hedge@beehaw.org to Technology@beehaw.orgEnglish · 1 year agoCritical Vulnerability Exploits Several Lemmy Instanceswedistribute.orgexternal-linkmessage-square15fedilinkarrow-up187arrow-down10
arrow-up187arrow-down1external-linkCritical Vulnerability Exploits Several Lemmy Instanceswedistribute.orghedge@beehaw.org to Technology@beehaw.orgEnglish · 1 year agomessage-square15fedilink
what
Sorry, 1984 references!