Mastodon security update: every version prior to today's is vulnerable to remote user impersonation and takeoverArthur Besse@lemmy.ml to Fediverse@lemmy.ml – 187 points – 10 months agogithub.com15Post a CommentPreviewYou are viewing a single commentView all commentsShow the parent commentWithout a published POC there's a slightly longer window before clueless script kiddies start having a go at exploiting the vulnerability, though.Script kiddies aren’t the first ones to take advantage of vulns, threat actors are.That doesn't mean you shouldn't try to contain the blast radius.3 more...3 more...3 more...
Without a published POC there's a slightly longer window before clueless script kiddies start having a go at exploiting the vulnerability, though.Script kiddies aren’t the first ones to take advantage of vulns, threat actors are.That doesn't mean you shouldn't try to contain the blast radius.3 more...3 more...3 more...
Script kiddies aren’t the first ones to take advantage of vulns, threat actors are.That doesn't mean you shouldn't try to contain the blast radius.3 more...3 more...
Without a published POC there's a slightly longer window before clueless script kiddies start having a go at exploiting the vulnerability, though.
Script kiddies aren’t the first ones to take advantage of vulns, threat actors are.
That doesn't mean you shouldn't try to contain the blast radius.