zlacker

[parent] [thread] 0 comments
1. trhway+(OP)[view] [source] 2025-12-17 23:25:34
>there still would need to be a vulnerability in docker for it to “attack” the host, or am I missing something?

non necessary vulnerability per. se. Bridged adapter for example lets you do a lot - few years ago there were a story of something like how a guy got a root in container and because the container used bridged adapter he was able to intercept traffic of an account info updates on GCP

[go to top]