TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Emergency Directive 20-03 – Remote code execution vulnerability in Windows DNS

102 点作者 PatrolX将近 5 年前

3 条评论

rsync将近 5 年前
This isn&#x27;t snark - I am serious.<p>Who would be running a DNS server on a Windows system ?<p>Why would they be doing such a thing ? What is the thinking here ? I understand running windows-specific infrastructure like an AD server or a PDC or whatever but ... a DNS server ?
评论 #23865823 未加载
评论 #23865207 未加载
评论 #23865163 未加载
评论 #23865132 未加载
评论 #23865402 未加载
评论 #23867665 未加载
评论 #23866069 未加载
评论 #23869746 未加载
PatrolX将近 5 年前
Cybersecurity and Infrastructure Security Agency<p>Report (PDF) :<p><a href="https:&#x2F;&#x2F;cyber.dhs.gov&#x2F;assets&#x2F;report&#x2F;ed-20-03.pdf" rel="nofollow">https:&#x2F;&#x2F;cyber.dhs.gov&#x2F;assets&#x2F;report&#x2F;ed-20-03.pdf</a>
Neil44将近 5 年前
Even if your Windows DNS is not exposed to the internet, it means that anyone getting a device on your WAN can get windows domain admin.