-
**Description of the issue**
Looking at all the results that "Deserialization of user-controlled data" returns, from Alibaba `JSON.parseObject`, to Kryo, to XStream, to Java Deserialization, the re…
-
Meeting Agenda issue
```
## PM and UX Lead Agenda [Date]
### Prework
- [ ] Check for new questions https://github.com/hackforla/internship/issues/59
- [ ] Review the issue you are assigned t…
-
> In some of the instances that we checked, the Argo CD server was exposed and only required a username and a password for gaining access.
From: https://www.trendmicro.com/vinfo/us/security/news/vu…
-
[Trivy](https://trivy.dev) is a popular vulnerability and misconfiguration scanner.
ODS Pipeline supports vulnerability scanning via the Aqua scanner right now, which is a commercial offering. In c…
-
Hello developers of CoAPthon,
My name is Bruno, and I'm an MSc. student in Brazil within the Institute of Computing from the University of Campinas.
As part of my research on the application of fu…
-
The reports outlined the attached excel specification are designed to answer the question: ‘How much sampling error is there in my annual loss estimates?’ for any sample based loss model output.
[ORD…
-
|Module|Component|Install method|Platform|
|---|---|---|---|
| Syscollector | Agent | Packages | macOS |
In order to finalize the research issue #15570 and following his related [Spike](https://g…
-
1) `patches_detail[]` is now added as a separate field on the same level as `affected[]:`. It is incorrect, because we cannot make a mapping from an AFFECTED PROJECT (affected[]) to a patch where it w…
-
```yaml
id: 68
title: 'RVD#68: Improper Access Control on IRB140''s FlexPendant'
type: vulnerability
description: "Researchers found some issues in the compliance tool that comes with\
\ the Fl…
-
```yaml
{
"id": 6,
"title": "RVD#6: UR3, UR5, UR10 Stack-based buffer overflow",
"type": "vulnerability",
"description": " An stack-based buffer overflow in Universal Robots Modbus TCP…