Trending Vulnerability Assessment Discussions

Follow

Ask the Community


Ask any professional question and get answers from other specialists.

Stream language
Abdulaziz Alharbi's image
Question added by Abdulaziz Alharbi IT Security Specialist Sentient Vision System & RMIT
9 years ago
Answers:
29
Followers:
Views:
354
Vote Count:
0
Answer should contain a minimum of 25 characters.
rahul mohan's image
Question added by rahul mohan Security Manager Gemfields Limited
10 years ago
Answers:
2
Followers:
Views:
56
Vote Count:
0
Answer should contain a minimum of 25 characters.
Abdulaziz Alharbi's image  
Answer added by  Abdulaziz Alharbi, IT Security Specialist, Sentient Vision System & RMIT
9 years ago

A vulnerability is a flaw in a system, or part of the system, that could provide an attacker with a way to bypass the security infrastructure of the host operating system ... See More

Hatem Abdullah alamri's image  
Answer added by  Hatem Abdullah alamri, Senior IT Strategic Planning Analyst \Head of ITSMS committee , Taibah University
7 years ago

brief about 'Bad Rabbit' 'Bad Rabbit' has planted on legitimate websites and appeared as Flash player update installer. it is preventable attacks as t ... See More

Romi Syuhada's image  
Answer added by  Romi Syuhada, senior security consultant, Xtremax Pte Ltd
2 years ago

there is no guarantee that the vulnerability has an exploit as POC, but if an exploit exist, there is a vulnerability or more that is used to gain the action intended 

Kassem Al Khatib's image  
Answer added by  Kassem Al Khatib, IT Manager / ERP, Al Brooge Securities
9 years ago

hiii, you can exploit the vulnerability of system to attack/hack it

Nikolay Stefanov's image  
Answer added by  Nikolay Stefanov, Senior Expert IT, directorate of Information and Communication Technologies, Bulgarian Posts plc
7 years ago

Recommended: Used  at newest updates and OS latest version Windows 10. - Do not install any update for flash player from any website even if it legitimate. - If we in a c ... See More

Muhammad Nishaf Zahid's image  
Answer added by  Muhammad Nishaf Zahid, Trainee Network Engineer, DHA
7 years ago

Following are the solutions !) Real Time updates detect injections on websites compromised to serve the attack 2) URL categorization for domains and strings that are host ... See More