Four new vulnerabilities have been identified in containers that could allow a threat actor to escape the container and gain access to the host system. These vulnerabilities have been named “Leaky Vessels” by researchers that could potentially enable a threat actor to access sensitive data on the host systems and launch further attacks. The CVEs […]
The post Multiple Container Flaws Allow Attackers to Access the Host OS appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.
Run Free ThreatScan on Your Mailbox
AI-Powered Protection for Business Email Security
Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Try Trustifi Free Threat Scan with Sophisticated AI-Powered Email Protection .
Source: gbHackers
Source Link: https://gbhackers.com/leaky-vessels-container-flaws/