When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
So far, there has been no evidence that the vulnerability was abused in the wild.
Both could have been used to run arbitrary commands and steal sensitive information.