CVE-2025-9074: Docker Desktop LPE via Docker Engine API wo/ AuthN in posix sh | https://github.com/matesz44/CVE-2025-9074 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet