Include vulnerability

Results: 23



#Item
1Computing / Java platform / Java / Cross-platform software / Computing platforms / C++ / Java virtual machine / Java applet / Oracle Database / Namespace / Include directive / Java version history

Security Vulnerability Notice SEORACLE-14 [Security vulnerabilities in Java SE, Issue 69#2] DISCLAIMER INFORMATION PROVIDED IN THIS DOCUMENT IS PROVIDED "AS IS" WITHOUT

Add to Reading List

Source URL: www.security-explorations.com

Language: English - Date: 2016-03-10 01:27:46
2Management / Development charities / Disaster preparedness / Occupational safety and health / ALNAP / Recovery housing / Disaster / Social vulnerability / Federal Emergency Management Agency / Emergency management / Public safety / Humanitarian aid

South Asia Earthquake 2005 Learning from previous recovery operations This briefing provides a synthesis of key lessons from post-disaster recovery programmes. Intended audiences include: operational decision-mak

Add to Reading List

Source URL: www.alnap.org

Language: English - Date: 2013-10-27 05:42:59
3Department for International Development / Poverty reduction / International economics / Economics / Akshara Network / School of International Development / Development / International development / Social vulnerability

Our specialist areas include: Poverty and social impact analyses Social protection Civil society strengthening Voice and accountability Gender and inclusion

Add to Reading List

Source URL: www.theidlgroup.com

Language: English - Date: 2015-03-29 18:40:53
4PHP programming language / PHP / Data URI scheme / Hacker / Include directive / Imperva / Web application / Include vulnerability / Computing / Software engineering / Remote file inclusion

April 2012 Hacker Intelligence Initiative, Monthly Trend Report #8 Remote and Local File Inclusion Vulnerabilities 101 And the Hackers Who Love Them 1. Executive Summary

Add to Reading List

Source URL: www.imperva.com

Language: English - Date: 2012-03-30 14:02:14
5Religion and politics / Religious persecution / Separation of church and state / Freedom of expression / International relations / Faith / Secularism in India / Freedom of religion / Islam in the United States / Religion / Secularism / Philosophy of religion

Book Reviews dependency; it might embrace same-sex relationships; it might include as well the elderly living in relationships of mutual love, care, and vulnerability. Parties in such relationships are moved to extend th

Add to Reading List

Source URL: repository.berkleycenter.georgetown.edu

Language: English - Date: 2011-06-20 09:21:57
6Blog software / WordPress / Include vulnerability / Arbitrary code execution / Vulnerability / Firefox / Uploading and downloading / Software / Computing / PHP programming language

State of Alaska Cyber Security & Critical Infrastructure Cyber Advisory December 05, 2014 The following cyber advisory was issued by the State of Alaska and was intended for State government entities. The information may

Add to Reading List

Source URL: doa.alaska.gov

Language: English - Date: 2014-12-08 17:18:25
7Risk / Cyberwarfare / Hacking / Software testing / Vulnerability / Bash / Redirection / Social vulnerability / Debian / Computing / Software / Scripting languages

Critical Vulnerability in the Bourne Again Shell (BASH) aka ShellShock This advisory was updated on 29 September 2014 to include additional details of 3 new vulnerabilities (CVE[removed], CVE[removed], CVE[removed]a

Add to Reading List

Source URL: www.cert.gov.au

Language: English - Date: 2015-01-04 06:04:56
8Human sexuality / Human behavior / Cybertip.ca / Adolescence / Peer-to-peer / Sexual intercourse / Child abuse / Educational psychology / Behavior

If your child has been involved in a self/peer exploitation incident, you are likely feeling a wide range of emotions. This may include embarrassment, shame, anger, and a certain degree of vulnerability and uncertainty a

Add to Reading List

Source URL: www.cybertip.ca

Language: English - Date: 2013-11-14 10:35:09
9Human sexuality / Human behavior / Cybertip.ca / Adolescence / Peer-to-peer / Sexual intercourse / Child abuse / Educational psychology / Behavior

If your child has been involved in a self/peer exploitation incident, you are likely feeling a wide range of emotions. This may include embarrassment, shame, anger, and a certain degree of vulnerability and uncertainty a

Add to Reading List

Source URL: www.cyberaide.ca

Language: English - Date: 2013-11-14 10:35:09
10Global warming / Environmental economics / Intergovernmental Panel on Climate Change / Adaptation to global warming / National Assessment on Climate Change / Climate change / U.S. Global Change Research Program / Social vulnerability

  The  National  Climate  Assessment:  Preparing  the  Nation  for  Change   The  January  and  February  news  from  the  National  Climate  Assessment  include

Add to Reading List

Source URL: www.nesdis.noaa.gov

Language: English - Date: 2011-06-30 19:22:00
UPDATE