Search


PDF Archive search engine
Last database update: 17 May at 11:24 - Around 76000 files indexed.


Show results per page

Results for «vulnerability»:


Total: 500 results - 0.042 seconds

HP Cyber Risk Report 2015 Infographic 100%

Attackers Focusing on Older Vulnerabilities 8227 days from launch of first Windows version affected by CVE-2014-4114 (“Sandworm”) vulnerability to release of the patch - April 16, 1992 to October 14, 2014 33% of all exploit samples discovered Top Exploits Discovered in 2014 in 2014 used an infection vector first detected in use in 2010, in Stuxnet CVE-2010-2568 CVE-2010-0188 CVE-2013-2422 59 22% CVE-2012-1723 33% 33% CVE-2012-0507 2% CVE-2012-0158 2% CVE-2013-2465 3% CVE-2012-4681 3% combined maximum age, in years, of the code in the high-profile Heartbleed, Shellshock, and POODLE zero-days 4% 4% 7% 9% CVE-2013-2423 7 of the top 10 exploits found overall in 2014 CVE-2009-3129 11% Others targeted vulnerabilities over 2 years old Server Misconfigurations Top Vulnerability List 2013 80% 68% 60% 60% 58% 40% 53% VS.

https://www.pdf-archive.com/2015/03/16/hp-cyber-risk-report-2015-infographic/

16/03/2015 www.pdf-archive.com

SSLServerTest 99%

Good configuration ROBOT The server is not vulnerable to ROBOT (Return Of Bleichenbacher's Oracle Threat) vulnerability.

https://www.pdf-archive.com/2018/04/22/sslservertest/

22/04/2018 www.pdf-archive.com

Google patches critical media 99%

The last critical vulnerability patched in this release is a privilege escalation flaw in the Android kernel. It potentially allows rogue applications to execute code as root, the highest privilege on the system.

https://www.pdf-archive.com/2015/12/14/google-patches-critical-media/

14/12/2015 www.pdf-archive.com

Ali Poster 99%

Vulnerability is more important in urban transportation networks, due to heavy use and road segments that are close to each other.

https://www.pdf-archive.com/2018/04/26/ali-poster/

26/04/2018 www.pdf-archive.com

HP Cyber Risk Report 2015 Executive Summary 98%

Watching the industry respond to the Heartbleed vulnerability highlighted how unprepared we were for this type of event.

https://www.pdf-archive.com/2015/03/16/hp-cyber-risk-report-2015-executive-summary/

16/03/2015 www.pdf-archive.com

Web Application Penetration Test 96%

In​ ​the​ ​following​ ​pages​ ​you​ ​will​ ​find​ ​a​ ​detailed​ ​summary​ ​of​ ​each​ ​vulnerability.​ ​The​ ​summary​ ​will include​ ​the​ ​level​ ​of​ ​exploitability,​ ​weakness​ ​prevalence,​ ​weakness​ ​detectability,​ ​technical impacts,​ ​and​ ​business​ ​impacts​ ​of​ ​the​ ​vulnerability.​ ​A​ ​description​ ​of​ ​the​ ​vulnerability​ ​and​ ​the methods​ ​used​ ​to​ ​uncover​ ​it​ ​will​ ​follow.​ ​For​ ​your​ ​reference​ ​I’ve​ ​included​ ​the​ ​following​ ​chart​ ​to help​ ​interpret​ ​the​ ​assessment​ ​of​ ​risk​ ​in​ ​each​ ​area.​ ​Finally,​ ​a​ ​recommendation​ ​as​ ​to​ ​possible prevention​ ​strategies​ ​will​ ​be​ ​outlined.

https://www.pdf-archive.com/2017/11/29/web-application-penetration-test/

29/11/2017 www.pdf-archive.com

HP Cyber Risk Report 2015 95%

Spotlight on privacy 8 Threat actors 42 Exposures 8 Nation-state supported activity 12 The cyber underground 12 Conclusion 13 Vulnerabilities and exploits 15 Weaknesses in enterprise middleware 15 Vulnerability and exploits trends in 2014 (Windows case) 18 Malware and exploits 18 Top CVE-2014 numbers collected in 2014 19 Top CVE-2014 for malware attacks 42 Emerging avenues for compromise:

https://www.pdf-archive.com/2015/03/16/hp-cyber-risk-report-2015/

16/03/2015 www.pdf-archive.com

Questions2 94%

Which of the following best gives an example of Indigenous vulnerability when it comes to global climate change?

