Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 个月前Critical Linux Vulnerabilities Expose Password Hashes on Millions of Linux Systems Worldwidecybersecuritynews.comexternal-linkmessage-square5fedilinkarrow-up125arrow-down13
arrow-up122arrow-down1external-linkCritical Linux Vulnerabilities Expose Password Hashes on Millions of Linux Systems Worldwidecybersecuritynews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 个月前message-square5fedilink
minus-squareSayCyberOnceMore@feddit.uklinkfedilinkEnglisharrow-up8·1 个月前Skimming through the Qualsys report it seems that the attacker would already need access to the device first, to be able to crash the processes and then collect the hashes, so I’d say this vulnerability appears to need chaining with other(s)?
Skimming through the Qualsys report it seems that the attacker would already need access to the device first, to be able to crash the processes and then collect the hashes, so I’d say this vulnerability appears to need chaining with other(s)?