Vulnerabilities

6K

Solutions

64

Articles & Videos

7K

Contributors

A vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness, known as the attack surface. Vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities. Other vulnerabilities include security risks, security defects and constructs in programming languages that are difficult to use properly.

Related Topics

  1. Security
  2. Anti-Virus Apps
  3. OS Security
  4. Anti-Spyware
  5. Network Security
  6. Windows XP
  7. Software Firewalls
  8. Encryption
  9. Windows Server 2003
  10. Web Browsers
Refine results

The user self-service tools of SAP HANA contain some vulnerabilities and in order to prevent it , we have to update the systems or desactivate the the self-service tool.

In order to to determine …

221 views
Free Tool: ZipGrep
Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Hello to everyone,
this question might be easy for most of you but I would like to be notified by email  on every critical Vendor's vulnerabilities found.
Actually I go and check once a week on …

320 views

Understand  EPO & NIDS can't add SHA256 hashes but we wud still want to mitigate against them.

how can we go about doing this?  So far our EPO could block/prevent creation of certain file

827 views

Hi, we have various power-point files sent to us and wanted to know if there is no malicious code (maybe like VBA) within them.  We have run anti-virus and anti-spam and all ok.  Any other thing we …

1284 views

From what I've heard, SHA-1 is no longer the standard because there were vulnerabilities found.  Which SHA would you suggest?

How long should the cert last for?  Expiration?  5 years?

Naren

236 views

We have got this below code at our lotus notes webpage. which pop out alert on window.

https://abc.com/xyz.nsf/form.html?open&page=authentication&msg=invalidcredentials">
<svg/onload=alert(/BUG …

933 views

I have a Kaseya deployment that is failing a PCI vulnerability scan and the recommended remediation doesn't seem to fix the result. The "Microsoft IIS ISAPI Extension Enumerate Root Web Server …

140 views
Doxware

If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.

0121 views

I am looking for someone who has used https://www.eventsentry.com/blog/2016/03/defeating-ransomware-with-eventsentry-auditing.html to protect against ransomware and their experience with it - pros and…

229 views

One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network components" (Curry et al., 2011).

0127 views
Announcing the Most Valuable Experts of 2016
Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

Is there a tool that can take a URL, scan the page, and identify dead links?

If a Chrome extension exists, that's a plus.

976 views

i am looking to purchase a software that protects my machine win 10 from any attack , malware, virus , trojans etc

what is the best one based on your experience?  when i say best, i mean so that it…

891 views

Here is the link that was clicked: …

134 views

My Os is win 10 pro 64 bit.  I had earlier on login problems where I was not able to login with my usual password into my pc and since the login user was my email, I had to use a laptop to get into …

357 views

Good evening experts,

my internet explorer options proxy server sectioning keep being checked by some program or perhaps a malware virus my virus scan is not picking up. I use Comcast's free …

1155 views

Please see the findings below from a recent review.  

can you please let me know :

•      Will the upgrade to Exchange 2013 resolve the vulnerability below?
•      Do we have any viable options with 2007…

8102 views

Hi Guys

What components of PC can get a virus?
Or how to scan motherboard or Ram ?

Thank you

685 views

Hi guys

I have noticed today on my weekly Firewall report botnet initiator. It is one connection from yestarday please see below



Could you help me what shuld I do ? is it false positive ? …

21133 views

Hi Guys,
I have an Internet Information Services web server, and it was attacked by ransomware.
Honestly I don't even know how can the hacker actually infect the server just by using the port 80.

12258 views
Networking for the Cloud Era
Networking for the Cloud Era

Join Microsoft and Riverbed for a discussion and demonstration of enhancements to SteelConnect:
-One-click orchestration and cloud connectivity in Azure environments
-Tight integration of SD-WAN and WAN optimization capabilities
-Scalability and resiliency equal to a data center

Hi Experts,

App Control is not blocking access to Google Play app store from smartphones, however, play.google.com is blocked from browsers on all PCs. How do I block it for smartphones?

464 views

Hello,
       We have recently seen many entries in our Sonicwall log that states"Possible RST Flood on IF X0" and then extends to the ip of the source. The internal ip is coming from our Barracuda …

61,246 views

Please advice on utilities, preferably free, that we can use in an iPhone or in our notebook where it would detect if a WiFi is unsecured.

14138 views

I've been an avid user and supporter of Malwarebytes Premium Version 2.x for years. It's an excellent product that runs alongside just about any Anti-Virus application without issues. It seems to have an uncanny ability to pick up many things that Anti-Virus applications occasionally miss.

1198 views

We are going to start installing an SOC vendor's EVM which collects security / IPS / firewall
events to be sent to the SOC vendor.

Q1:
Is is a practice to do VA scan against these EVMs in case …

5108 views

Many FX traders & dealers in banks use Reuters Messenger & others to get quotes & market info :
understand these laptops are not on dedicated/isolated networks but connect to the banks'
corporate …

2130 views
Show more content
201506-LO-Top-001

Vulnerabilities

6K

Solutions

64

Articles & Videos

7K

Contributors

A vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness, known as the attack surface. Vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities. Other vulnerabilities include security risks, security defects and constructs in programming languages that are difficult to use properly.

Related Topics

  1. Security
  2. Anti-Virus Apps
  3. OS Security
  4. Anti-Spyware
  5. Network Security
  6. Windows XP