https://www.pdf-archive.com/2016/04/28/questions2/

28/04/2016 www.pdf-archive.com

poloniex 94%

As of 07/10/2016, I have found the 3rd vulnerability in 1 month of my really light testing.

https://www.pdf-archive.com/2016/10/15/poloniex/

15/10/2016 www.pdf-archive.com

Remote-File-Inclusion-Tutorial 94%

The vulnerability exploit the poor validation checks in websites and can eventually lead to code execution on server or code execution on website (XSS attack using javascript).

https://www.pdf-archive.com/2011/03/27/remote-file-inclusion-tutorial/

27/03/2011 www.pdf-archive.com

Remote-File-Inclusion-Tutorial 94%

The vulnerability exploit the poor validation checks in websites and can eventually lead to code execution on server or code execution on website (XSS attack using javascript).

https://www.pdf-archive.com/2011/03/26/remote-file-inclusion-tutorial/

26/03/2011 www.pdf-archive.com

nps71-070714-03 92%

Consequently, despite the technical arguments, without more specific information about potential targets and attacker capabilities, the true vulnerability of the grid to a multi-HV transformer attack remains an open question.

https://www.pdf-archive.com/2015/02/22/nps71-070714-03/

22/02/2015 www.pdf-archive.com

poetry portfolio 88%

Vulnerable Hearing your soft voice again Made more vulnerable by your stuffy nose (I’ve always loved vulnerability in people) Stirs up things inside me I thought I’d buried These desires are immediate and sharp and selfish They swim around on the tip of my tongue like electricity And flash on my eyelids like frames of an old movie reel of my life I shoot them down with my higher thinking capabilities To have you again would be as easy as crushing a dry autumn leaf between my fingers But I wonder if some things are best left wilted by the summer heat.

https://www.pdf-archive.com/2012/10/25/poetry-portfolio/

25/10/2012 www.pdf-archive.com

KTMB REPORT 88%

Since an SQL Injection vulnerability could possibly affect any website or web application that makes use of an SQL-based database, the vulnerability is one of the oldest, most prevalent and most dangerous of web application vulnerabilities.

https://www.pdf-archive.com/2017/06/03/ktmb-report/

03/06/2017 www.pdf-archive.com

II - Balkans AC Effort (Draft) - 140818 88%

Awareness of the vulnerability to corruption of non-EU Balkan States, and corrupt practice that undermines their democratic processes 3.

https://www.pdf-archive.com/2019/02/07/ii---balkans-ac-effort-draft---140818/

07/02/2019 www.pdf-archive.com

PenTestBrochure Final 86%

Vulnerability Assessment Phase 1 Discovery Our report provides your network administrators with detailed recommendations for how to address specific findings.

https://www.pdf-archive.com/2017/01/18/pentestbrochure-final/

18/01/2017 www.pdf-archive.com

ijrte02020709 86%

Several vulnerability and security scanning tools are selected for the evaluation purpose.

https://www.pdf-archive.com/2011/08/13/ijrte02020709/

13/08/2011 www.pdf-archive.com

JDIT-2014-1118-009 85%

Journal of Diagnostic Imaging in Therapy.

https://www.pdf-archive.com/2017/05/30/jdit-2014-1118-009/

30/05/2017 www.pdf-archive.com

WWI strategy2015i 84%

It is clear that achieving many of the goals will be contingent on our collective ability to allocate, protect and use freshwater in ways which avoid depletion, degradation, conflict and vulnerability to climate change.

https://www.pdf-archive.com/2016/02/24/wwi-strategy2015i/

24/02/2016 www.pdf-archive.com

IFS-Ed - WB6 Proposal - FCO - 171018 84%

Theme Political Economic / financial Vulnerability Themes Detail Notes Strongly nationalist and/or Where appropriate / possible, allegedly corrupt political particular attention will be actors.

https://www.pdf-archive.com/2019/02/07/ifs-ed---wb6-proposal---fco---171018/

07/02/2019 www.pdf-archive.com

Queering Disaster Emergency Management - M.A. Cianfarani 84%

The literature review also explores the concepts of social vulnerability, capacity, and resilience with respect to sexual and gender diversity;

https://www.pdf-archive.com/2016/06/21/queering-disaster-emergency-management-m-a-cianfarani/

21/06/2016 www.pdf-archive.com