NA

CVE-2014-0235

Published: 08/04/2014 Updated: 07/11/2023

Vulnerability Summary

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-0325, CVE-2014-3538. Reason: This candidate is a duplicate of CVE-2014-0325 and/or CVE-2014-3538. A typo caused the wrong ID to be used. Notes: All CVE users should reference CVE-2014-0325 instead of this candidate for the issue in the Internet Explorer product, and should reference CVE-2014-3538 instead of this candidate for the issue in the file product. All references and descriptions in this candidate have been removed to prevent accidental usage

Vulnerability Trend

Github Repositories

iPost test

My-iPost The examples in this repository are based off the case study of the Department of State implementation of iPost The iPost program aggregates and presents a security view of an organization in the form of a dashboard Link to paper: wwwcounciloncybersecurityorg/critical-controls/case-studies/ ipost-sqlitepy - Python script with iPost Risk Scoring formulas