Hallo zusammen,
sofern nicht selber schon gesehen/-lesen hier [0] FYI
"Hackers use PoC exploits in attacks 22 minutes after release"
VG
Bernd
[0] https://www.bleepingcomputer.com/news/security/hackers-use-poc-exploits-in-a...
rwth-security@lists.rwth-aachen.de