The vulnerability would have allowed an unauthenticated attacker to execute code on a container hosted on one of the platform’s nodes.
Source: htdarkreading.com
The vulnerability would have allowed an unauthenticated attacker to execute code on a container hosted on one of the platform’s nodes.
Source: htdarkreading.com