Aggregator
CVE-2009-0138 | Apple Mac OS X 10.5.6 improper authentication (Nessus ID 35684 / ID 116215)
CVE-2009-0018 | Apple Mac OS X 10.4.11 memory corruption (Nessus ID 35684 / ID 116215)
CVE-2009-0168 | Sun OpenSolaris up to Snv 85 denial of service (Nessus ID 35200 / ID 116141)
CVE-2007-1111 | ActiveCalendar data/y_2.php css cross site scripting (EDB-29646 / XFDB-32690)
Alleged Sale of 36 Million Records of US Citizens from Loan Data
CVE-2016-6914 | Ubiquiti UniFi Video 3.7.3 on Windows Directory Permission permission (EDB-43390 / BID-102278)
CVE-2002-1016 | Adobe Digital Editions 2.2 Restriction privileges management (VU#438867 / EDB-21629)
CVE-2009-0173 | IBM DB2 Universal Database up to 9.0 input validation (ID 19542 / XFDB-47934)
CVE-2009-0172 | IBM DB2 Universal Database up to 9.0 input validation (EDB-8344 / ID 19539)
CVE-2009-0174 | VUPlayer 2.49 HREF memory corruption (EDB-7709 / ID 116138)
CVE-2005-4556 | Merak Mail Server 5.5.1 accounts/inc/include.php file inclusion (Nessus ID 20346 / SBV-10100)
CVE-2004-2380 | Twilight Utilities Web Server 2.0.0.0 postfile.exe attfile path traversal (XFDB-15523 / ID 1009443)
CVE-2005-3847 | Linux Kernel up to 2.6.13 signal.c handle_stop_signal deadlock (Nessus ID 22559 / XFDB-24546)
CVE-2017-0519 | Google Android Qualcomm Fingerprint Sensor Driver access control (BID-96950 / ID 1037968)
AI Security Frameworks – Ensuring Trust in Machine Learning
As artificial intelligence transforms industries and enhances human capabilities, the need for strong AI security frameworks has become paramount. Recent developments in AI security standards aim to mitigate risks associated with machine learning systems while fostering innovation and building public trust. Organizations worldwide are now navigating a complex landscape of frameworks designed to ensure AI […]
The post AI Security Frameworks – Ensuring Trust in Machine Learning appeared first on Cyber Security News.
OAuth 2.0 Overview
Ever clicked a “Login with Google” button or granted a new photo app permission to access your Dropbox files? If so, you’ve already experienced OAuth 2.0 — even if you didn’t realize it at the time. Think of it like this: you wouldn’t hand the valet at a hotel your entire keychain with your house,...
The post OAuth 2.0 Overview appeared first on Security Boulevard.
Safepay
You must login to view this content
Safepay
You must login to view this content
Safepay
You must login to view this content