The stages involved in resolving issues related to CVE-2020-1472 include: 1. Discovery: The vulnerability is discovered by a reporter, such as a vendor, researcher, or user. 2. Reporting: The reporter contacts the CVE Assignment Team or a CNA to request a CVE ID. 3. Assignment: The CNA assigns a CVE ID to the vulnerability and writes a brief description with references. 4. Publication: The new CVE is posted on the CVE website for public awareness. 5. Resolution: Vendors and organizations work on fixing the vulnerability to mitigate the risk of exploitation.
The stages involved in resolving issues related to CVE-2020-1472 include:
1. Discovery: The vulnerability is discovered by a reporter, such as a vendor, researcher, or user.
2. Reporting: The reporter contacts the CVE Assignment Team or a CNA to request a CVE ID.
3. Assignment: The CNA assigns a CVE ID to the vulnerability and writes a brief description with references.
4. Publication: The new CVE is posted on the CVE website for public awareness.
5. Resolution: Vendors and organizations work on fixing the vulnerability to mitigate the risk of exploitation.
Спасиба интересно побольше таких разборов!
Скажите он только контроллеры домена атакует? или даже те windows сервера, которые находятся в сети с AD?
Спасибо!
ссылка на скрипт github.com/WiIs0n/Zerologon_CVE-2020-1472
Ооо пасиб
@@Мем-ц2й лучше поздно, чем никогда ;)))