Some exploit authors love writing up their work. For example:
https://googleprojectzero.blogspot.com/2016/12/chrome-os-exp...
Not backend.
There is absolutely nothing special about backends in this regard except that it’s more likely that the attacker doesn’t have access to the code or binary.