-
### What would you like to be added/changed?
A FoundationDB cluster can be run with the config db disabled (`--no-config-db` passed to `fdbserver` processes); however when operator would issue the `c…
gm42 updated
2 months ago
-
There are a number of ways enterprises may automatically authenticate users on a site:
* Browser extensions (e.g. the [Windows Accounts](https://chrome.google.com/webstore/detail/windows-accounts/…
-
I don't actually know what to do about this:
> The mitigations to the content exfiltration case regard participants
> in the protocol as potential passive attackers themselves, and apply
> the …
-
### Describe the bug and how to replicate it
```java
this.oldPacketLocation = newPacketLocation;
this.newPacketLocation = new ReachInterpolationData(player, oldPacketLocation.getPossibleLocationCom…
-
**Is your feature request related to a problem? Please describe.**
It's frustrating that you have to choose each element and generate threats for each and everyone of them.
**Describe the solution…
-
**Describe what problem your feature request solves**:
Once a threat is created, it is not possible to duplicate it or move it to other components. You need to manually repeat the whole process or …
-
The current data that is loaded by the convert.py script does not contain 'id' fields for entities, as the enterprise-attack json files do.
To load data into a database and allow it to be updated, …
-
Get information on top 2 misconfiguration issues and implement mitigations/fixes for those cases
-
# Proposed New Idea/Feature (required)
This feature aims to fill the gap between CVEs and MITRE ATT&CK techniques.
It will allow to map the CPE of an asset/device with the CVEs and the corresponding …
-
It would be nice to have a more readable output for scanning directories/multiple binaries.
Some ideas:
- If a given mitigation is not enabled in all binaries, list it only in a summary that all b…