The vulnerability would have allowed an unauthenticated attacker to execute code on a container hosted on one of the platforms nodes.
Read full article here
The vulnerability would have allowed an unauthenticated attacker to execute code on a container hosted on one of the platforms nodes.
Read full article here