Search results

Jump to navigation Jump to search
Results 1 – 21 of 123
Advanced search

Search in namespaces:

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ...misleading |url=https://www.csoonline.com/article/2226625/biased-software-vulnerability-stats-praising-microsoft-were-101--misleading.html |accessdate=20 May 2020} ...ompensation.<ref>{{Cite web|title=McAfee accused of McSlurping Open Source Vulnerability Database|url=https://www.theregister.com/2014/05/08/whats_copyright_mcafee_ ...
    6 KB (870 words) - 12:22, 6 June 2025
  • {{short description|Security protecting databases against compromising}} ...title=What is database security?| url=https://www.ibm.com/topics/database-security| publisher=[[IBM]]| access-date=21 January 2024}}</ref> It involves various ...
    14 KB (1,991 words) - 18:48, 17 June 2025
  • {{Short description|Catalog of information security problems}} ...by the National Cyber Security Division of the U.S. Department of Homeland Security.}}</ref> The system was officially launched for the public in September 199 ...
    17 KB (2,605 words) - 02:45, 23 June 2025
  • ...method or piece of code that takes advantage of [[Vulnerability (computer security)|vulnerabilities]] in [[software]], [[Application software|applications]], Exploits are designed to identify flaws, bypass security measures, gain unauthorized access to systems, take control of systems, ins ...
    18 KB (2,506 words) - 03:46, 10 November 2025
  • {{Short description|Finnish cyber security company}} | services = [[Computer security]] ...
    9 KB (1,185 words) - 09:59, 5 February 2025
  • .... Unlike most [[relational database management system]]s (RDBMS) and NoSQL databases, eXist-db provides [[XQuery]] and [[XSLT]] as its query and application pro ...ty and breaking changes to bundled Apache [[XML-RPC]] libraries to resolve security issues.<ref>{{cite web | url=http://exist-db.org/exist/apps/wiki/blogs/eXis ...
    7 KB (881 words) - 07:11, 8 January 2025
  • {{merge from|security bug|discuss=Talk:Vulnerability (computer security)#Merge proposal|date=May 2025}} ...or management that can be exploited by a malicious actor to compromise its security. ...
    27 KB (3,734 words) - 03:19, 9 June 2025
  • * [[vulnerability]] * For databases reliability, availability, scalability and recoverability (RASR), is an imp ...
    7 KB (719 words) - 19:21, 3 March 2025
  • ...such as fingerprints, sit for a digital photograph and successfully pass a security [[threat assessment]] conducted by TSA. ..._do/layers/twic/twic_faqs.shtm |date=2011-12-27 }} from the Transportation Security Administration. Retrieved December 22, 2011.</ref> ...
    16 KB (2,264 words) - 02:57, 18 March 2025
  • ...nts", or "check routines", that check for correctness, meaningfulness, and security of data that are input to the system. The rules may be implemented through ...new location or to a location that is not yet supported by the validation databases. ...
    12 KB (1,791 words) - 05:52, 27 February 2025
  • ...using the [[Lightweight Directory Access Protocol]] (LDAP) and stored LDAP databases on (directory) servers.<ref>{{Cite web|date=2019-05-14|title=What's the Dif ...esk]] calls about passwords<ref>{{cite web|url=https://www.uoguelph.ca/ccs/security/internet/single-sign-sso/benefits |title=Benefits of SSO |publisher=Univers ...
    20 KB (2,698 words) - 14:47, 25 May 2025
  • ...ications, electronics, informatics (including software and databases), and security.{{Citation needed|date=April 2021}} It is the most visible manifestation of ...associated services, and [[Committee on National Security Systems|National Security Systems]]. Non-GIG [[Information Technology | Information Technology (IT)]] ...
    9 KB (1,277 words) - 07:17, 1 December 2024
  • [[File:RasmuswJGang.jpg|thumb|right|Lerdorf talks about security with [[Joomla|Joomla!]] developers at OSCMS 2007 Conference.]] ...]]), but apparently it had not yet been picked up by the emerging PC-based databases. It was later adapted by several other SQL-compatible DBMS.<ref>{{cite web| ...
    7 KB (952 words) - 05:14, 4 June 2025
  • ...es with 0-day in webmail app used by millions |url=https://arstechnica.com/security/2023/10/pro-russia-hackers-target-inboxes-with-0-day-in-webmail-app-used-by ...er)|Cherokee]] in conjunction with a relational database engine. Supported databases are [[MySQL]], [[PostgreSQL]] and [[SQLite]]. The user interface is rendere ...
    9 KB (1,105 words) - 12:17, 24 April 2025
  • ...multiprocessor support, Response Rate Limiting (RRL), [[Domain Name System Security Extensions|DNSSEC]], and broad portability. RNDC enables remote configurati BIND 10 planned to make the data store modular, so that a variety of databases may be connected.<ref name="bind10-design">{{cite web ...
    12 KB (1,678 words) - 14:30, 19 November 2025
  • {{About|the Java logging framework|the 2021 vulnerability affecting Log4j|Log4Shell}} ...terized by [[Tenable, Inc.|Tenable]] as "the single biggest, most critical vulnerability of the last decade".<ref name="guardian"/> ...
    32 KB (4,659 words) - 23:15, 28 June 2025
  • ...:\Windows\System32\cmd.exe</code>, and is called a [[directory traversal]] vulnerability. With the path canonicalized, it is clear the file should not be executed. ...ing byte sequence: the valid one and some invalid ones. This could lead to security issues similar to the one described in the previous section. Therefore, if ...
    10 KB (1,532 words) - 13:59, 14 November 2024
  • {{Short description|International standard for computer security certification}} ...]]/[[International Electrotechnical Commission|IEC]] 15408) for [[computer security]] certification. It is currently in version 2022 revision 1.<ref>{{cite web ...
    30 KB (4,382 words) - 21:39, 10 July 2025
  • ...=233582569 |issn=1751-8806}}</ref> SQL injection must exploit a [[security vulnerability]] in an application's software, for example, when user input is either inco ...ocument-oriented [[NoSQL]] databases can also be affected by this security vulnerability.{{Citation needed|date=March 2025}} ...
    47 KB (6,473 words) - 11:00, 27 June 2025
  • ...sment and a penetration test? |url=https://qualysec.com/difference-between-vulnerability-assessment-and-penetration-testing/ |access-date=2020-05-21}}</ref> The tes ...le it is.<ref>{{cite web|title=Penetration Testing: Assessing Your Overall Security Before Attackers Do|publisher=[[SANS Institute]]|access-date=16 January 201 ...
    29 KB (4,038 words) - 21:18, 27 May 2025
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)