Attackers can remotely execute code with System privileges by exploiting a vulnerability in the source code of the open-source container management system.
- TootSweet@lemmy.worldEnglish41·8 months ago
Attackers can remotely execute code with System privileges by exploiting a vulnerability in the source code of the open-source container management system.