Submitter : c2a
Date: 2 February 2023
Bounty : undisclosed
Vulnerabilities :
Programs :
Authors :
Link : https://www.cyberark.com/resources/threat-research-blog/breaking-docker-named-pipes-systematically-docker-desktop-privilege-escalation-part-1