Hacker News
- Tesla: Security Vulnerabilities https://www.cvedetails.com/vulnerability-list/vendor_id-16203/Tesla.html?order=1&page=1&sha=73e27d3898b2b240263e0f443513b5e8f9073841&trc=13 66 comments
- Top 50 Vendors by Total Number of Distinct Vulnerabilities in 2016 http://www.cvedetails.com/top-50-vendors.php?year=2016 13 comments
- Centos 7 libxml2 update to 2.9.4+ https://www.cvedetails.com/vulnerability-list/vendor_id-1962/product_id-3311/Xmlsoft-Libxml2.html 7 comments centos
- Using an out of date, unsupported operating system is a security risk https://www.cvedetails.com/vulnerability-list/vendor_id-26/product_id-17153/year-2021/Microsoft-Windows-7.html 22 comments windows
- router/hardware firewall recommendations https://www.cvedetails.com/vulnerability-list.php?cvssscoremax=0&cvssscoremin=0&cweid=0&hasexp=0&month=0&opbyp=0&opcsrf=0&opdirt=0&opdos=0&opec=0&opfileinc=0&opginf=0&opgpriv=0&ophttprs=0&opmemc=0&opov=0&opsqli=0&opxss=0&order=3&page=1&product_id=&sha=1d6011c41df6dde5f48a4f36352f44c40f918a0a&trc=505&vendor_id=238&version_id=&year=0 13 comments linuxhardware
- Top 50 Products By Total Number Of "Distinct" Vulnerabilities https://www.cvedetails.com/top-50-products.php?year=0 3 comments programming
- Top 50 products having highest number of cve security vulnerabilities in 2016 https://www.cvedetails.com/top-50-products.php?year=2016 6 comments linux
Linking pages
- Software with the most vulnerabilities in 2015: Mac OS X, iOS, and Flash | VentureBeat http://venturebeat.com/2015/12/31/software-with-the-most-vulnerabilities-in-2015-mac-os-x-ios-and-flash/ 278 comments
- GitHub - trimstray/the-book-of-secret-knowledge: A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more. https://github.com/trimstray/the-book-of-secret-knowledge 276 comments
- Android Was 2016's Most Vulnerable Product https://www.bleepingcomputer.com/news/security/android-was-2016s-most-vulnerable-product/ 72 comments
- JWT (JSON Web Token) (in)security - research.securitum.com https://research.securitum.com/jwt-json-web-token-security/ 20 comments
- Microsoft warns users of a Serious Windows 10 Attack – Here’s How you can prevent it! https://www.canadavpns.com/blog/microsoft-warns-users-of-serious-windows-10-attack/ 20 comments
- A Red Team Guide for a Hardware Penetration Test: Part 1 | by Adam Toscher | Medium https://adam-toscher.medium.com/a-red-team-guide-for-a-hardware-penetration-test-part-1-2d14692da9a1 12 comments
- GitHub - trimstray/the-book-of-secret-knowledge: A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more. https://github.com/trimstray/awesome-ninja-admins 10 comments
- How Do Ruby/Rails Developers Keep Updated On Security Alerts? http://gavinmiller.io/2015/staying-up-to-date-with-security-alerts/ 7 comments
- How China Demands Tech Firms Reveal Hackable Flaws in Their Products | WIRED https://www.wired.com/story/china-vulnerability-disclosure-law/ 6 comments
- GitHub - edoardottt/awesome-hacker-search-engines: A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more https://github.com/edoardottt/awesome-hacker-search-engines 4 comments
- GitHub - iLabAcademy/the-book-of-secret-knowledge: A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more. https://github.com/iLabAcademy/the-book-of-secret-knowledge 4 comments
- GitHub - johackim/docker-hacklab: My personal hacklab, create your own. https://github.com/ston3o/docker-hacklab 3 comments
- GitHub - rsc-dev/cve_db: Common Vulnerabilities and Exposures DB and Python API https://github.com/rsc-dev/cve_db 0 comments
- Vulnerability Alerts | TheBestVPN.com https://thebestvpn.com/vulnerability-alerts/ 0 comments
- 50+ Best Free Hacking Tutorials that Makes You Pro Hacker ~ Development Buzz http://development-buzz.blogspot.com/2015/05/50-best-free-hacking-tutorials.html 0 comments
- Keeping Dependencies Up-to-Date with Automated Testing – Billy Korando http://billykorando.com/2019/05/08/keeping-dependencies-up-to-date-with-automated-testing 0 comments
- Top PostgreSQL Security Threats | Severalnines https://severalnines.com/blog/top-postgresql-security-threats 0 comments
- Security for full-stack web developers : Part 2 - LogRocket Blog https://blog.logrocket.com/security-for-fullstack-developers-part-2-d97fa6382ec9 0 comments
- Red Team: Initial Access. 0x00: Introduction | by Daniel A. Bloom | Medium https://medium.com/@danielabloom/red-team-initial-access-2cec2ed47d83 0 comments
- GitHub - blaCCkHatHacEEkr/PENTESTING-BIBLE: articles https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE 0 comments