1. 3
  1. 2

    USA’s Cybersecurity and Infrastructure Security Agency’s similarly short comment on the exploit: “An attacker could exploit this vulnerability to take control of an affected system. This vulnerability was detected in exploits in the wild.” Make sure your browser is updated before any further browsing today!