The stages involved in resolving issues related to CVE-2020-1472 include: 1. Discovery: The vulnerability is discovered by a reporter, such as a vendor, researcher, or user. 2. Reporting: The reporter contacts the CVE Assignment Team or a CNA to request a CVE ID. 3. Assignment: The CNA assigns a CVE ID to the vulnerability and writes a brief description with references. 4. Publication: The new CVE is posted on the CVE website for public awareness. 5. Resolution: Vendors and organizations work on fixing the vulnerability to mitigate the risk of exploitation.
The stages involved in resolving issues related to CVE-2020-1472 include:
1. Discovery: The vulnerability is discovered by a reporter, such as a vendor, researcher, or user.
2. Reporting: The reporter contacts the CVE Assignment Team or a CNA to request a CVE ID.
3. Assignment: The CNA assigns a CVE ID to the vulnerability and writes a brief description with references.
4. Publication: The new CVE is posted on the CVE website for public awareness.
5. Resolution: Vendors and organizations work on fixing the vulnerability to mitigate the risk of exploitation.
Спасиба интересно побольше таких разборов!
Спасибо!
Скажите он только контроллеры домена атакует? или даже те windows сервера, которые находятся в сети с AD?
ссылка на скрипт github.com/WiIs0n/Zerologon_CVE-2020-1472
Ооо пасиб
@@user-yj2bj6bw2z лучше поздно, чем никогда ;)))