instruction stringlengths 24 29.9k |
|---|
Following on to questions like Sandbox for attachment accessment and How do I safely inspect a suspicious email attachment?.
Why don't we sandbox email clients company-wide?
I must be missing something. Why don't companies insist on email clients being sandboxed and disconnected for the LAN? This would be a great way t... |
Our website(shopify website) has been getting a bot attack on our newsletter subscription form. Not sure if emails are real or not but there is some from gmail and hotmail etc or some from weird domains such as frettin.is or libero.it. Most emails have "+" sign random numbers. For example "examplebot+34343@weirddomain"... |
We all know that digital footprint is traceable and possibly left forever. When being hired by a new company whether as an employee or contractor, certain things like name, email, phone number, address, and SSN (for tax forms) will be gathered for sure by the company. With all that information and many background searc... |
After some research, I couldn't find a clear answer: in Azure Cloud Domain, some users received phishing emails to hidden mailbox addresses. How can that be? How can those mailbox addresses be known to someone outside the domain? Does anyone have a similar problem with Azure and phishing emails?
|
I have been checking Pairwise and Group Transient keys in a network for security. I understand
PTK is derived from = PMK, AP nonce (ANonce), STA nonce (SNonce), AP MAC address, and STA MAC address
This means that every client will have a different PTK since nonce will be different for each handshake. GTK same for every... |
(Disclaimer: Checked all the openssl related topics, no success).
OpenSSL version: OpenSSL 1.1.1s 1 Nov 2022
I'm trying to generate the chain of certificates, root -> intermediate -> user1,user2,user4 but OpenSSL complains in the verification step of the user certificate with root certificate.
My batch script, which g... |
In my laptop I've set up a bios password when I power on the laptop, and once I enter it the laptop starts my linux distro and decrypts the disk without asking any other password. To do this I've set up TPM to automatically decrypts the disk, if PCR are unaltered.
But now I'm playing with TPM's PCRs in order to be able... |
I'm curious about how desktop softwares' installation authentication/validation process work in general, and hopefully apply it to softwares I make. But to start with a specific example, consider Mathematica's off-Internet installation process, its official documentation mentions three key elements called MathID, activ... |
My main laptop recently broke down and i've been forced to use an older laptop I had in storage.
This machine was encrypted years ago with veracrypt and only has an SSD. It's around 250 GB of storage.
I've learned more about cryptography over the years, and using this machine right now, i'm faced with a few serious iss... |
I've been battling with one school task for a couple of days and can't seem to find any idea how to solve it. The task is pretty simple:
On the server there is a secret.txt file in the /root folder, which is
owned by root. The task is to read the contents of this file, which
contains the answer.
To solve the task, use... |
Is it possible? How? Should I encrypt my swap partition? If I don't encrypt it, basically I make encryption in the main partition useless.
|
I have a website with a URL of lets say "123.example.com" where I am hosting a large ERP system. Does hosting the application at "123.example.com/myapp" provide any layer of security from malicious web crawlers/bots etc?(I'm not concerned about search engines.)
I may be misunderstanding a fundamental directory traversa... |
Quoting the OWASP Cheat Sheet on CSRF Prevention:
Using the Synchronizer Token Pattern:
CSRF tokens should be:
Unique per user session.
Secret
Unpredictable (large random value generated by a secure method).
As far as I can tell App Check is all of these. As I understand it, their token generation uses a server sec... |
I want to make sure I understand the security implications of this scenario:
I am staying in a hotel.
I have a VPN on my android phone.
I connect to the hotel's unencrypted WiFi network with the phone.
I start a Wifi Hotspot on the phone. It has a secure password and WPA2 encryption.
I connect my laptop to the Wifi h... |
In a Unix-like system, the concept of privileged and non-privileged users is used for security, preventing numerous attacks. When a non-privileged user executes malicious code at a normal level, the kernel can reject its execution by recognizing the user's lack of privilege.
However, it appears to me that this security... |
For my project in uni I need to combine asymmetric and symmetric cryptosystems. I wanted to do thing with AES and RSA but it's a little difficult for me and I want something easier. So I thought that maybe I can go with these steps:
the message is encrypted with a symmetric algorithm (XORcipher)
the key of the symmetr... |
Regarding the TLS 1.3 Handshake Protocol:
When the Server sends it's certificate, exactly how does the Client validate this?
I know at a high level the Client is verifying the data the Server sent matches what the Certificate Authority contains but I'm trying to understand at a low-level.
I believe I read the Client ha... |
The company I work at sadly fell victim to BlackByte NT ransomware this week. It ransomed many of the Windows machines on our factory floor.
I have used my personal laptop (Windows 10 Home, version 22H2, OS build 19045.3693, Dell XPS 15) on the company's Wi-Fi once every few weeks for the past four years. I am afraid t... |
I need to protect sensitive data by doing data encryption at rest. Context : I have at least the data of 20 app to protect. I want protection from those with legitimate access to the virtual machine hosting the database (sysadmin) or the database (DBA, some end users) for 3 reasons : one of them could go rogue, some of... |
I am trying to replicate Shadow Credentials attack in Active Directory environment. My initial approach was to:
Use Whisker to create a new certificate on behalf of DC (successful):
Whisker.exe add /target:dc-2$
Use the newly created certificate with Rubeus and ask a new TGT:
Rubeus.exe asktgt /user:dc$ /certificate... |
So I'm using Active Campaign as a CRM and have configured DKIM, SPF, and a DMARC none policy. I am having one particular customer of mine that's not able to receive my emails despite them whitelisting me. They are using mimecast. I've done a ton of research at this point and feel I've exhausted the options for what I ... |
ZeroLogon checklist:
August 11, 2020 updates have been deployed on all domain controllers.
February 9, 2021 updates have been deployed on all domain controllers.
All devices are running Windows 10.
All devices are fully updated.
Domain member: Digitally encrypt or sign secure channel data (always) is set to Enabled.
... |
Can I setup and enforce additional WiFi connection (and password) requirements on managed laptops using Windows or MacOS?
Such as:
blocking (or entirely hiding) the option to connect to open networks
blocking (or entirely hiding) networks that use weak protocols such as WEP or WPA
only allowing connection to WPA2/WPA3... |
We want to develop some Azure functions which use PnPCore SDK. For testing purposes, I registered an Azure app which uses self-signed certificate for authentication.
Now I configured the Azure app registration to only access our SharePoint test site, so it is fine to use self-signed certificate for testing purposes. Bu... |
I'm curious what is best practice. I'm migrating a large export of an existing password manager data like lastpass, 1password, or dashlane into another password manager. Some of these services marked some of the passwords as compromised. It's hundreds and would take many hours to change passwords to these non-vital sit... |
I added a second signing subkey to my GPG key, which I then moved to a Yubikey:
/home/user/.gnupg/pubring.kbx
----------------------------
sec# ed25519/ABCDECAD 2023-11-12 [SC]
...(fingerprint omitted)...
uid [ultimate] Joost Molenaar <a@b.cd>
uid [ultimate] Joost Molenaar <b@c.de>
ssb ed25519/... |
I have a key pair which I used to generate a CSR.
Once I enrolled that CSR PKCS10, I get from the PKI (or CA) a certificate signed with the PKI private key.
From here, I would like to know if my private key is useful in any way in regards of the certificate that has been signed with the PKI private key?
As far as I und... |
We have recently developed a web application with a RESTful API backend. This web app need to have a certain security certification (something called PCI-DSS), and thus it is being scanned occasionally to identify potential vulnerabilities that must be fixed in order to be certified. These scans have found a few things... |
I have:
Installed Fail2ban
Created a local jail file.
Changed lines within /etc/fail2ban/jail.local where enabled is mentioned x2 to true.
Added enabled = true to the Asterisk section of the jail.local file.
Increased ban time to 1 day.
I'm running FreePBX on an Ubuntu VPS (they do not allow ISOs to be uploaded on my... |
I'm currently implementing a system which consists of a collection of apps. Similar to the way Microsoft 365 consists of Word, Excel, etc.
Ideally I'd like to log in once, then navigate between apps. However, each app requires different (JWT) claims to work. The system also needs to be able to federate with external... |
I have a server which have configured Amavis and Spamassasin (in default state only). I recently noticed log lines that probably indicate DNS query failure, below is an excerpt:
Nov 21 11:15:40 spamfilter-1 amavis[4029071]: (4029071-15) p001 1 Content-Type: text/plain, 7bit, size: 189, SHA1 digest: 8903fa98a76ec9fba2c5... |
Is there any tool out there that will monitor my system's use of root CAs? So far I have not found anything, and so I am hoping that this community will know if such a tool exists.
