This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "DevSec Project Stream"

From OWASP
Jump to: navigation, search
(First set of data for testing)
Line 16: Line 16:
 
! Source
 
! Source
 
|-
 
|-
| Date
+
| 23.11.2015
| Icon
+
|  
| Sector
+
| Application Server
| Description
+
| RHSA-2015:2500-1: Critical: Red Hat JBoss Enterprise Application Platform 6.4 security update
| CVE
+
| CVE-2015-7501
| Source / Page
+
| [https://twitter.com/OWASP_Java/status/668818825173934080 ]
 
|-
 
|-
 
| 23.11.2015
 
| 23.11.2015
Line 28: Line 28:
 
| Attacker can act as a Man-in-the-Middle on ElasticSearch cloud-azure, in order to access data in session
 
| Attacker can act as a Man-in-the-Middle on ElasticSearch cloud-azure, in order to access data in session
 
|  
 
|  
| [https://twitter.com/OWASP_Java/status/668817035019870208 ]
+
| [https://twitter.com/OWASP_Java/status/668817035019870208 ]
 
|-
 
|-
 
| 23.11.2015
 
| 23.11.2015
Line 35: Line 35:
 
| Apache Commons statement to widespread Java object de-serialisation vulnerability
 
| Apache Commons statement to widespread Java object de-serialisation vulnerability
 
|  
 
|  
| [https://blogs.apache.org/foundation/entry/apache_commons_statement_to_widespread ]
+
| [https://blogs.apache.org/foundation/entry/apache_commons_statement_to_widespread ]
 
|}
 
|}
  

Revision as of 12:52, 27 November 2015

OWASP Project Header.jpg

Security Information Stream

Date Sector Description CVE Source
23.11.2015 Application Server RHSA-2015:2500-1: Critical: Red Hat JBoss Enterprise Application Platform 6.4 security update CVE-2015-7501 [1]
23.11.2015 Java Attacker can act as a Man-in-the-Middle on ElasticSearch cloud-azure, in order to access data in session [2]
23.11.2015 Java Apache Commons statement to widespread Java object de-serialisation vulnerability [3]


About


Related Resources

OWASP DevSec Twitter

OWASP Java Twitter


Project Team

Tasha CARL (Lead)




(none so far)




RSS Feeds

.

Mailing Lists

Getting Involved

.