Tech Articles

List of all Vulnerability Databases Resources – 2018 Compilation

1. Common Vulnerabilities and Exposures (CVE)  CVE (Common Vulnerability and Exposures) is a list of entries, each containing an identification number, a description, and at least one public reference – for publicly known cyber security vulnerabilities. CVE Entries are used in numerous cyber security products and services from around the world, including the U.S. National […]

Tech Articles

Mitigations for Common Web Application Flaws

The most prominent components of web applications that intruders will first seek to exploit are vulnerabilities within the web platform. The web platform commonly includes: Web server software (such as IIS or Apache). Extensions to the web server, such as ISAPI filters and extensions, or Apache modules. Dynamic execution environments like ASP.NET, PHP, and J2EE […]