«
Expand/Collapse
59 items tagged "report"
Related tags:
vulnerability [+],
snort [+],
malware [+],
report library [+],
datadynamics [+],
web [+],
visual studio 2005 service pack 1 [+],
viewer [+],
oracle [+],
microsoft visual studio [+],
microsoft report [+],
microsoft [+],
library versions [+],
inclusion [+],
grapecity [+],
file [+],
web applications [+],
warns [+],
vulnerability report [+],
traidnt [+],
tls [+],
tier ii [+],
technical [+],
static analysis [+],
ssl [+],
sql injection [+],
security labs [+],
report details [+],
part [+],
oracle java [+],
networked equipment [+],
netscape [+],
mobile adapters [+],
kindsight [+],
home networks [+],
hacks [+],
google [+],
finds [+],
day [+],
compatibility report [+],
cipher [+],
china [+],
android [+],
zte [+],
year [+],
x force [+],
wsn links [+],
wsn [+],
world [+],
weborf [+],
webapps [+],
web access [+],
weapons of mass destruction [+],
vulnerabilities [+],
vector [+],
unwanted messages [+],
united states [+],
udot utah [+],
u.s. [+],
trojan [+],
tide [+],
threat [+],
state [+],
sql [+],
spanish ministries [+],
spanish [+],
spanair [+],
sophos [+],
social networking sites [+],
smbs [+],
smart [+],
silicon valley [+],
server [+],
security risks [+],
security report [+],
security problems [+],
security [+],
secure [+],
san mateo california [+],
san jose [+],
san [+],
sabrina merlo [+],
robogames [+],
rising tide [+],
resellers [+],
reams [+],
private data [+],
power grid [+],
popular [+],
people [+],
penetrated [+],
patched [+],
parliamentary report [+],
parliamentary [+],
parallax inc [+],
oracle report server [+],
nsa [+],
news [+],
new [+],
nasdaq [+],
ministries [+],
midwestern sky [+],
merlo [+],
mcenery convention center [+],
mateo [+],
losses [+],
links [+],
library [+],
kent web [+],
kent [+],
intelligence report [+],
intelligence [+],
initiating [+],
infected [+],
ibm [+],
hong kong [+],
hitb [+],
hit [+],
heady aroma [+],
half [+],
hackers [+],
hacker attacks [+],
hacker [+],
global stability [+],
german police [+],
german [+],
fireball [+],
fifth [+],
fbi reports [+],
fbi [+],
factor [+],
faces [+],
esc [+],
enterprise vulnerability [+],
enterprise [+],
effort [+],
drones [+],
details [+],
davos [+],
data security [+],
data breaches [+],
cyber thief [+],
cyber attack [+],
cyber [+],
ctf [+],
csrf [+],
crime [+],
credit report [+],
credit [+],
crash [+],
congress report [+],
congress [+],
complacency [+],
china world [+],
captchas [+],
california [+],
back [+],
awcm [+],
aroma [+],
apps [+],
alibaba [+],
admins [+],
access report [+],
access [+]
-
-
16:00
»
SecuriTeam
Kent Web Access Report is prone to an unspecified cross-site scripting vulnerability because it fails to sanitize user-supplied input.
-
-
12:13
»
Packet Storm Security Recent Files
The Kindsight Security Labs Q3 2012 Malware Report examines general trends for malware infections in home networks or infections in mobile devices and computers connected through mobile adapters. The data in this report is aggregated across the networks where Kindsight solutions are deployed.
-
12:13
»
Packet Storm Security Misc. Files
The Kindsight Security Labs Q3 2012 Malware Report examines general trends for malware infections in home networks or infections in mobile devices and computers connected through mobile adapters. The data in this report is aggregated across the networks where Kindsight solutions are deployed.
-
-
7:01
»
Hack a Day
Last week we reported on the upcoming 2012 Robogames competition would be held in San Mateo, California. Nobody from the Hackaday staff could make it this year, but luckily [Sabrina Merlo] from the Make: blog was able to provide a full report of the spectacle of fire, sparks and pierced metal this year. For anyone [...]
