Aggregator
CVE-2002-1637 | Oracle Application Server Default Account improper authentication (VU#712723 / Nessus ID 57619)
CVE-2002-1635 | Oracle Application Server Apache Configuration httpd.conf Source information disclosure (VU#936507 / Nessus ID 57619)
CVE-2002-1633 | QNX 4.25 wstrip memory corruption (VU#879386 / XFDB-9341)
CVE-2002-1628 | Mike Spice Mikes Vote CGI up to 1.2 vote.cgi type path traversal (VU#250107 / XFDB-7971)
CVE-2002-1629 | Multi-Tech Proxyserver Mtpsr1/Mtpsr2/Mtpsr3 Telnet/HTTP Server Password improper authentication (VU#495705 / Nessus ID 11504)
CVE-2002-1630 | Oracle Application Server 1.0.2.1s sendmail.jsp Mail privileges management (VU#717827 / Nessus ID 57619)
CVE-2002-1632 | Oracle Application Server info.jsp printenv/echo/echo2 information disclosure (VU#717827 / Nessus ID 57619)
Financial Censorship: 5 Global Cases and How Crypto Can Help You Avoid It
CVE-2011-5031 | Shilpisoft capexweb 1.1 sql injection (EDB-18247 / XFDB-71959)
Navigating the compliance labyrinth: A CSO’s guide to scaling security
Imagine navigating a labyrinth where the walls constantly shift, and the path ahead is obscured by fog. If this brings up a visceral image, you’ve either seen David Bowie’s iconic film or are very familiar with the real-world challenge of compliance in today’s fast-paced business environment. Just as in the labyrinth, where every turn can lead to unexpected challenges or opportunities, companies face a complex maze of regulatory requirements. As a CSO, your role demands … More →
The post Navigating the compliance labyrinth: A CSO’s guide to scaling security appeared first on Help Net Security.
Changing the Face of Web Management: Interview with SOTY 2024 Nominee, SiteSkite
美国四分之三的成年人超重或肥胖
Heatmiser Wifi Thermostat 1.7 - Cross-Site Request Forgery
Calibre-web 0.6.21 Stored XSS
SOPlanning 1.52.01 (Simple Online Planning Tool) Remote Code Execution (RCE) (Authenticated)
Transforming code scanning and threat detection with GenAI
In this Help Net Security interview, Stuart McClure, CEO of Qwiet AI, discusses the evolution of code scanning practices, highlighting the shift from reactive fixes to proactive risk management. McClure also shares his perspective on the future of AI-driven code scanning, emphasizing the potential of machine learning in threat detection and remediation. How have you observed code scanning practices evolve in recent years, especially with cloud adoption and DevSecOps? Code scanning has come a long … More →
The post Transforming code scanning and threat detection with GenAI appeared first on Help Net Security.