RE: Comodo password exposed in GitHub allowed access to internal Comodo files

2019-07-30 Thread Robin Alden via dev-security-policy
Nick, Ángel, Sectigo is not affected by this incident. https://sectigo.com/blog/attention-journalists-and-researchers-dont-confuse-comodo-with-sectigo Regards Robin Alden Sectigo Limited > -Original Message- > From: Nick Lamb via dev-security-policy > Sent: 27 July 2019 23:42 >

Re: Comodo password exposed in GitHub allowed access to internal Comodo files

2019-07-29 Thread Jakob Bohm via dev-security-policy
On 28/07/2019 00:41, Nick Lamb wrote: On Sun, 28 Jul 2019 00:06:38 +0200 Ángel via dev-security-policy wrote: A set of credentials mistakenly exposed in a public GitHub repository owned by a Comodo software developer allowed access to internal Comodo documents stored in OneDrive and

Re: Comodo password exposed in GitHub allowed access to internal Comodo files

2019-07-27 Thread Nick Lamb via dev-security-policy
On Sun, 28 Jul 2019 00:06:38 +0200 Ángel via dev-security-policy wrote: > A set of credentials mistakenly exposed in a public GitHub repository > owned by a Comodo software developer allowed access to internal Comodo > documents stored in OneDrive and SharePoint: > >

Re: Comodo password exposed in GitHub allowed access to internal Comodo files

2019-07-27 Thread Ronald Crane via dev-security-policy
Thank you for posting that notice. It's not clear whether the leak impacted issuance. From the link you cited: *** Other documents appeared to be Comodo vulnerability reports. *** Ursem’s cursory review of the data did