# CVE-2022-25365
# The privilege escalation vulnerability in Docker Desktop for Windows
reference: https://www.cyberark.com/resources/threat-research-blog/breaking-docker-named-pipes-systematically-docker-desktop-privilege-escalation-part-1<br>
# File list
poc.py Coded by followboy1999<br>
createsymlink.exe Coded by James Forshaw<br>
junction64.exe Coded by Mark Russinovich<br>
ualapi.dll come from https://github.com/ionescu007/faxhell
[4.0K] /data/pocs/552c6a9f01029ea739d9b34e46b90a3736d8533a
├── [126K] CreateSymlink.exe
├── [438K] junction64.exe
├── [2.5K] poc.py
└── [ 442] README.md
0 directories, 4 files