How can we help?
-
Dictionary
- API
- Authentication Bypass
- Blind SQL injection
- Broken Access Control
- Broken Authentication
- Brute-Force Attack
- Caching
- Captcha
- Certificate Authority (CA)
- Clickjacking
- Client-Side
- Cross-Site Request Forgery (CSRF)
- Cross-Site Scripting (XSS)
- Dark Web
- Denial of Service (DoS)
- Distributed Denial of Service (DDoS)
- DNS
- DNS Amplification Attack
- Domain Administrator (DA)
- Encryption
- End of Life (EOL)
- Ethical Hacking
- Expired Certificate
- HTTP
- HTTPS
- Incident Response (IR)
- Injection
- Insufficient Logging & Monitoring
- Internal IP Address
- IoT
- IP Address
- Man in the Middle Attack (MiTM)
- Open Source Intelligence (OSINT)
- Patching
- Pentest
- Phishing
- Ransomware
- Red Team Test
- Security Misconfiguration
- Server-Side
- Session Expiration / Session Timeout
- Session Hijacking
- Session Token
- Smishing
- SMTP
- Spoof
- SQL Injection (SQLi)
- VPN
- Vulnerable and Outdated Components
- XML External Entities (XXE)
- Show remaining articles (35) Collapse articles
< All topics
Print
End of Life (EOL)
Software and hardware reach end of life when vendors discontinue supporting the products and releasing patches. End of Life software presents an ever increasing risk because it is no longer patched against emerging threats.
Table of contents