Is there a write up for the Lemmy exploit that happened? Or can someone give me any specific? I’m a cybersecurity student and would like to learn a bit more.
EDIT: Awesome, thanks for the links guys!
https://lemmy.world/post/1299831
This link, too. Both the prior comment and this link post say the same thing for the most part with some variations.
Home of the sh.itjust.works instance.
https://lemmy.world/post/1299831
This link, too. Both the prior comment and this link post say the same thing for the most part with some variations.