@cR0w @catsalad
Yeah, proof of ITW exploitation is quite a tricky thing.
Functional public exploit exists? That's technically not evidence of exploitation in the wild.
Trivial to figure out? Same.
Without evidence, I suppose both count as probably exploited ITW.