Skip to main content

2 docs tagged with "volumes"

View all tags

Insecure CSI Drivers

How attackers exploit insecure Container Storage Interface (CSI) drivers to gain unauthorized access to persistent volumes and sensitive data.

Unrestricted HostPath Mounts

How attackers exploit unrestricted hostPath mounts to gain access to the host filesystem and escalate privileges.