Threat actors have demonstrated just how quickly they operate today after exploiting a critical open source vulnerability ...
Because attacker-supplied flow data is used in public flows, the bug leads to unauthenticated remote code execution.