Hundreds of Vulnerable Docker Hosts Exploited by Cryptocurrency Miners. Docker technology allows OS virtualization. New CVE-2019-5736 vulnerability allows host root access from a docker container, combined with exposed remote API, leads to compromised hosts. 3,822 Docker hosts with publicly exposed remote API. Many run Monero cryptocurrency miner
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo