-
## *What* affects the bug ?
Windows Defender Security App.
## *When* does this occur?
When using windows
## *In which* version of Windows does this issue happen ? Write version complete.
Wind…
-
As of #32 , we have a Common Module invocation path that utilizes a JS VM running inside of a Wasm VM to interpret JS on-demand. There will be several mitigations required to reduce the chance of user…
cdata updated
1 month ago
-
Hello !
Thank's for the great tool !
When I tested the tool, I saw that the kubehound attacks (TTPs) were not linked directly in the Janus Graph database.
I suggest adding TTPs directly to the E…
-
I have a few questions regarding the cryptographic key security in the Bifold wallet:
1. How does the Bifold wallet maintain the security of cryptographic keys?
2. Is it possible to retrieve cryp…
-
https://github.com/relaxnow/veracode-container-security-display/blob/5e7d71ccafbd068f35da290d47aaabc43c7d7c45/js/mitigations.js#L30-L40
**Filename:** js/mitigations.js
**Line:** 35
**CWE:** 117 (Im…
-
Our current deployment appears to be bistable: once CPU requirements go above a certain level which is surprisingly low, maybe 30-40%, the cluster enters a locked state where CPU usage goes to 100% an…
-
Non-ASCII domain names are, on a technical level, vulnerable to homograph attacks that enable impersonation. In the DNS world, this risk is mitigated by DNS registry policies that disallow registerin…
-
In the context of this incident: https://groups.google.com/d/msg/mozilla.dev.security.policy/2teeVLJ44RM/gUSiVaxuAwAJ
Discussed requiring domain validation from multiple network perspectives: https:/…
-
Current charter template says:
[[
Each specification should contain sections detailing all known security and privacy implications for implementers, Web authors, and end users.
]]
It is importan…
-
When using pytm to find threats I found most threats do not apply which would require me to re-write conditions to detect applicable components. Instead to address this I added a new condition to the …