![]() |
Many more web platforms vulnerable to the hash collision attack (not only ASP.NET) #2
When writing my*Patch your ASP.NET servers ASAP*early this morning, I didn’t have time to research the full extend of the vulnerabilities published at 28C3*(slides, mp4), though a small bell was ringing a message that I had seen something like it before earlier this century. I was right, this ...http://feeds.feedburner.com/~r/delph...~4/dDjKwrhzBpQ
![]() |
Alle Zeitangaben in WEZ +1. Es ist jetzt 23:38 Uhr. |
Powered by vBulletin® Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
LinkBacks Enabled by vBSEO © 2011, Crawlability, Inc.
Delphi-PRAXiS (c) 2002 - 2023 by Daniel R. Wolf, 2024 by Thomas Breitkreuz