For background, I use Windows, which comes with its own certificate store, Chrome (uses the Windows certs), and Firefox (uses its own trus... |
I have been looking into business impact assessments and I am confused about the "Impact" part. I have been asked several times about what the impact would be when a system fails, and it appears that this is information that people want to see in a business impact assessment.
My problem is that without an actual scenar... |
Is it necessary to implement both Content-Security-Policy and X-Content-Type-Options for ensuring the security of a website?
|
I see lots of articles suggesting not storing passwords in the browser, and it made perfect sense to me, if I can access this data easily, an attacker probably can too.
But then I found out about cookie hijacking, and it seems to me that if your browser is compromised you are already susceptible to this attack that see... |
In my campus, we are provided with a LAN port to each room to access the internet. Also, they didn't allow students to use routers in their respective room. The only way one can access the internet is via LAN port or use your personal cellular network.
Recently I came across TP-Link Archer C20 router and saw it support... |
I have been using my personal Gmail Account for years to create accounts on a wide range of websites like evite.com and Instagram.
Google conducted a dark web scan and created a report of instances where my personally identifiable information (PII) was leaked on the dark web, and this report was very alarming.
My email... |
My organisation, say Acme, is building an e-signature platform where global businesses sign up and use the platform to send out e-signature requests. And when signers in a particular e-sign request sign the document, Acme must digitally sign the document too. Acme needs to do this for all the documents for all the cust... |
I have 3 hosts in the same network, let's say their IP addresses end with:
.10 (Host A)
.11 (Host B)
.12 (Host C)
I want to sniff packets between A and C through host B, so that host B acts as MITM.
I've enabled ip forwarding, so:
echo 1 > /proc/sys/net/ipv4/ip_forward
From host B with i perform: arpspoof -r -i eth0 ... |
With standard XSSI, an attacker can include a remote script which contains user-bound secrets across origins, and then read them out.
I have an endpoint which returns sensitive Javascript code, but the request to fetch it is POST-based (the endpoint doesn't accept GET requests).
Is this secure? I assume that it is, and... |
I have a PC with Ubuntu and Windows in dual boot. I use this PC for basic stuff: Windows for gaming, shopping and common browsing, Ubuntu to do something such as home banking.
I was thinking to create a virtual machine on Ubuntu with another OS that I will use to download stuff from IRC and Torrent and other risky stuf... |
I am new to client-side development and I have a naive question. Right now, I'm using Google APIs (the map ones). If I want my client-side application / webapp to display a map, I would include something like this in my index.html:
<script src="https://maps.googleapis.com/maps/api/js?key=MY_API_KEY"></script>
The API ... |
I am new to the concept of Content-Security-Policy (CSP) so please forgive my ignorance.
The site https://securityheaders.com parses headers and provides a score. For example unibet.com is awarded a favorable "A" grading while having this security header:
content-security-policy default-src 'unsafe-inline' 'unsafe-eva... |
The ID library Nano ID claims that modulo based encoding (e.g. Base64) would lead to uneven distribution in the output:
Uniformity. random % alphabet is a popular mistake to make when coding an ID generator. The distribution will not be even; there will be a lower chance for some symbols to appear compared to others. ... |
I recently came across a statement in the Firebase documentation that suggests "CSRF protection should be taken into account." This guidance appears in the context of using an ID token for authentication. My understanding is that when authenticating with an ID token, CSRF protection might not be necessary. However, the... |
I'm reading an article that talks about XSS exploitation on AngularJS,
AngularJS will render the template in ng-html, and it bypasses sanitize-html.
My questions,
I'm wondering if other frameworks like Vue.js and React is also vulnerable to this attack?
I tried to use {{ }} in React and it's not executed by dangerou... |
I am trying to untangle a number of concepts (all of which i am unfamiliar with) in this question, but they all point to a seemingly basic question;
With modern tunneling protocols, SSL ciphers and key exchange methods,
are VPNs (which implement them, correctly) more resistant to average*
MITM attacks compared to year... |
I have a subscription for a NSE scripts feed for nmap. There are some of those scripts which have the default category (among others)
I am running nmap in the following way
nmap --privileged -oX - -T3 -O --osscan-guess --max-os-tries=1 -sV -sS --script banner -PP -PE -PM -PI <ip_address>
However, what I am observing i... |
If one calls the Amazon customer services number, a robotic voice asks one to enter three numbers. Along the lines of “to be connected to a customer service associate, please press [XYZ]” (where [xyz] may be any the specified numbers).
What is the purpose of this, is it a captcha? That’s the only thing I can think of y... |
I had a .zip file that was apparently encrypted with AES-256 deflate.
