• madsen@lemmy.world
    link
    fedilink
    arrow-up
    2
    ·
    1 year ago

    Does anyone have any concrete examples of this vulnerability being exploited? I see “exploited in attacks” all over the place but nothing concrete, no IoCs, no victims, no PoCs…