Search


PDF Archive search engine
Last database update: 17 May at 11:24 - Around 76000 files indexed.


Show results per page

Results for «vulnerabilities»:


Total: 500 results - 0.029 seconds

HP Cyber Risk Report 2015 Infographic 100%

Attackers Focusing on Older Vulnerabilities 8227 days from launch of first Windows version affected by CVE-2014-4114 (“Sandworm”) vulnerability to release of the patch - April 16, 1992 to October 14, 2014 33% of all exploit samples discovered Top Exploits Discovered in 2014 in 2014 used an infection vector first detected in use in 2010, in Stuxnet CVE-2010-2568 CVE-2010-0188 CVE-2013-2422 59 22% CVE-2012-1723 33% 33% CVE-2012-0507 2% CVE-2012-0158 2% CVE-2013-2465 3% CVE-2012-4681 3% combined maximum age, in years, of the code in the high-profile Heartbleed, Shellshock, and POODLE zero-days 4% 4% 7% 9% CVE-2013-2423 7 of the top 10 exploits found overall in 2014 CVE-2009-3129 11% Others targeted vulnerabilities over 2 years old Server Misconfigurations Top Vulnerability List 2013 80% 68% 60% 60% 58% 40% 53% VS.

https://www.pdf-archive.com/2015/03/16/hp-cyber-risk-report-2015-infographic/

16/03/2015 www.pdf-archive.com

Google patches critical media 99%

12/13/2015 Google patches critical media processing and rooting vulnerabilities in Android | Haktuts Haktuts All About Ethical Hacking,Hacking News,Security News,Privacy Issue,Cyber Crime,Pentesting Tools,Open Sources,Cyber Security,How­To,Tips And Tricks And Dark Web News   Google patches critical media processing and rooting vulnerabilities in Android The flaws can be exploited remotely through emails, Web pages, MMS and rogue apps Google has released a new batch of security fixes for its Nexus smartphones and tablets, addressing flaws that could allow attackers to compromise the Android devices via rogue emails, Web pages, and MMS messages.

https://www.pdf-archive.com/2015/12/14/google-patches-critical-media/

14/12/2015 www.pdf-archive.com

Ali Poster 99%

An innovative approach to solve the network design problem concerning intelligent vulnerabilities Naimi, A.;

https://www.pdf-archive.com/2018/04/26/ali-poster/

26/04/2018 www.pdf-archive.com

HP Cyber Risk Report 2015 Executive Summary 98%

It examines both the nature of currently prevalent vulnerabilities that leave organizations open to risk, and how adversaries take advantage of those vulnerabilities.

https://www.pdf-archive.com/2015/03/16/hp-cyber-risk-report-2015-executive-summary/

16/03/2015 www.pdf-archive.com

Web Application Penetration Test 96%

Penetration​ ​Test​ ​Report Issue​ ​Tracker Patrick​ ​Eugene​ ​Porche´​​ ​Jr Security​ ​Analyst 415.610.1712 PENETRATION​ ​TEST​ ​REPORT​ ​-​ ​PATRICK​ ​PORCHE´ Table​ ​Of​ ​Contents Table​ ​of​ ​Contents​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​1 Summary​ ​of​ ​Results​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​2 Broken​ ​Authentication​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​3 Sensitive​ ​Data​ ​Exposure​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​7 Broken​ ​Access​ ​Control​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​9 Security​ ​Misconfiguration​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​13 Cross-Site​ ​Scripting​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​14 Conclusion​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​18 Resources​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​19 1 PENETRATION​ ​TEST​ ​REPORT​ ​-​ ​PATRICK​ ​PORCHE´ Summary​ ​of​ ​Results After​ ​performing​ ​manual​ ​penetration​ ​testing​ ​of​ ​the​ ​issue​ ​reporter​ ​application​ ​located​ ​at​ ​the​ ​web address​ ​http://ec2-34-226-201-187.compute-1.amazonaws.com/issues​​ ​I​ ​found​ ​several opportunities​ ​for​ ​increased​ ​security​ ​measures.​ ​Below​ ​is​ ​an​ ​abbreviated​ ​outline​ ​of​ ​the vulnerabilities.

https://www.pdf-archive.com/2017/11/29/web-application-penetration-test/

29/11/2017 www.pdf-archive.com

HP Cyber Risk Report 2015 95%

The work of our threat research and software security research teams revealed vulnerabilities in products and programs that were years old—in a few cases, decades old.

