Knowledge Base - Issues

Our knowledge-base provides a comprehensive collection of information on vulnerabilities related to cyber security.

/ Outdated Operating Systems

Outdated operating systems is an IT vulnerability categorized under patch management in the CWE directory (CWE-749). It is also classified as a vulnerability in the OWASP Testing Guide under the 'Infrastructure' category. Outdated operating systems are versions of operating systems that are no longer supported by their respective vendors and...

/ Outdated Software

Outdated software is a type of IT vulnerability which is categorized as a patch management issue. It is defined as the use of old and unsupported software, which can contain critical security flaws that attackers can exploit. The Common Weakness Enumeration (CWE) directory has classified this vulnerability as CWE-749: Expired...

/ PHP Multiple Vulnerabilities

PHP Multiple Vulnerabilities, commonly referred to as CVE-2015-3152, is a Patch Management vulnerability that can occur in Web and API applications. This vulnerability allows attackers to execute arbitrary code, gain access to sensitive information, and potentially take control of a system. It is categorized as CWE-20, Improper Input Validation. According...
Publicly reported vulnerabilities are security flaws reported by third parties or publicly available sources such as the Common Vulnerabilities and Exposures (CVE) directory. These vulnerabilities can affect Web and API, Infrastructure, and Mobile App systems. They are identified and classified according to the Common Weakness Enumeration (CWE) directory and the...

/ Usage of SSL Version 2 and 3

Usage of SSL Version 2 and 3 is a vulnerability related to **Patch Management**. It is classified in the [Common Weakness Enumeration (CWE)](https://cwe.mitre.org/data/definitions/295.html) directory as CWE-295: Improper Certificate Validation. This vulnerability affects **Web and API** systems. According to the [OWASP Testing Guide](https://owasp.org/www-project-web-security-testing-guide/v3/4_Certificates_and_Authentication/02_Certificate_Validation_Testing.html), it occurs when the system relies on certificates...

/ Use of Deprecated Component

Vulnerable JavaScript Dependency is a type of software vulnerability related to the use of third-party JavaScript libraries. This type of vulnerability occurs when an application uses JavaScript libraries that have been published to public repositories, such as the Common Vulnerabilities and Exposures (CVE) directory. This type of vulnerability is a...
Showing entries 1 to 7 of 7 entries.