https://github.com/m...aster/top1000.txt
Check that list.
Change your password if you have an account on a vulnerable host.
![]() https://github.com/m...aster/top1000.txt
Check that list. Change your password if you have an account on a vulnerable host. |
|
![]() |
|
![]() |
|
![]() --
Drew |
|
![]() This works both ways. A malicious server can extract the memory of any client using vulnerable OpenSSL versions. How long before all those will be patched, especially the statically linked stuff?...
https://tools.ietf.o...ml/rfc6520#page-5 Each endpoint sends HeartbeatRequest messages at a rate and with the |
|
![]() Oh yeah, this is going to be fun.
--
greg@gregfolkert.net "No snowflake in an avalanche ever feels responsible." --Stanislaw Jerzy Lec |
|
![]() I don't have any accounts on any of the Vulnerable websites.
I guess being apathetic to most of them is a good thing. --
greg@gregfolkert.net "No snowflake in an avalanche ever feels responsible." --Stanislaw Jerzy Lec |