Hallo zusammen,
sofern nicht selber schon gesehen/-lesen hier [0] FYI
"Top ten most popular docker images each contain at least 30 vulnerabilities"
VG
Bernd
[0]
https://snyk.io/blog/top-ten-most-popular-docker-images-each-contain-at-lea…
--
Bernd Kohler
IT Center
Abteilung: Netze
RWTH Aachen University
Wendlingweg 10
52074 Aachen
Tel: +49 241 80-29793
Fax: +49 241 80-22666
kohler(a)itc.rwth-aachen.de
https://www.itc.rwth-aachen.de
Hallo zusammen,
sofern nicht selber schon gesehen/-lesen hier [0] bzw. [1] FYI
"How to break PDF Signatures"
--> If you open a PDF document and your viewer displays a panel (like you see below) indicating that
the document is signed by [email protected] and
the document has not been modified since the signature was applied You assume that the displayed content is precisely what [email protected] has created.
During recent research, we found out that this is not the case for almost all PDF Desktop Viewers and most Online Validation Services.
==> Nutze ich einen aktuell verwundbaren Desktop Client ja/nein - siehe [2]
VG
Bernd
[0]
https://www.pdf-insecurity.org/
[1]
https://www.pdf-insecurity.org/signature/signature.html
[2]
https://www.pdf-insecurity.org/signature/viewer.html
--
Bernd Kohler
IT Center
Abteilung: Netze
RWTH Aachen University
Wendlingweg 10
52074 Aachen
Tel: +49 241 80-29793
Fax: +49 241 80-22666
kohler(a)itc.rwth-aachen.de
https://www.itc.rwth-aachen.de