Submitter : c2a
Date: 20 July 2024
Bounty : undisclosed
Vulnerabilities :
Programs :
Authors :
Link : https://blog.pwnedlabs.io/blog.pwnedlabs.io/exploiting-gcp-cloud-build-for-privilege-escalation
Submitter : c2a
Date: 20 July 2024
Bounty : undisclosed
Vulnerabilities :
Programs :
Authors :
Link : https://blog.pwnedlabs.io/blog.pwnedlabs.io/exploiting-gcp-cloud-build-for-privilege-escalation