logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • The Shifting Landscape of Open Source Supply Chain Attacks – Part 3
  • Chinese PlugX Malware Hidden in Your USB Devices?
  • Ukraine’s Critical Sectors Targeted in Phishing Attack Surge
  • 3 business application security risks businesses need to prepare for in 2023
  • Google slays thousands of fake news vids posted by pro-China group Dragonbridge

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2022-42394 (pdf-xchange_editor) 26 January 2023
  • CVE-2022-42388 (pdf-xchange_editor) 26 January 2023
  • CVE-2022-42392 (pdf-xchange_editor) 26 January 2023
  • CVE-2022-42391 (pdf-xchange_editor) 26 January 2023
  • CVE-2022-42395 (pdf-xchange_editor) 26 January 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

DoS Exploit PoC Released for Critical Windows RDP Gateway Bugs

Posted on 25 January 2020

From bleepingcomputer.com

DOS PoC Exploit Released for Critical Windows RDP Gateway Bugs

A proof-of-concept (PoC) denial of service exploit has been published by Danish security researcher Ollypwn for the CVE-2020-0609 and CVE-2020-0610 flaws affecting the Remote Desktop Gateway (RD Gateway) component on Windows Server (2012, 2012 R2, 2016, and 2019) devices.

Read more…

Posted in News

Post navigation

Previous post: Trend Micro antivirus zero-day used in Mitsubishi Electric hack
Next post: Mozilla has banned nearly 200 malicious Firefox add-ons over the last two weeks
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.