Technology ❯ Software ❯ Security ❯ Exploitation
A leaked hotfix plus a reproducible exploit elevate the risk of automated attacks despite no confirmed in‑the‑wild abuse.