Product
A remote, authenticated attacker can exploit a vulnerability in Podman to manipulate files on the host system.