Skip to main content

Home/ Online Tools/ Group items tagged vulnerability

Rss Feed Group items tagged

yc c

OVAL definition, object, state, test search - 1 views

  •  
    Looking for OVAL (Open Vulnerability and Assessment Language) definitions? http://www.itsecdb.com allows you to view exact details of OVAL(Open Vulnerability and Assessment Language) definitions and see exactly what you should do to verify a vulnerability. It is fully integrated with cvedetails so you will be able to see OVAL definitions related to a product or a CVE entry.
Janos Haits

Vulnerability, CDR and Antivirus APIs | Metadefender - 2 views

  •  
    "Select or drop a file up to 140 MB in size for malware analysis, vulnerability check, and data sanitization (CDR; Content Disarm and Reconstruction)."
Janos Haits

IT Security Database. OVAL patch, vulnerability, compliance definitions data source - 1 views

  •  
    "This site collects OVAL(Open Vulnerability and Assessment Language) definitions from several sources like Mitre, Red Hat, Suse, NVD, Apache etc and provides a unified, easy to use web interface to all IT security related items including patches, vulnerabilities and compliance checklists."
Janos Haits

CVE security vulnerability database. Security vulnerabilities, exploits, references and... - 2 views

  •  
    "Looking for OVAL (Open Vulnerability and Assessment Language) definitions? http://www.itsecdb.com allows you to view exact details of OVAL(Open Vulnerability and Assessment Language) definitions and see exactly what you should do to verify a vulnerability. It is fully integrated with cvedetails so you will be able to see OVAL definitions related to a product or a CVE entry. "
Janos Haits

Web Vulnerability Scanner and Security Testing Tools - 1 views

  •  
    "Web Security Tool Market. Cutting-edge, web security tools at your fingertips"
Janos Haits

Heartbleed Bug - 6 views

  •  
    "The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users."
  •  
    Are concerned with an individual's need for love and affection. The majority of people want to feel that they belong to a group. http://adfme.com/rc5O1C
Search and More

Network security( Penetration testing) : cyber-crime is costing the UK's small businesses - 0 views

  •  
    It's a well-known fact that small businesses are more susceptible to cyber-crime than many of their larger counterparts. A lack of funding and resources means that few small to medium-sized businesses can afford to pay for vulnerability assessments or penetration testing of their network security.
1 - 8 of 8
Showing 20 items per page