-
-
15:54
»
Packet Storm Security Recent Files
This malware report is part 1 of 2. This report is an effort to track, categorize, contain, understand root cause and infection vector of said user account/s, networked equipment or computer/s. This report pertains to all incidents reported by TIER II help desk, TIER III engineers, customer complaints or random IT Security audit/finding/pen test.
-
15:54
»
Packet Storm Security Misc. Files
This malware report is part 1 of 2. This report is an effort to track, categorize, contain, understand root cause and infection vector of said user account/s, networked equipment or computer/s. This report pertains to all incidents reported by TIER II help desk, TIER III engineers, customer complaints or random IT Security audit/finding/pen test.
-
-
11:09
»
Carnal0wnage
I am now working on pentest in a government unit in Hong Kong, they simply expose numerous sexy confidential reports in their Oracle Report Server:
I would like to highlight two interesting points:
1. Execute servlet commands
http://reports.somethingoracle.com/reports/rwservlet
2. Get some confidential reports from Google or target
inurl:reports/rwservlet
For example, you could know other project fund from government
https://app.somethingoracle.com/reports/rwservlet?epm+report=epm345_stip_report.rdf+p_stip_year=2009+p_incld_transit=YES+p_break_type=R+p_draft_rept=NO
Enjoy :)
- Darkfloyd
-
-
7:22
»
Packet Storm Security Recent Files
This report gives general recommendations as to how to configure SSL/TLS in order to provide state of the art authentication and encryption. The options offered by SSL engines grew from the early days since Netscape developed SSL2.0. The introduction of TLS made matters more challenging as servers and clients offer different sets of available options depending on which SSL engine (OpenSSL, NSS, SCHANNEL, etc.) they use. Finding the middle ground has proven difficult especially as the supported protocols and cipher suites are mostly not documented. To make matters more complicated Browsers may not use all functionality offered by the SSL stack, this report will only list functionality used by current Browsers. This report provides an overview of the currently available TLS options across Servers and Clients and allows you to offer support for a wide variety of Browsers an offer "good enough" security.
-
7:22
»
Packet Storm Security Misc. Files
This report gives general recommendations as to how to configure SSL/TLS in order to provide state of the art authentication and encryption. The options offered by SSL engines grew from the early days since Netscape developed SSL2.0. The introduction of TLS made matters more challenging as servers and clients offer different sets of available options depending on which SSL engine (OpenSSL, NSS, SCHANNEL, etc.) they use. Finding the middle ground has proven difficult especially as the supported protocols and cipher suites are mostly not documented. To make matters more complicated Browsers may not use all functionality offered by the SSL stack, this report will only list functionality used by current Browsers. This report provides an overview of the currently available TLS options across Servers and Clients and allows you to offer support for a wide variety of Browsers an offer "good enough" security.
-
-
15:47
»
Packet Storm Security Exploits
Microsoft Report Viewer controls suffer from a cross site scripting vulnerability. Microsoft Report Viewer Redistributable 2005 SP1 and Microsoft Visual Studio 2005 Service Pack 1 are affected.
-
15:47
»
Packet Storm Security Recent Files
Microsoft Report Viewer controls suffer from a cross site scripting vulnerability. Microsoft Report Viewer Redistributable 2005 SP1 and Microsoft Visual Studio 2005 Service Pack 1 are affected.
-
15:47
»
Packet Storm Security Misc. Files
Microsoft Report Viewer controls suffer from a cross site scripting vulnerability. Microsoft Report Viewer Redistributable 2005 SP1 and Microsoft Visual Studio 2005 Service Pack 1 are affected.
-
-
0:00
»
Sophos security news
The report highlights the latest risks and costs of potential data loss stemming from unprotected information on mobile devices and social media sites.
-
-
9:00
»
Hack a Day
Ah, the heady aroma of damp engineers! It’s raining in Silicon Valley, where the 2010 Embedded Systems Conference is getting off the ground at San Jose’s McEnery Convention Center. ESC is primarily an industry event. In the past there’s been some lighter fare such as Parallax, Inc. representing the hobbyist market and giant robot giraffes [...]
-
-
0:34
»
Sophos security news
Social networking sites and mobile phones used to spread unwanted messages, as United States retains top spot in Dirty Dozen spam-relaying countries