-
# [CVE-2021-44228](https://github.com/advisories/GHSA-jfh8-c2jp-5v3q) Announce
Recently, the mainstream log framework [log4j2](https://logging.apache.org/log4j/2.x/) was reported with a severe secur…
-
See https://github.com/dart-lang/sdk/issues/48056 for context.
-
I start to make a rtsp tcp project. I find webrtc project use libsrtp to encrypt data. but some rtsp with ssl use the default function SSL_Write and SSL_Read to encrypt data. openssl default encryptio…
-
Following an upgrade (I think of requests or urlib3) I became plagued by InsecureRequestWarning exceptions:
```
InsecureRequestWarning: Unverified HTTPS request is being made. Adding certificate veri…
-
Currently we just report that the fingerprint has changed or is invalid as per https://twitter.com/Th3PeKo/status/1030026983403663360. However, it'd be really useful in this scenario to be able to vie…
ara4n updated
6 years ago
-
## CVE-2023-4586 - High Severity Vulnerability
Vulnerable Library - infinispan-client-hotrod-9.4.8.Final.jar
Infinispan Hot Rod Client
Library home page: http://www.infinispan.org/infinispan-client-…
-
## CVE-2020-0119 - Medium Severity Vulnerability
Vulnerable Library - Settingsandroid-10.0.0_r12
Library home page: https://android.googlesource.com/platform/packages/apps/Settings
Found in HEAD co…
-
Hello,
(I have searched the issues and wiki about this topic but found nothing, sorry if I missed something.)
I understand the server authentication using a certificate and private key, and chec…
-
### Finding Description
The application was found to be using a vulnerable version of the OkHttp library.
This indicates that an attacker could bypass certificate pinning by sending a certificate cha…
-
### Finding Description
The application was found to be using a vulnerable version of the OkHttp library.
This indicates that an attacker could bypass certificate pinning by sending a certificate cha…