Aggregator
.NET 安全基础入门学习(11.22更新)
19 hours 19 minutes ago
Qilin
19 hours 33 minutes ago
cohenido
什么!这条PoC/EXP的作者竟是?
19 hours 39 minutes ago
威努特荣膺2024网络安全“金帽子”年度优秀安全产品
19 hours 39 minutes ago
威努特数据备份与恢复系统荣誉登榜,为企业构建数据安全基础架构。
威努特助力新能源汽车行业生产控制系统网络安全建设
19 hours 39 minutes ago
为新能源汽车生产基地构建全方位、多层次的网络安全防护体系。
由老版mybatis-plus本地构建说开去
19 hours 39 minutes ago
开源老项目构建之路
What is DSPT Compliance: From Toolkit to Audit (2024)
19 hours 46 minutes ago
The Data Security and Protection Toolkit (DSPT), an online tool, is undergoing significant changes. From September 2024, the DSPT will now align with the National Cyber Security Centre’s Cyber Assessment Framework (CAF) to enhance cybersecurity measures across the NHS. This shift will impact many NHS organisations and require adjustments to their data security and protection […]
The post What is DSPT Compliance: From Toolkit to Audit (2024) appeared first on Security Boulevard.
Harman Singh
CVE-2015-5809 | Apple iOS up to 8.4.1 WebKit memory corruption (HT205212 / Nessus ID 86270)
19 hours 52 minutes ago
A vulnerability was found in Apple iOS up to 8.4.1. It has been rated as critical. Affected by this issue is some unknown functionality of the component WebKit. The manipulation leads to memory corruption.
This vulnerability is handled as CVE-2015-5809. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2015-5806 | Apple iTunes up to 12.2 WebKit memory corruption (HT205221 / Nessus ID 86001)
19 hours 52 minutes ago
A vulnerability, which was classified as critical, was found in Apple iTunes up to 12.2. This affects an unknown part of the component WebKit. The manipulation leads to memory corruption.
This vulnerability is uniquely identified as CVE-2015-5806. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2015-5808 | Apple iTunes up to 12.2 WebKit memory corruption (HT205221 / Nessus ID 86001)
19 hours 52 minutes ago
A vulnerability was found in Apple iTunes up to 12.2 and classified as critical. This issue affects some unknown processing of the component WebKit. The manipulation leads to memory corruption.
The identification of this vulnerability is CVE-2015-5808. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2015-5806 | Apple iOS up to 8.4.1 WebKit memory corruption (HT205212 / Nessus ID 86270)
19 hours 52 minutes ago
A vulnerability was found in Apple iOS up to 8.4.1. It has been classified as critical. Affected is an unknown function of the component WebKit. The manipulation leads to memory corruption.
This vulnerability is traded as CVE-2015-5806. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2015-5803 | Apple iTunes up to 12.2 WebKit memory corruption (HT205221 / Nessus ID 86001)
19 hours 52 minutes ago
A vulnerability classified as critical has been found in Apple iTunes up to 12.2. Affected is an unknown function of the component WebKit. The manipulation leads to memory corruption.
This vulnerability is traded as CVE-2015-5803. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
【VPN翻墙行为属性及法律风险解析】
20 hours 14 minutes ago
VPN翻墙行为属性及法律风险解析XY爸爸 20220904“翻墙”,系网络用语,所谓的“墙”,其实指的就是民
【视频真实性-完整性检验方法】
20 hours 14 minutes ago
MITRE: Cross-Site Scripting Is 2024's Most Dangerous Software Weakness
20 hours 17 minutes ago
In addition to XSS, MITRE and CISA's 2024 list of the 25 most dangerous security vulnerability types (CWEs) also flagged out-of-bounds write, SQL injection, CSRF, and path traversal.
Becky Bracken, Senior Editor, Dark Reading
CVE-2011-0222 | Apple Safari up to 5.0.5 memory corruption (EDB-17567 / Nessus ID 56469)
20 hours 24 minutes ago
A vulnerability, which was classified as very critical, has been found in Apple Safari up to 5.0.5. This issue affects some unknown processing. The manipulation leads to memory corruption.
The identification of this vulnerability is CVE-2011-0222. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2018-6225 | Trend Micro Email Encryption Gateway 5.5 xml external entity reference (EDB-44166)
20 hours 34 minutes ago
A vulnerability classified as critical has been found in Trend Micro Email Encryption Gateway 5.5. This affects an unknown part. The manipulation leads to xml external entity reference.
This vulnerability is uniquely identified as CVE-2018-6225. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
vuldb.com
关于软件开发与网络安全的讨论,以及数据安全风险监测用于哪些维度?|总第273周
20 hours 38 minutes ago
本期周报简介:1、关于软件开发与网络安全的讨论。
2、数据安全风险监测用于哪些维度?
CVE-2018-6226 | Trend Micro Email Encryption Gateway 5.5 Reflected cross site scripting (EDB-44166)
20 hours 53 minutes ago
A vulnerability classified as problematic was found in Trend Micro Email Encryption Gateway 5.5. This vulnerability affects unknown code. The manipulation leads to cross site scripting (Reflected).
This vulnerability was named CVE-2018-6226. The attack can be initiated remotely. Furthermore, there is an exploit available.
vuldb.com