The actively exploited defect, triggered by an attacker’s use of a publicly available sample machine key, underscores the vendor and customers’ poor configuration practices.
First seen on cyberscoop.com
Jump to article: cyberscoop.com/sitecore-zero-day-vulnerability/
![]()

