-
A security vulnerability in a system refers to a weakness or flaw that can be exploited by attackers to gain unauthorized access, manipulate data, or disrupt the normal functioning of the system. Here…
-
Issue Level: Low
First Discovered: 10/12/2018
Remediation Date: 2/9/2019
-
Dear LSC-project team,
the lsc is installed on one of our ubuntu servers and synchronizes some OUs between two LDAP servers. A [Qualys Cloud Agent](https://www.qualys.com/cloud-agent/) has been ins…
-
From today's TAC call there is a need to develop a Project Security Governance/process working group to assist the TAC in its projects in establishing good security practices and bootstrapping vulnera…
-
Hello ActiveDriverDB developers,
We are a cybersecurity research group from the CISPA Helmholtz Center for Information Security and Ca’ Foscari University of Venice. We recently conducted an analys…
-
## Goal
| User story |
|:---------------------------------------------------------------------------|
| As a vulnerability management engineer,
| I want to see vulnerabilities (CVEs) for my cus…
-
In different discussions off-Github and [on-Github](https://github.com/green-coding-solutions/eco-ci-energy-estimation/issues/66) a problem with Eco-CI came to light:
- When using a different base…
-
Remember, an issue is not the place to ask questions. You can use our [Slack channel](https://github.com/OWASP/www-project-top-10-for-large-language-model-applications/wiki) for that, or you may want …
-
reported by @mjherzog
We should add data in CSAF format from https://github.com/cisagov/CSAF
Note:
- there may be several devices we may not care for in these data
- https://github.com/oas…
-
I don't know if there's a better way to do this but running ssh-audit against a RHEL server's sshd seems to result in false CVE reporting. For example, my FreeBSD systems, which use OpenSSH 9.6p1, wil…