This repository contains information on various Container Escape CVEs along with their Proof of Concepts, including complete setup and execution instructions. Additionally, the repository includes audit logs and malicious subgraphs for each CVE.
Each folder in the repository is named after the CVE number and contains all the relevant files, including:
- Proof of concept code and scripts
- Step-by-step instructions for setting up the environment and executing the PoC
- Logs and output generated during the execution of the PoC
- Any malicious subgraphs or files detected in the CVEs
We would like to acknowledge the use of the following tools for the setup of the environment, including Docker and Kubernetes versions:
By providing this information, the repository serves as a valuable resource for security researchers and professionals who want to learn more about these CVEs and how they can be exploited. The detailed instructions and logs can be used to better understand the vulnerabilities and improve security measures to prevent such attacks.