~/Cedric
Cedric is a member since Fri May 18 09:53:17 2018 and is the creator of the following object(s):
                            Use of an obsolete system Vulnerabilities
                        
                        
                    
                
                    
                        
                            Incorrect sizing (e.g. too much data for the maximum passband) Vulnerabilities
                        
                        
                    
                
                    
                        
                            Circulating information in clear text Vulnerabilities
                        
                        
                    
                
                    
                        
                            Use of an unsecured method of communication Vulnerabilities
                        
                        Is the method of communication encrypted?
Could third parties access the method of communication?
                    
                
                    
                        
                            No management of access authorisation Vulnerabilities
                        
                        
                    
                
                    
                        
                            The system does not allow the author of a modification to be identified Vulnerabilities
                        
                        
                    
                
                    
                        
                            No filtering system Vulnerabilities
                        
                        
                    
                
                    
                        
                            Use of an obsolete version of the messaging server Vulnerabilities
                        
                        
                    
                
                    
                        
                            The access system does not log tracks of its operation Vulnerabilities
                        
                        
                    
                
                    
                        
                            Possibility of subjecting the system to an unlimited number of requests Vulnerabilities
                        
                        
                    
                
            displaying 951 - 960 objects in total 5075