Health.Zone Web Search

  1. Ad

    related to: microsoft exchange server vulnerability

Search results

  1. Results from the Health.Zone Content Network
  2. Internet Information Services - Wikipedia

    en.wikipedia.org/wiki/Internet_Information_Services

    IIS 4 and IIS 5 were affected by the CA-2001-13 security vulnerability which led to the infamous Code Red attack; [53] [54] however, both versions 6.0 and 7.0 have no reported issues with this specific vulnerability. [55] In IIS 6.0 Microsoft opted to change the behaviour of pre-installed ISAPI handlers, [56] many of which were culprits in the ...

  3. XZ Utils backdoor - Wikipedia

    en.wikipedia.org/wiki/XZ_Utils_backdoor

    In February 2024, a malicious backdoor was introduced to the Linux utility xz within the liblzma library in versions 5.6.0 and 5.6.1 by an account using the name "Jia Tan". [b] [2] The backdoor gives an attacker who possesses a specific Ed448 private key remote code execution capabilities on the affected Linux system.

  4. Extensible Authentication Protocol - Wikipedia

    en.wikipedia.org/wiki/Extensible_Authentication...

    When automatic PAC provisioning is enabled, EAP-FAST has a vulnerability where an attacker can intercept the PAC and use that to compromise user credentials. This vulnerability is mitigated by manual PAC provisioning or by using server certificates for the PAC provisioning phase. It is worth noting that the PAC file is issued on a per-user basis.

  5. Thunderspy - Wikipedia

    en.wikipedia.org/wiki/Thunderspy

    Thunderspy is a type of security vulnerability, based on the Intel Thunderbolt 3 port, first reported publicly on 10 May 2020, that can result in an evil maid (i.e., attacker of an unattended device) attack gaining full access to a computer's information in about five minutes, and may affect millions of Apple, Linux and Windows computers, as well as any computers manufactured before 2019, and ...

  6. Point-to-Point Tunneling Protocol - Wikipedia

    en.wikipedia.org/wiki/Point-to-Point_Tunneling...

    PPTP has been the subject of many security analyses and serious security vulnerabilities have been found in the protocol. The known vulnerabilities relate to the underlying PPP authentication protocols used, the design of the MPPE protocol as well as the integration between MPPE and PPP authentication for session key establishment. [2] [3] [4] [5]

  7. Transport Layer Security - Wikipedia

    en.wikipedia.org/wiki/Transport_Layer_Security

    Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network. The protocol is widely used in applications such as email, instant messaging, and voice over IP, but its use in securing HTTPS remains the most publicly visible.

  8. Common Vulnerabilities and Exposures - Wikipedia

    en.wikipedia.org/wiki/Common_Vulnerabilities_and...

    The Common Vulnerabilities and Exposures (CVE) system provides a reference method for publicly known information-security vulnerabilities and exposures. [1] The United States' National Cybersecurity FFRDC, operated by The MITRE Corporation, maintains the system, with funding from the US National Cyber Security Division of the US Department of Homeland Security. [2]

  9. Directory traversal attack - Wikipedia

    en.wikipedia.org/wiki/Directory_traversal_attack

    A directory traversal (or path traversal) attack exploits insufficient security validation or sanitization of user-supplied file names, such that characters representing "traverse to parent directory" are passed through to the operating system's file system API.

  1. Ad

    related to: microsoft exchange server vulnerability