The vulnerability would have allowed an unauthenticated attacker to execute code on a container hosted on one of the platform’s nodes.
The vulnerability would have allowed an unauthenticated attacker to execute code on a container hosted on one of the platform’s nodes.