Threat actors are actively exploiting two of the vulnerabilities, while three others are publicly known and ripe for attack.
Threat actors are actively exploiting two of the vulnerabilities, while three others are publicly known and ripe for attack.