Knowledge Base - Issues

Our knowledge-base provides a comprehensive collection of information on vulnerabilities related to cyber security.

/ Outdated Operating Systems

Outdated operating systems is an IT vulnerability categorized under patch management in the CWE directory (CWE-749). It is also classified as a vulnerability in the OWASP Testing Guide under the 'Infrastructure' category. Outdated operating systems are versions of operating systems that are no longer supported by their respective vendors and...

/ Outdated Software

Outdated software is a type of IT vulnerability which is categorized as a patch management issue. It is defined as the use of old and unsupported software, which can contain critical security flaws that attackers can exploit. The Open Web Application Security Project (OWASP) Testing Guide recommends that software is...
Publicly reported vulnerabilities are security flaws reported by third parties or publicly available sources such as the Common Vulnerabilities and Exposures (CVE) directory. These vulnerabilities can affect Web and API, Infrastructure, and Mobile App systems. They are identified and classified according to the Common Weakness Enumeration (CWE) directory and the...

/ Usage of SSL Version 2 and 3

Usage of SSL Version 2 and 3 is a vulnerability related to **Patch Management**. This vulnerability affects **Web and API** systems. ## Risk The risk associated with this vulnerability is high and can lead to **data theft, data modification, and data tampering**. A risk assessment should be conducted to evaluate the...
Vulnerable JavaScript Dependency is a type of software vulnerability related to the use of third-party JavaScript libraries. This type of vulnerability occurs when an application uses JavaScript libraries that have been published to public repositories, such as the Common Vulnerabilities and Exposures (CVE) directory. This type of vulnerability is a...
Showing entries 1 to 5 of 5 entries.