A Security Guide for Kotlin DevelopersKotlin developers and other key decision makers in software security and software supply chain vulnerabilities with information regarding the top security risks they can expect to face — from inherent weaknesses Like many modern coding languages, Kotlin strives to continuously update its list of known vulnerabilities, releasing applicable patches as soon as possible. Of course, the team behind Kotlin recommends release. 2. Always use the latest versions of Kotlin’s dependencies, keeping a close eye on new vulnerabilities for the dependencies you use. 3. Always proactively provide feedback and report on security0 码力 | 13 页 | 1.80 MB | 1 年前3
Security Beyond Memory SafetyUsing Modern C++ to Avoid Vulnerabilities by DesignMax Hoffmann Security Beyond Memory Safety CppCon 2024 2 Security Beyond Memory Safety Using Modern C++ to Avoid Vulnerabilities by DesignMax Hoffmann Security Beyond Memory Safety CppCon 2024 11 Security Beyond Memory Safety Using Modern C++ to Avoid Vulnerabilities by DesignMax Hoffmann Security Beyond Memory Safety CppCon 2024 12 https://www.wired.com/20 Security Beyond Memory Safety Using Modern C++ to Avoid Vulnerabilities by DesignMax Hoffmann Security Beyond Memory Safety CppCon 2024 16 Vulnerabilities BugsMax Hoffmann Security Beyond Memory Safety CppCon0 码力 | 79 页 | 4.15 MB | 6 月前3
10 Problems Large Companies Have with Managing C++ Dependencies and How to Solve Themwith a package manager 5. Cache build assets internally 6. Monitor, prevent, and respond to vulnerabilities 7. Centralize common tasks 8. Produce SBOMs 9. Global, reproducible builds 10. Break large issues; need to minimize legal risk (covered later in this talk) • Fears of potential security vulnerabilities (covered later in this talk)Problem 4: Building open-source dependencies is hard Solution 4: environmentsCataclysm: Dark Days Ahead Asset cachingProblem 6: Security vulnerabilities in open-source code •Introduction of security vulnerabilities is a risk of consuming open-source • OpenSSL Heartbleed (2014)0 码力 | 46 页 | 917.72 KB | 6 月前3
Hyperledger Fabric 1.1 Documentation(unused code, static security scanning, spelling, linting and more). 11.2 Known Vulnerabilities none 11.3 Resolved Vulnerabilities https://jira.hyperledger.org/browse/FAB-10537 https://jira.hyperledger.org/browse/FAB-10577 Updated to Go version 1.9.2. Updated baseimage version to 0.4.6. 11.6 Known Vulnerabilities none 11.7 Resolved Vulnerabilities https://jira.hyperledger.org/browse/FAB-4824 https://jira.hyperledger.org/browse/FAB-5406 linting and more). 11.10 Known Vulnerabilities none 264 Chapter 11. Release Notes hyperledger-fabricdocs Documentation, Release master 11.11 Resolved Vulnerabilities none 11.12 Known Issues & Workarounds0 码力 | 277 页 | 3.21 MB | 1 年前3
Hyperledger Fabric 1.1 Documentation(unused code, static security scanning, spelling, linting and more). Known Vulnerabilities none Resolved Vulnerabilities https://jira.hyperledger.org/browse/FAB-10537 https://jira.hyperledger.org/browse/FAB-10577 more). Updated to Go version 1.9.2. Updated baseimage version to 0.4.6. Known Vulnerabilities none Resolved Vulnerabilities https://jira.hyperledger.org/browse/FAB-4824 https://jira.hyperledger.org/browse/FAB-5406 (unused code, static security scanning, spelling, linting and more). Known Vulnerabilities none Resolved Vulnerabilities none Known Issues & Workarounds The fabric-ccenv image which is used to build0 码力 | 422 页 | 4.84 MB | 1 年前3
Embracing an Adversarial Mindset for Cpp SecurityHow: •Client-Server interfaces Medium Effort Med-High Effort High Effort Low EffortTrends in Vulnerabilities A Microsoft based perspectiveFactors Influencing Trends Increased Security Awareness and Practices Windows Vulnerabilities: 1. Remote Code Execution (RCE): Up to $250,000 2. Elevation of Privilege (EoP): Up to $100,000 3. Azure Vulnerabilities: Up to $60,000 to $250,000 4. Hyper-V Vulnerabilities: Up mitigate vulnerabilities by thinking like an attacker Leverage Modern C++ Features and Security Tools Use the GSL Library Fuzzing is a powerful tool to help uncover memory-based vulnerabilities and should0 码力 | 92 页 | 3.67 MB | 6 月前3
Rustle: the first static analyzer for smart contracts in Rustplatforms/OSs Design Capability • Being able to locate 30 different types of vulnerabilities • Being able to find real world vulnerabilities Rich Detectors • Each detector can locate one specific type of security and etc. Usability Results in different formats Extend Rustle to support locating new vulnerabilities • Write an LLVM pass as detector plugin • Add compiling option in Makefile • Specify severity has been integrated into our workflow • Rustle supports checking various types of security vulnerabilities and can identify them in the wild • Rustle is highly scalable and can be easily extended to0 码力 | 28 页 | 4.49 MB | 1 年前3
Just-in-Time Compilation - J F Bastien - CppCon 2020inputs. The Common Weakness Enumeration guide only contains one mention of compilation related vulnerabilities. This CWE entry concerns a compiler optimizing away a security check inserted by a developer inputs. The Common Weakness Enumeration guide only contains one mention of compilation related vulnerabilities. This CWE entry concerns a compiler optimizing away a security check inserted by a developer inputs. The Common Weakness Enumeration guide only contains one mention of compilation related vulnerabilities. This CWE entry concerns a compiler optimizing away a security check inserted by a developer0 码力 | 111 页 | 3.98 MB | 6 月前3
django cms 3.3.x Documentationall developers are encouraged to set this value to False to help prevent a range of security vulnerabilities stemming from HTML, Javascript, and CSS Code Injection. Warning render_model is only partially all developers are encouraged to set this value to False to help prevent a range of security vulnerabilities stemming from HTML, Javascript, and CSS Code Injection. New in version 3.0. render_model_icon all developers are encouraged to set this value to False to help prevent a range of security vulnerabilities stemming from HTML, Javascript, and CSS Code Injection. New in version 3.0. render_model_add0 码力 | 386 页 | 1.56 MB | 1 年前3
django cms 3.4.x Documentationescapes the content of the rendered model attribute. This helps prevent a range of security vulnerabilities stemming from HTML, JavaScript, and CSS Code Injection. To change this behavior, the project escapes the content of the rendered model attribute. This helps prevent a range of security vulnerabilities stemming from HTML, JavaScript, and CSS Code Injection. To change this behavior, the project escapes the content of the rendered model attribute. This helps prevent a range of security vulnerabilities stemming from HTML, JavaScript, and CSS Code Injection. To change this behavior, the project0 码力 | 395 页 | 1.64 MB | 1 年前3
共 287 条
- 1
- 2
- 3
- 4
- 5
- 6
- 29













