Unrestricted HostPath Mounts
How attackers exploit unrestricted hostPath mounts to gain access to the host filesystem and escalate privileges.
How attackers exploit unrestricted hostPath mounts to gain access to the host filesystem and escalate privileges.