-
## CVE-2012-5575 - Medium Severity Vulnerability
Vulnerable Library - cxf-rt-ws-security-2.7.18.SP5-redhat-1.jar
Apache CXF Runtime WS Security
Library home page: http://www.apache.org/
Path to depe…
-
NIST has a web application that lets you generate a thorium line list given a few parameters. the site can accessed at https://physics.nist.gov/cgi-bin/TH/site.cgi. pretty straightforward api for maki…
-
## CVE-2020-11609 - Medium Severity Vulnerability
Vulnerable Libraries - linuxlinux-4.19.313, linuxlinux-4.19.313
Vulnerability Details
An issue was discovered in the stv06xx subsystem i…
-
We're having trouble matching away false positives CVE's for this project given ninja is reasonably common name. Does this project even have an assigned CPE?
-
Did this wrapper includes or has a way around to generate from image a xyt file?
https://github.com/freedesktop/libfprint/blob/master/libfprint/fpi-img.c#L313
I want to compare a single fingerprin…
aqt01 updated
5 years ago
-
From: https://github.com/ietf-tools/relaton-data-misc/issues/8
[mapping.yaml.zip](https://github.com/ietf-tools/relaton-data-misc/files/9019925/mapping.yaml.zip)
I was able to map these entries,…
-
Hi,
We are developing a project in .net framework WPF application for windows. In that application we have implemented AppCenter to track analytics and diagnostics.
We use three packages for AppCent…
-
## CVE-2018-7489 - Critical Severity Vulnerability
Vulnerable Library - jackson-databind-2.8.8.jar
General data-binding functionality for Jackson: works on core streaming API
Library home page: http…
-
How many markers are used as minimum entry point of a DNA profile into your system?
Because we are using 24 makers but i understand some countries are still using 16 markers and certainly there diffe…
-
Hello jorainer,
First of all many thanks for this utterly great and comprehensible tutorial and of course all the wonderful work hidden in the `Spectra` package.
I would like to ask some questio…