7z l -slt archive.zip | grep Method
Method = AES-256 Deflate
Then I used zip2john to get a "hash" out of it:
archive.zip/archive/flag.pdf:$zip2$*0*3*0*5e6874b2503c8250b2a618543de2a650*bf56*28*cc4ffaa12a7b647a26a362049842f670145c797ed7e46aad1bede1fdd... |
My company requires me to access resources through a VPN connection -- specifically, an OpenVPN client configured to require a password plus an authenticator token. But the company also restricts access by IP; any new IP address needs to be whitelisted before the VPN connection will work (e.g., if I'm at a coffee shop ... |
On the Wikipedia page of threat (in textbooks too) various definitions are given where almost all agree in defining a threat as a "circumstance or event".
I'm having trouble understanding the subtle difference between event and circumstance. What is an example of an event that is not a circumstance? And what is an exam... |
Obviously any known vulnerabilities are not great, but I'm curious how much I should be concerned about them.
I've seen plenty of articles that talk about the rise in malware/spam in npm packages:
NPM malware attack goes unnoticed for a year
Malicious NPM packages are part of a malware “barrage” hitting repositories
W... |
I have noticed on most websites that all previous password reset links are automatically expired when a new one is requested.
Why is this so common and what are some possible consequences if this isn't done?
|
So, before this year, when you were using WebAuthN to create security keys on an up to date Android phone (Pixel 6 in my case), you had these options (iirc):
When creating a platform authenticator, you were offered Fingerprint/Passcode. When creating a roaming authenticator, you were asked to attach an USB or NFC Key. ... |
TL;DR
I'm trying to implement a fake user account that has multiple sets of credentials that can be used. Instead of a specific password, any one password from a list of them could be used to authenticate to the account. By doing so, we can cover breached, common, or easily guessed passwords, and make it more likely t... |
I've discovered a behavior in a popular service's markdown parser that allows the 'style' attribute to be used within 'img' tags through some crafted markdown code. This allows for the application of arbitrary CSS styles to the image, leading to various forms of visual manipulation on the rendered page.
Furthermore, by... |
In circom, Num2bits() from circomlib is primarily intended for converting an Integer into an array of bits.
But because of it’s optional parameter, it can be used to prevent overflows such as :
inp = Num2bits(120);
inp.in = (3);
would check that 3 is less than 120 Bits wide.
But can it be used for checking for integer... |
I've recently been experiencing a situation as follows:
How can I understand the IO of an unknown device?
Say, for example, I am gifted a bluetooth speaker. How can I understand its potential for transmission? If it claims to be just a bluetooth speaker, can I verify that it does not also record and transmit audio?
If ... |
If I have imported several keys (with different key ids that I can see when I gpg --list-keys) that all have the same email address, how do I set which one to encrypt to?
and ditto encrypt from/with, if I have created a few key IDs myself for my own email address.
I mean set it permamently, not just one time with --rec... |
My SaaS company recently lost the bid for an enterprise software licensing deal.
One of the reasons the prospect gave for not choosing us as a vendor was:
the use of a WAF
I'm not an information security specialist, so I'm confused as to why the use of a WAF (Web Application Firewall) could be seen as a potential sec... |
My company has a website with data stored in Microsoft SQL Server on the production server. The production server is not in Active Directory. The firewall allows connections to the production SQL server from the company offices.
I need to import data from this production server into Excel regularly. The data import sho... |
I recently started using the Brave browser for a little more privacy.
However, I still don't understand much about the risks surrounding SSO and cookies.
As an example, I am logged in to YouTube.com with my Google account. As an example, if I navigate to google.com, I am also logged in there.
Specifically, I ask myself... |
My professor gave me this task and said "Easy" about it!
I don't know how serious is he!
The task :
I have a directory for example
www.example.com/items
The "items" directory contents :
AGDVGCVFVVCVGDD.txt
Dgcbvvhvbhvbbbb.txt
And the main .htaccess has "Options -Indexes"
All I know is that the directory url is www.exam... |
I'm from a digital forensics background and it has been a while since I studied networking and so am a little rusty on a few aspects. I am looking to implement a remote forensics solution within an organisation and the vendor in question has specified that there will be two servers that will require connectivity to any... |
Assume that I have a server storing sensitive user information (think medical records). I want this data to be encrypted on my server at almost all times. Only when a doctor needs to access the data of a particular person, it should be decrypted, processed and encrypted again.
