-
Cyber Security Main Issue
-
- [ ] Foundational Security Pillars
- [x] #1004
- [ ] #1234
- [ ] #1235
- [ ] #1236
- [ ] #1237
- [ ] #1238
-
- [ ] #720
- [ ] #721
- [ ] #722
- [ ] #723
- …
-
We need to test the following on the 3 subscription types of GeoNode and report back on the findings.
**1. Functional Testing**
**Data Upload and Management:**
- Test uploading various geospatia…
-
### Finding Description
The app is vulnerable to the Janus exploit.
Janus ([CVE-2017-13156](https://nvd.nist.gov/vuln/detail/CVE-2017-13156)) exposes a critical flaw in Android's APK validation proc…
-
### Your current environment
```text
Collecting environment information...
WARNING 09-25 07:53:02 _custom_ops.py:18] Failed to import from vllm._C with ModuleNotFoundError("No module named 'vllm.…
-
### Your current environment
The output of `python collect_env.py`
```text
Collecting environment information...
PyTorch version: 2.5.1+cu124
Is debug build: False
CUDA used to build PyTorch…
-
Hello, a vulnerability was discovered through code audit. The platform did not authenticate the route, leaking all interface information. Anonymous non-logged-in users can access the route, and the op…
-
Page 47--combining 3 comments
"In general, the AVA methodology shall be sufficient for most TOE types. However, certain edge cases
may present themselves."
_Maybe add: " Additionally to the tests d…
-
# Question/Comment on TTS Bug Bounty RFQ
## Name and affiliation
Brett Kozisek
Director
Synack Inc.
## Section of RFQ documents
RFQ Section Section 7.0 Type of Contract - https://github.co…
-
# Integration release checklist
Sysdig is a comprehensive security platform that combines different security approaches to protect cloud infrastructure and cloud native applications.
We would li…
-
**Is your feature request related to a problem? Please describe**
I've been utilizing both DefectDojo and Rengine for vulnerability management and reconnaissance, respectively. While DefectDojo off…