Docker
Docker, the widely-used containerization platform, has a high-severity vulnerability (CVSS 7.5) that requires local access and high-level privileges to exploit, but can compromise confidentiality, integrity, and availability across system boundaries when successfully leveraged. The attack does not require user interaction, making it dangerous once an attacker with administrative or root-level access gains a foothold on a system running Docker. Security teams should monitor for privilege escalation attempts and unauthorized access to Docker daemon processes, particularly in environments where container isolation or user segregation may be weak.