I want to give the user as much control ov... |
My fritz!box 5530 has been hacked.
I know this because the upload is always very low under 10 mb/s also if my fiber connection would to be 1gb/s|300mb/s.
And when you try router reset to factory settings it simply restart without user/password but with the same rules/settings inside.
Discovering deeply the backup file ... |
Regarding 2FA browser plugins, I follow the uneducated opinion that they usually provide sufficient security. Since a desktop computer is a unique device (even a virtual machine) and provides that required 2nd factor, you can use a 2FA browser plugin just as well (instead of a smartphone app).
You bind yourself to one ... |
To help improve the user experience on admin workstations, would it be ok to disable the UAC or maybe set it with a more permissive mode?
|
I'm using a GlobalSign EST Go library that provides an implementation of the RFC 7030 (EST).
So far doesn't provide any function to generate a CSR at runtime and therefore include the TLS-unique value in the CSR before enrolment.
I might use the crypto package for that along with a little code tweaking.
However there i... |
I need to create a certificate with:
subject.attribute1: 2.5.4.3 {Common Name} UTF8String
subject.attribute2: 2.5.4.92 {tagAFI} OCTET STRING
subject.attribute3: 0.9.2342.1920.0300.100.1.1 {userId} UTF8String
Anyone any idea on how to do this? OpenSSL doesn't allow me
|
I'm experimenting with adding passkeys to Drupal.
I'm using webauthn-lib 4.7.
When registering a passkey, the device generates a Public Key Credential, which is then sent to the server as stringified JSON:
{
"publicKeyCredentialId": "example",
"type": "public-key",
"transports": [
"internal",
"hybrid"
]... |
I've watched a lot of videos on Shor's Algorithm and Quantum Computers. Most of these videos say these two things undermine RSA via fast-factoring, but they never really explain how fast-factoring is used to these break things; just very hand-wavy statements.
Basically:
I get that with fast factoring, you could(?) rec... |
I am building an application that a user can receive an access to by an internal worker. This works using a magic link, where the user will receive a one time link to authenticate in the app. Now I want the application to be secured with 2FA, so I decided that the link should also include a totp secret code in the form... |
I am trying to understand how GitHub Advisory filters vulnerabilities, particularly in the context of Bootstrap 3.3.7. In the National Vulnerability Database (NVD), the following vulnerabilities are reported for Bootstrap 3.3.7:
CVE-2019-8331 CVE-2018-20677 CVE-2018-20676 CVE-2016-10735 CVE-2018-14042 CVE-2018-14040
Ho... |
I need to download certain files from Telegram. It is mostly images and videos. I am aware that even this kind of files can contain malicious code, so I want to be 100% safe. (The files usually surpass 20 MB, so it is not scannable through DrWebBot on Telegram.)
Is the following way of downloading files safe?
Open Tel... |
I am trying to learn more about cryptography and am stumped, i dont know what direction to move to even research an answer myself so would appreciate any input.
I have a vpn set up to an adapter, tun0, when i connect to my vpn and initiate a plaintext SMTP connection to a server, I can see the plaintext in wireshark fr... |
I came across a strange group policy setup once and was wondering if anyone can make sense of it. We were NOT allowed to run executables that were stored on the local disk or network drives, but we could run executables that were on a USB mass storage device or optical media.
Essentially if you brought a USB stick with... |
When I am using ProtonVPN, does the VPN server run DNS resolution upon receiving the request, similar to a Tor exit node, thereby bypassing the device's DNS cache?
Or do my browser's DNS queries still write to the device DNS cache? And if they are written locally, is there a way to prevent this on different operating s... |
I'd like to use YubiKey Bio for SSH-logins. I'm wondering how often I have to show my fingerprint for authentication when I start new sessions. What's the interval? If I start a new session every 5 minutes, do I need to use the key each time?
|
I'm working on a web application where a user gains access by clicking on a magic link sent to them by an internal co-worker. Upon clicking this link, the user is automatically authenticated and a session cookie is established to maintain their authenticated state.
Here's the flow I'm considering:
1.An internal co-wor... |
A related discussion can be found, specifically addressing the security implications of using only TOTP for single-factor authentication However, in my view, using a TOTP code from a Google Authenticator on a mobile device effectively constitutes two-factor authentication. Provided that every user secures their phone w... |
Let's say my significant other and I go to the bank to open our accounts and our account numbers end up 14682-4 and 14683-5. They are clearly sequential. Can this detail be used in any sort of attack?
|
Can you retrieve personal information ie; messages from browsers, off of a SIM card?
|
On Facebook, malware is currently trying to spread itself using the domain googlediver (dot) com, one sample of a malicious url is https://googlediver (dot) com/list-of-traveling-staff , and I believe that domain is used exclusively to spread malware.
