This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "DevSec Project Stream"
From OWASP
(First set of data for testing) |
|||
Line 16: | Line 16: | ||
! Source | ! Source | ||
|- | |- | ||
− | | | + | | 23.11.2015 |
− | | | + | | |
− | | | + | | Application Server |
− | | | + | | RHSA-2015:2500-1: Critical: Red Hat JBoss Enterprise Application Platform 6.4 security update |
− | | CVE | + | | CVE-2015-7501 |
− | | | + | | [https://twitter.com/OWASP_Java/status/668818825173934080 ] |
|- | |- | ||
| 23.11.2015 | | 23.11.2015 | ||
Line 28: | Line 28: | ||
| Attacker can act as a Man-in-the-Middle on ElasticSearch cloud-azure, in order to access data in session | | Attacker can act as a Man-in-the-Middle on ElasticSearch cloud-azure, in order to access data in session | ||
| | | | ||
− | | [https://twitter.com/OWASP_Java/status/668817035019870208 | + | | [https://twitter.com/OWASP_Java/status/668817035019870208 ] |
|- | |- | ||
| 23.11.2015 | | 23.11.2015 | ||
Line 35: | Line 35: | ||
| Apache Commons statement to widespread Java object de-serialisation vulnerability | | Apache Commons statement to widespread Java object de-serialisation vulnerability | ||
| | | | ||
− | | [https://blogs.apache.org/foundation/entry/apache_commons_statement_to_widespread | + | | [https://blogs.apache.org/foundation/entry/apache_commons_statement_to_widespread ] |
|} | |} | ||
Revision as of 12:52, 27 November 2015
Security Information Stream
|
About
Related Resources
Project TeamTasha CARL (Lead) |
|
(none so far)
RSS Feeds
.
Mailing Lists
Getting Involved
.