Any thoughts on why Microsoft rates it as important and not critical.
-
-
-
It seems consistent with their scale, it means https is broken, not iis remote shell. Still, if you can't make exceptions for things like this, then maybe the scale is broken.
Kraj razgovora
Novi razgovor -
-
-
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
But it is only ECC, not RSA. So that does cut out some portion of usage. No clue where its at today.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
Correct me if I'm reading this incorrectly. But this would mean all MS based PKInfra implementations are vulnerable and a whole lot of root CAs are going have to be brought online for patching.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
Any idea on how whitelisting solutions like
@vmw_carbonblack would handle this? Assuming I have an application that gets tricked by a CVE-2020-0601 ECC signature, so windows believes that the app is valid. Would a binary WL that uses sigatures be automatically be tricked as well? - Još 3 druga odgovora
Novi razgovor -
-
-
That's pretty horrifying given how X.509 is basically what underpins all major encryption on the Internet. I can't help but wonder how long this went without being undiscovered/unpatched ...
- Još 2 druga odgovora
Novi razgovor -
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.