Is there anything I can do to combat it? On ICANN lookup, I see
Regi... |
I have a textbook that contains the following problem:
In practice, one master key, KM, is exchanged in a secure way (e.g. Diffie-Hellman key exchange) between the involved parties. Afterwards, session keys, kx, are regularly updated by using key derivation. Consider the following three different methods of key deriva... |
I have a few questions about CrypTool.
How can you use the text analysis tools available in CrypTool to determine the encryption algorithm for a given ciphertext?
How can you use CrypTool's text analysis tools to determine the password used for encryption?
Thank you in advance for your help.
The menu of CrypTool:
|
Can a non-sanitized user input result in a vulnerability if passed to System.out.printf (Or any equivalent function that takes a format)?
Example:
public class Demo {
public static void main(String[] args) {
String userInput = "%n";
System.out.printf(userInput);
}
}
If this was C for example, t... |
I have to store a document (e.g. a JSON file) on a remote PC (that my App is running on) alongside a signature to be able to verify that this file was signed by me. I have no access to this PC nor does this PC have access to the internet. The user using the remote PC has root access.
I was thinking about storing this p... |
Several google products (mainly Gmail) masks links using a fake-dns mobile-webview.gmail.com
That domain doesn't resolve anywhere, not even Google's own NS https://dnschecker.org/#A/mobile-webview.gmail.com
Most apps mask it in a half-broken way. Users can still long press and copy the masked, useless link, or they can... |
I have a invite users via email form on my website and I was wondering if this could be a potential XSS flaw?
I captured the request via Burp, and this is how it looks:
Input:
{
"toEnvWithEmail":"<script>alert(1)</script>",
"inviteEmails":["dsadasdas@gmail.com"]
}
Output:
{
"message":"400 BAD_REQUEST \"no user with em... |
I'm working on authentication on the backend of an application and I want to know which of the following methods is the best.
After the user registers in the application an email is sent to the registered email with an OTP code to confirm the email address. Then the user has to input the OTP code followed by the passwo... |
If I commit the name of SQLite database in the JDBC SQLite URI in the source code like below, is it possible for an attacker to exploit the URI?
Should I replace the name of the SQLite db with code to retrieve it from environmental variables?
// create a database connection
connection = DriverManager.getConnection("jdb... |
I have an ASUS computer that I use strictly for booting Tails OS from a USB. A few weeks ago I went into the BIOS and noticed that secure boot was disabled.
This computer has secure boot enabled by default. The chances of me having done this are slim to none, so I must go with the other option that the computer was tam... |
I'm doing some research into email servers and how they work.
There is a function in Outlook 365 where an admin can perform several traces on emails for the past 90 days. For example, an 'enhanced report', etc.
I am wondering if, for example, an email was sent with information the admin wanted to dispose of, could some... |
I'm currently studying forensics, and one thing that keeps coming up is the authorities breaking into phones.
There are several third party tools they can use, but one of the most popular is 'Cellebrite'.
My understanding of this device was that they could NOT access an encrypted, password protected phone BFU (before f... |
I am working on a CTF called Internal. I know there are walkthroughs available but I am trying not to look at them for the time being and try and work through things myself. The admin page that is the apparent target is http://10.10.240.106/phpmyadmin/
I came across a link which seems ripe for some SSRF the URL being:
... |
I'm trying to figure out what else I should (not) do to reduce the possibility of my web app getting hacked. And like most development efforts, while it would be great to have a security expert on the team, we don't have it.
My app is written in Blazor server side using Entity Framework. It uses the ASP.NET Core Identi... |
I stumbled across a vulnerability considered a critical security risk (CVE-2023-25139) in one of container images I build.
Debian's security tracker states it's fixed: https://security-tracker.debian.org/tracker/CVE-2023-25139 - specifically, in Debian Sid with glibc 2.37-12, while BlackDuck says it's still there. I kn... |
I gave a friend my earpiece and her phone had audio issues prior to that, I took it back and connected it to my phone and ever since I did, my audio stopped working. Now if I try to do anything that has audio my phone lags. I use an iPhone X, she uses a 7+
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.