What’re the most common vulnerabilities/weaknesses an attacker would exploit to gain SSH access to a container?

Fair warning – I am a security newbie.
In all container escape/breakout vulnerability scenarios I’ve read (CVE-2022-0185), the author assumes or states that the attacker already had shell or SSH access to the container. When I follow this … Continue reading What’re the most common vulnerabilities/weaknesses an attacker would exploit to gain SSH access to a container?