\usepackage{tikz}
\newcommand{\yingyang}{% rotate to match your current mind state
\begin{tikzpicture}[scale=0.2, baseline=-0.1cm, rotate=-45]
% Outer circle (black)
\draw[thick, fill=black] circle (1);
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| {"containers": {"cna": {"affected": [{"product": "n/a", "vendor": "n/a", "versions": [{"status": "affected", "version": "n/a"}]}], "datePublic": "2011-02-23T00:00:00.000Z", "descriptions": [{"lang": "en", "value": "The TFTP implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x, 1.6.0, and 1.6.1 allows remote attackers to obtain sensitive information via a GET request, aka Bug ID CSCte43876."}], "problemTypes": [{"descriptions": [{"description": "n/a", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2011-03-31T09:00:00.000Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco"}, "references": [{"name": "1025112", "tags": ["vdb-entry", "x_refsource_SECTRACK"], "url": "http://www.securitytracker.com/id?1025112"}, {"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices", "tags": ["vendor-advisory", "x_refsource_CISCO"], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"} |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| { | |
| "dataType": "CVE_RECORD", | |
| "dataVersion": "5.1", | |
| "cveMetadata": { | |
| "vulnId": "", | |
| "cveId": "CVE-2025-8452", | |
| "vulnId": "GCVE-1337-2025-00000000000000000000000000000000000000000000000001011111011111010111111001000000000000000000000000000000000000000000000000000000001", | |
| "assignerOrgId": "00000000-0000-4000-9000-000000000000", | |
| "assignerShortName": "AHA", | |
| "vulnerabilitylookup_history": null, |
This Gist aims to centralise the most relevant public sources of information related to the HTTP/2 Rapid Reset vulnerability. This vulnerability has been disclosed jointly by Google, Amazon AWS, and Cloudflare on 10 October 2023 at 12:00 UTC.
Please help us make this page as comprehensive as possible by contributing relevant references, vendor advisories and statements, mitigations, etc.
- CVE-2023-44487, CIRCL CVE Search
- How AWS protects customers from DDoS events, AWS
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| { | |
| "addDynamicDns": [ | |
| { | |
| "ukrainianworldcongress_org.clickip.de": { | |
| "A": [ | |
| "85.215.86.53" | |
| ], | |
| "MX": [ | |
| "100 relay.rzone.de", | |
| "20 clickip.de" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| import uuid | |
| from pprint import pprint | |
| import json | |
| import requests | |
| # https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide | |
| # https://www.microsoft.com/en-us/security/blog/2023/04/18/microsoft-shifts-to-a-new-threat-actor-naming-taxonomy/ |
From 9:30 to 12:00 CET (a small break is foreseen)
Short url: https://tinyurl.com/BTS-MISP2
- MISP Introduction and history
- MISP data model
adulau@maurer:~$ curl -w "@curl-format.txt" -o /dev/null -s "https://services.nvd.nist.gov/rest/json/cpes/2.0/?resultsPerPage=20&startIndex=0"
time_namelookup: 0,120529s
time_connect: 0,225630s
time_appconnect: 0,386989s
time_pretransfer: 0,387033s
time_redirect: 0,000000s
time_starttransfer: 5,810461s
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| \documentclass[a4paper]{article} | |
| \pagestyle{plain} | |
| \usepackage{calc} | |
| \usepackage[top=0.25in,bottom=0.75in,left=0.5in,right=0.5in]{geometry} | |
| \usepackage{tikz} | |
| \newlength{\wholeboxwd} | |
| \setlength{\wholeboxwd}{0.99\textwidth} | |
| \newlength{\wholeboxht} | |
| \setlength{\wholeboxht}{0.95\textheight} |
NewerOlder