Is there a write up for the Lemmy exploit that happened? Or can someone give me any specific? I’m a cybersecurity student and would like to learn a bit more.
EDIT: Awesome, thanks for the links guys!
Home of the sh.itjust.works instance.