2021 中国开源年度报告段夕华:不知道 21 年底所爆发的 log4j 漏洞,是否会让公司购买开源产品更加保守谨 慎?开源安全任重而道远。 Duan Xihua: I wonder if the log4j vulnerability in late 2021 will make companies more conservative and cautious in buying open source products of the top 10 seats. 2.8 开源安全与合规 Open Source Security and Compliance 2.8.1 CVE 漏洞风险 CVE Vulnerability Risks Gitee 采用棱镜七彩 FossEye 静态扫描了 1.5 万 个 Gitee 平台上具有代表性的优质推荐开 源项目仓库,结果显示有超过 93% 不存在 CVE 漏洞风险。 51%,存在超 过 10 个 CVE 漏洞的占比 2.58%。 Of the projects with CVE vulnerabilities, 18.51% have one CVE vulnerability, and 2.58% have more than 10 CVE vulnerabilities. 2.8.3 开源合规情况 Open Source Compliance0 码力 | 199 页 | 9.63 MB | 1 年前3
多云下的云原生之道multicloudMulti-site HA/DR features Built-in Monitoring & Logging Integrated Enterprise-grade Security Software & Policy driven Network & Storage Microservices z Systems Vulnerability Advisor to prevent risk Middleware0 码力 | 7 页 | 1.86 MB | 1 年前3
采用开源Harbor Registry实现高效安全的容器镜像运维Replication Job Services Notary client Remote Harbor Instance Notary Registry V2 Vulnerability Scanning Admin Service 基于角色的访问控制 18 项目 Project 成员 Members 镜像 Images Guest: Kubernetes on BOSH (Kubo) BOSH NSX Analytics Automation Security Operations Monitoring GCP Service Broker etcd worker Logging vSAN vSphere etcd worker Container0 码力 | 29 页 | 3.97 MB | 1 年前3
openEuler 21.03 技术白皮书ARM64 environment supports 32-bit applications. 16. Memory System Resource Partitioning and Monitoring (MPAM): Cache QoS and memory bandwidth control can be applied on the ARM64 architecture. 17 openEuler 21.03 Technical White Paper Live Kernel Upgrade A live kernel upgrade, including CVE vulnerability fixes and security kernel replacement, does not interrupt ongoing services. Before a live kernel logs The HA cluster solution provides complete logs and debugging information to facilitate the monitoring and management by system administrators. Application Scenarios Application scenario 1: service0 码力 | 21 页 | 948.66 KB | 1 年前3
运维上海 2017-采用Harbor开源企业级Registry实现高效安全的镜像运维 -张海宁– RBAC: admin, developer, guest – AD/LDAP integration • Policy based image replication • Vulnerability Scanning • Notary • Web UI • Audit and logs • Restful API for integration • Lightweight and Replication Job Services Notary client Remote Harbor Instance Notary Registry V2 Vulnerability Scanning Admin Service Harbor users and partners (selected) 12 Image replication (synchronization) Image is pulled using digest • Perform vulnerability scanning – Prevent images with vulnerabilities from being pulled – Regular scanning based on updated vulnerability database 21 Content trust for image0 码力 | 41 页 | 4.94 MB | 1 年前3
基于Rust-vmm实现Kubernetes运行时−CVE-2018-14634 Integer overflow vulnerability −CVE-2016-5195 Dirty COW vulnerability −CVE-2019-5736 Docker runc vulnerability −CVE-2019-14271 Docker CP vulnerability Pod Isolation Challenges • Noisy0 码力 | 27 页 | 34.17 MB | 1 年前3
httpd 2.2.32 中文文档it is important to be aware that it is possible to make a series of requests, and to exploit a vulnerability on an origin webserver such that the attacker can entirely control the content retrieved by the attacks trying to exploit the Apache Tomcat Source.JSP Malformed Request Information Disclosure Vulnerability, the second example will list the ten last denied clients, for example: [Thu Jul 11 17:18:39 variables on headers, which is provided by mod_setenvif. --disable-status Enable the process/thread monitoring, which is provided by mod_status. --disable-userdir Disable the mapping of requests to user-specific0 码力 | 1866 页 | 1.48 MB | 1 年前3
大学霸 Kali Linux 安全渗透教程5.13所示。 图5.13 启动的插件程序 (11)在该界面单击Save按钮,将显示如图5.14所示的界面。 图5.14 新建的策略 (12)从该界面可以看到新建的策略Local Vulnerability Assessment,表示该策略 已创建成功。 2. 新建扫描任务 策略创建成功后,必须要新建扫描任务才能实现漏洞扫描。下面将介绍新建扫描任 务的具体操作步骤。 大学霸 Kali Linux 描。在该界面单击New Scan按钮,将显示如图5.16所示。 图5.16 新建扫描任务 (3)在该界面设置扫描任务名称、使用策略、文件夹和扫描的目标。这里分别设 置为Sample Scan、Local Vulnerability Assessment(前面新建的策略)、My Scans和192.168.41.0/24。然后单击Launch按钮,将显示如图5.17所示的界面。 大学霸 Kali Linux 安全渗透教程 一次测试组的安全漏洞。对于新建策略和扫描任务这里就不再赘述,本小节中只列 出扫描本地漏洞所需添加的插件程序及分析扫描信息。 【实例5-1】扫描本地漏洞具体操作步骤如下所示。 (1)新建名为Local Vulnerability Assessment策略。 (2)添加所需的插件程序。 Ubuntu Local Security Checks:扫描本地Ubuntu安全检查。 Default Unix Accounts:扫描默认Unix账户。0 码力 | 444 页 | 25.79 MB | 1 年前3
httpd 2.4.33 中文文档it is important to be aware that it is possible to make a series of requests, and to exploit a vulnerability on an origin webserver such that the attacker can entirely control the content retrieved by the attacks trying to exploit the Apache Tomcat Source.JSP Malformed Request Information Disclosure Vulnerability, the second example will list the ten last denied clients, for example: [Thu Jul 11 17:18:39 outward-facing, publicly accessible server deployments. If an interface is required for faulty monitoring or other custom service consumers running on an intranet, users should toggle the Unsafe option0 码力 | 2692 页 | 3.12 MB | 1 年前3
httpd 2.4.25 中文文档it is important to be aware that it is possible to make a series of requests, and to exploit a vulnerability on an origin webserver such that the attacker can entirely control the content retrieved by the attacks trying to exploit the Apache Tomcat Source.JSP Malformed Request Information Disclosure Vulnerability, the second example will list the ten last denied clients, for example: [Thu Jul 11 17:18:39 outward-facing, publicly accessible server deployments. If an interface is required for faulty monitoring or other custom service consumers running on an intranet, users should toggle the Unsafe option0 码力 | 2573 页 | 2.12 MB | 1 年前3
共 258 条
- 1
- 2
- 3
- 4
- 5
- 6
- 26













