[rwth-security] Hackers use PoC exploits in attacks 22 minutes after release