When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
That, luckily, reduces the attack surface significantly, but not entirely.
But the vulnerability seems unreliable.
The server downloads the malicious file, but then does nothing with it.
I’ll keep an eye on it, and see if they try anything else!
However, when attempting to exploit the vulnerability remotely over the internet, we faced failures.
ViaArs Technica