Comprehensive Threat Exposure Management Platform
An attacker with authenticated, local access can exploit these vulnerabilities to escape the restricted shell and gain root privileges on the operating system.
To receive real-time threat advisories, please follow HiveForce Labs on LinkedIn.
Get through updates and upcoming events, and more directly in your inbox