A vulnerability which is known to the designers, implementers, or operators of the system, but has not been corrected.
4
votes
1answer
61 views
Switching to new encryption method (without losing data?)
Let's say you have a website that provides a service of some kind. Users can log in, they can store some kind of data, and there's various types of encryption in place to keep it all safe. Passwords ...
-6
votes
0answers
38 views
definitive resources about ISPs' networks [closed]
I've searched round the net. but didn't find any effectiveness!
My question is, what are some good resources like books, docs and other related stuff in order to gain some knowledge about what the ...
6
votes
2answers
241 views
SQL Injection: Drop All Tables
I used some vulnerability scanners to check a site of mine, and an instance of blind SQL injection was returned. However, when I try to exploit this vulnerability by entering the following into the ...
-2
votes
1answer
73 views
Why isn't AV software configured to recognize installed program vulnerabilities?
Background (not necessary to read):
I've used a few different major AV programs day-to-day over the years, and not one has ever informed me I was running code with known vulnerabilities.
Not only ...
0
votes
1answer
66 views
XSS MySQL Database Accessible?
I'd like to know if there is any danger of someone being able to access the database via XSS vulnerabilities on this page.
I have the following link. When you go to this link, the text I've enclosed ...
32
votes
5answers
1k views
Why is application crash considered insecure?
If an application crashes, the program stops and there is nothing anyone can do about it, other than starting the program again.
Crash is a bad behaviour in general and should be avoided, but why are ...
5
votes
2answers
166 views
Software security V.S Hardware security
In theory, perfect software applications are possible but in real life, they don't exist. When attackers know the software, they can send payloads to exploit vulnerabilities and run any arbitrary code ...
1
vote
1answer
49 views
Recognizing malicious URL attempts against your website
On serveral websites I've run, I periodically see URLs run against my servers that look like this:
/url_result?ctw_=sT,een_j...tdmlydXMtc2NhbS1lb........
Does anyone recognize it? I've tried to ...
0
votes
4answers
128 views
Is there a need to define “language safety”?
Language safety is not clearly defined while there're warnings about for instance Java. So how can you say that language is not safe while language safety is not clearly defined? If Java is unsafe ...
3
votes
2answers
251 views
ASP.NET vulnerability CVE-2008-5100 (assembly signing bypass): is there a fix?
The short version of this question is: Is there a fix or mitigation for
the ASP.NET vulnerability
CVE-2008-5100, which allows attackers to bypass assembly digital signature checking?
I'll ...
3
votes
4answers
189 views
FireFox's restore previous session restores logins authenticated by server's sessions
In a website I'm building when I login, close FireFox, open FireFox and try to go to the website again I must login again (as expected) BUT if I select "Restore Previous Session" I am logged in again. ...
4
votes
2answers
234 views
Evernote hacked - precautions?
On March 2, 2013, the digital note taking system Evernote was hacked. Evernote has forced new passwords and have released new updates to Windows, Windows phone and iOS of their client software.
...
0
votes
4answers
72 views
Dynamic tools to detect vulnerabilities in software applications written in c?
I am doing a project on detecting vulnerabilities in Windows 7/8 for software applications. Some of which some have source code available and some do not.
Please suggest some technique that can help ...
18
votes
6answers
832 views
Why are vulnerabilities and lack of security possible in computers?
I have heard about computer vulnerabilities, virus, malware, etc.
Why are these threats possible?
Why doesn't the computer just do the things it is supposed to?
Why do some people write malware, ...
0
votes
1answer
884 views
my site with joomla 1.5.14 got defaced and I'd like to know how he did it and stop it
I am supposed to manage the content of a site and it got defaced.
The site is hosted on a Linux server running Apache.
Apache version: 2.2.13
Linux version is Debian 4.0(I think I don't really have ...
7
votes
2answers
385 views
How should one prepare himself for a job interview for penetration testing?
So, the title basically says it all. I would really like to hear out some of the more experienced friends here with their answers for this.
Should it revolve around the ability to verbally explain ...
1
vote
2answers
228 views
Is SSH2 still vulnerable to man-in-middle attacks?
With SSH using RSA public key authentication, can an attacker spoof the server IP address and connect with client to obtain client password?
1
vote
2answers
1k views
How does Java 7 update 11 fix the security vulnerability?
There is a new Java released a couple days ago to resolve a hole that was recently discovered.
(Oracle, US-CERT, NVD/NIST)
In my initial reading about this update 11, I saw clearly where it by ...
21
votes
3answers
2k views
Should I be disabling Java?
First it was Apple, now it's the US government...
U.S. urges users to disable Java; Apple disables some remotely
New malware exploiting Java 7 in Windows and Unix systems
How serious is this ...
4
votes
3answers
133 views
Risk Control - Ignored risks and accepted risks
Some say that ignored risks as part of an organization's behavior are much worse than accepted risks.
I would like to test that axiom (in the eyes of some).
When I am handling a risk and I choose to ...
3
votes
2answers
247 views
Security of NoSQL databases
Hopefully this isn't too broad.
I've got little experience with NoSQL databases, but I know that they are rising in popularity. As a developer that is extremely concerned with security, I'm ...
2
votes
2answers
126 views
Access via http to other protocols and ports!
Our firewall only allows HTTP port 80 but we have detected that a user accesses some other protocols and ports that we deny in our firewall.
We know that he has developed an application (Console ...
5
votes
3answers
132 views
Disclosure in potential loss-of-life situations, with an uncooperative vendor
I recently discovered a publicly accessible web interface to a highly sensitive bit of lab equipment, the malfunction of which would result in potential loss of life or serious health concerns to a ...
8
votes
2answers
235 views
Vulnerabilities of Secure Shells
I ssh into my school's engineering computer to submit large programmin projects on a regular basis. Are there any vulnerabilities or worries about using this channel so frequently? What makes a secure ...
3
votes
1answer
107 views
How are CVE identifiers assigned and managed?
CVE Identifiers (a.k.a. CVE IDs) are used to uniquely identifier a particular vulnerability. We've all seen them on various bulletins, and they're useful when researching an issue. But how are they ...
-1
votes
2answers
162 views
How to increase Windows PowerShell WebAccess security?
What are some recommended techniques to improve the security of powershell?
Google returns many articles about powershell security like these:
PowerShell’s Security Guiding Principles TechNet Edge ...
0
votes
0answers
30 views
Source(s) for getting listed vulnerabilities? [closed]
As I know cve.mitre.org, is one major source from which we can get to know all the listed vulnerabilities (new and old).
Are there any other such sites or databases available?
Also, if I want ...
0
votes
0answers
98 views
Examples of vulnerabilities being changed in only one (of many) places [closed]
I'm looking into source code analysis and was wondering if folks know of examples, in open source projects, of vulnerabilities where there were multiple "very similar" vulnerabilities in the same ...
0
votes
2answers
74 views
OpenLDAP version 2.4.24 at risk? Site to check for known vulnerabilities with version used?
We use OpenLDAP version 2.4.24
$ /usr/local/libexec/slapd -VV
@(#) $OpenLDAP: slapd 2.4.24 (Mar 5 2011 06:36:43) $
steve@sunblade2500:/bigdisk/SOURCES/S10/openldap-2.4.24/servers/slapd
...
3
votes
2answers
239 views
Not clear on ssl renegotiation vulnerabilty
When we read about TLS Renegotiation vulnerability, does it mean that a server is not supposed to ever accept renegotiation during a secure connection?
I thought that by renegotiation security is ...