Istio Security Assessment
goal of the assessment was to identify security issues related to the Istio code base, highlight high risk configurations commonly used by administrators, and provide perspective on whether security features Confidential Table of Findings For each finding, NCC Group uses a composite risk score that takes into account the severity of the risk, application’s exposure and user population, technical difficulty of exploitation exploitation, and other factors. For an explanation of NCC Group’s risk rating and finding categorization, see Appendix A on page 38. Title ID Risk Inability To Secure Control Plane Network Communications0 码力 | 51 页 | 849.66 KB | 1 年前3Dapr july 2020 security audit report
invocation request, the unsanitized parameter is concatenated onto the targeted URL. This introduces the risk of attackers passing HTTP parameters into the method parameter, which are then appended to secrets of statestore components can be received from Dapr via the getSecrets API. This introduces the risk of attackers extracting passwords and sensitive secrets to authenticate at statestore components, handlers of topic routes which are out-of-scope for the publishing Dapr sidecar. This highlights the risk of attackers bypassing the PubSub component entirely, invoking the event routes for topics which are0 码力 | 19 页 | 267.84 KB | 1 年前3Kubernetes安全求生指南
NIST在容器安全指南中揭露了五種容器應用最應關注的風險 映像風險 Image Risk 登錄風險 Registry Risk 容器調度平台風險 Orchestrator Risk 容器風險 Container Risk 實體作業系統風險 Host OS Risk ©2019 VMware, Inc. 9 針對Kubernetes的安全強化實作參考:0 码力 | 23 页 | 2.14 MB | 1 年前3Dapr september 2023 security audit report
consider the supply-chain risk to be an area where Dapr faces a security risk, and in this section we recommend that Dapr adds Scorecard to their dependencies to mitigate this risk. During the manual auditing audit 2023 This type of risk applies to all open source projects that use other open source packages in their dependency trees. The Scorecard project11 aims to mitigate that risk by formalizing a set of0 码力 | 47 页 | 1.05 MB | 1 年前3Oracle VM VirtualBox 4.1.14 User Manual
the guest operating system usually has control over the whole screen. This could present a security risk as the guest operating 141 9 Advanced topics system might fool the user into thinking that it is XP" VBoxInternal/Devices/VMMDev/0/Config/KeepCredentials 1 Note that this is a potential security risk as a malicious application running on the guest could request this information using the proper interface examining and, to some extent, controlling the VM state. Warning: Use the VM debugger at your own risk. There is no support for it, and the following documentation is only made available for advanced users0 码力 | 299 页 | 4.84 MB | 1 年前3Oracle VM VirtualBox 4.0.4 User Manual
the guest operating system usually has control over the whole screen. This could present a security risk as the guest operating 134 9 Advanced topics system might fool the user into thinking that it is XP" VBoxInternal/Devices/VMMDev/0/Config/KeepCredentials 1 Note that this is a potential security risk as a malicious application running on the guest could request this information using the proper interface examining and, to some extent, controlling the VM state. Warning: Use the VM debugger at your own risk. There is no support for it, and the following documentation is only made available for advanced users0 码力 | 269 页 | 4.65 MB | 1 年前3Oracle VM VirtualBox 4.0.6 User Manual
the guest operating system usually has control over the whole screen. This could present a security risk as the guest operating 134 9 Advanced topics system might fool the user into thinking that it is XP" VBoxInternal/Devices/VMMDev/0/Config/KeepCredentials 1 Note that this is a potential security risk as a malicious application running on the guest could request this information using the proper interface examining and, to some extent, controlling the VM state. Warning: Use the VM debugger at your own risk. There is no support for it, and the following documentation is only made available for advanced users0 码力 | 270 页 | 4.65 MB | 1 年前3Oracle VM VirtualBox 4.2.6 User Manual
the guest operating system usually has control over the whole screen. This could present a security risk as the guest operating 148 9 Advanced topics system might fool the user into thinking that it is XP" VBoxInternal/Devices/VMMDev/0/Config/KeepCredentials 1 Note that this is a potential security risk as a malicious application running on the guest could request this information using the proper interface examining and, to some extent, controlling the VM state. Warning: Use the VM debugger at your own risk. There is no support for it, and the following documentation is only made available for advanced users0 码力 | 322 页 | 5.84 MB | 1 年前3Oracle VM VirtualBox 5.0.4 User Manual
the guest operating system usually has control over the whole screen. This could present a security risk as the guest operating 172 9 Advanced topics system might fool the user into thinking that it is XP" VBoxInternal/Devices/VMMDev/0/Config/KeepCredentials 1 Note that this is a potential security risk as a malicious application running on the guest could request this information using the proper interface examining and, to some extent, controlling the VM state. Warning: Use the VM debugger at your own risk. There is no support for it, and the following documentation is only made available for advanced users0 码力 | 322 页 | 3.30 MB | 1 年前3Oracle VM VirtualBox 4.2.4 User Manual
the guest operating system usually has control over the whole screen. This could present a security risk as the guest operating 147 9 Advanced topics system might fool the user into thinking that it is XP" VBoxInternal/Devices/VMMDev/0/Config/KeepCredentials 1 Note that this is a potential security risk as a malicious application running on the guest could request this information using the proper interface examining and, to some extent, controlling the VM state. Warning: Use the VM debugger at your own risk. There is no support for it, and the following documentation is only made available for advanced users0 码力 | 318 页 | 5.35 MB | 1 年前3
共 152 条
- 1
- 2
- 3
- 4
- 5
- 6
- 16