https://www.pdf-archive.com/2015/03/16/hp-cyber-risk-report-2015/

16/03/2015 www.pdf-archive.com

poloniex 94%

POLONIEX Security review What is Poloniex?

https://www.pdf-archive.com/2016/10/15/poloniex/

15/10/2016 www.pdf-archive.com

Remote-File-Inclusion-Tutorial 94%

Remote File Inclusion Tutorial Author:

https://www.pdf-archive.com/2011/03/27/remote-file-inclusion-tutorial/

27/03/2011 www.pdf-archive.com

Remote-File-Inclusion-Tutorial 94%

Remote File Inclusion Tutorial Author:

https://www.pdf-archive.com/2011/03/26/remote-file-inclusion-tutorial/

26/03/2011 www.pdf-archive.com

nps71-070714-03 92%

On March 7, 2014, the Federal Energy Regulatory Commission (FERC) ordered the North American Electric Reliability Corporation (NERC) to submit to the Commission new reliability standards requiring certain transmission owners “to take steps or demonstrate that they have taken steps to address physical security risks and vulnerabilities related to the reliable operation” of the power grid.

https://www.pdf-archive.com/2015/02/22/nps71-070714-03/

22/02/2015 www.pdf-archive.com

poetry portfolio 88%

Sergio DeChiara 10/21/12 Poetry Prof.

https://www.pdf-archive.com/2012/10/25/poetry-portfolio/

25/10/2012 www.pdf-archive.com

KTMB REPORT 88%

Since an SQL Injection vulnerability could possibly affect any website or web application that makes use of an SQL-based database, the vulnerability is one of the oldest, most prevalent and most dangerous of web application vulnerabilities.

https://www.pdf-archive.com/2017/06/03/ktmb-report/

03/06/2017 www.pdf-archive.com

Identities-Report 88%

L ike an “identity mosaic”, people select and combine identity elements for transactions during the course of everyday life 36 VULNERABILITIES Everyone is vulnerable when identifying themselves—and ID systems can sometimes just shift, or even introduce new, vulnerabilities 37 Essay V1:

https://www.pdf-archive.com/2017/12/17/identities-report/

17/12/2017 www.pdf-archive.com

II - Balkans AC Effort (Draft) - 140818 88%

CORRUPTION AS A WEAPON OF WAR, THE VULNERABILITIES TO CORRUPTION AND MALIGN INFLUENCE CONTEXT Six Balkan countries1 wishing to accede to EU.

https://www.pdf-archive.com/2019/02/07/ii---balkans-ac-effort-draft---140818/

07/02/2019 www.pdf-archive.com

ConnectedCars Printed 20160321 86%

Understand the Attack Surface ATTACKER AFTERMARKET NETWORKS The numerous applications hosted in connected vehicles present potential vulnerabilities for hackers to exploit.

https://www.pdf-archive.com/2016/03/22/connectedcars-printed-20160321/

22/03/2016 www.pdf-archive.com

PenTestBrochure Final 86%

For chain of vulnerabilities, we do our homework and present a best practice set of solutions.

https://www.pdf-archive.com/2017/01/18/pentestbrochure-final/

18/01/2017 www.pdf-archive.com

ijrte02020709 86%

Tools assist those websites looking for vulnerabilities or security weaknesses that can be candidates for security violations.

https://www.pdf-archive.com/2011/08/13/ijrte02020709/

13/08/2011 www.pdf-archive.com

JDIT-2014-1118-009 85%

Journal of Diagnostic Imaging in Therapy.

https://www.pdf-archive.com/2017/05/30/jdit-2014-1118-009/

30/05/2017 www.pdf-archive.com

IFS-Ed - WB6 Proposal - FCO - 171018 84%

Programme Definition The programme will run over a 3 year period and will seek to provide the depth of understanding and delivery in each of the countries individually whilst addressing the cross-regional connections and vulnerabilities.

https://www.pdf-archive.com/2019/02/07/ifs-ed---wb6-proposal---fco---171018/

07/02/2019 www.pdf-archive.com

Queering Disaster Emergency Management - M.A. Cianfarani 84%

This article also presents the results from an exploratory study investigating the particular experiences, vulnerabilities, needs, and capacities of LGBTQ people within the City of Toronto in Ontario, Canada.

https://www.pdf-archive.com/2016/06/21/queering-disaster-emergency-management-m-a-cianfarani/

21/06/2016 www.pdf-archive.com