-
### Description
### Steps to reproduce
Container Registry vulnerabilities showing in Microsoft Defender Recommendations.
After building the docker image from latest
docker pull mcr.microsoft.…
-
I created a simple C# console application based on this article:
**_[Attacking Evil Regex: Understanding Regular Expression Denial of Service Attacks (ReDoS)](https://sec.okta.com/articles/2020/04/a…
-
### Current Behavior
Hello, we are using Dependency Track 4.5.0, and we are facing an odd behavior.
In one project, we find that the dependency lucenequeryparser 4.7.2 contains 1 vulnerability.
and…
-
```
```
The whole `feature` section is empty. The json report is correct
-
**Well, sir , sorry to bother you again, but maybe I got a bug here.**
When I use the demo file:
`https://github.com/golismero/openvas_lib/blob/master/example_check_connection.py`
I can't get my sca…
-
### Describe the bug, including details regarding any error messages, version, and platform.
We currently use version 11.0.0 of pyarrow. We run Snyk checks to find vulnerabilities in our third party …
-
Hi,
We would like to discuss two potential vulnerabilities due to incomplete privilege inheritance in ROS2 and ROS1. We believe these vulnerabilities can become a security threat in ROS projects invo…
-
Seeing correlations between tags would be a really nice way to find trends. For example, knowing that vulnerabilities tagged with "bounty" are also likely to be "escaped test", or that "too many cooks…
-
### Search before asking
- [X] I searched in the [issues](https://github.com/apache/pulsar/issues) and found nothing similar.
### Motivation
Since https://github.com/apache/pulsar/pull/1085…
hpvd updated
10 months ago
-
The reason for l.facebook.com preceding all links is two fold:
* it's a security issue!
* Used for analytics and tracking (esp. to disable malicious links).
Both of these is core to security of u…