Add an Access IP
This interface adds new IP addresses to a list of IP addresses that can access a Manage2 account.
This interface adds new IP addresses to a list of IP addresses that can access a Manage2 account.
This document lists third-party software and modifications that you can install to help secure your server.
The API Pickup Passphrases interface allows you to create and manage the pickup phrases to use when you authenticate with your Manage2 account.
This document describes some basic security concepts that you can use to protect your system from XSRF attacks.
This feature allows you to change the password for your Manage2 account.
This document describes how to manage cPHulk from the command line.
On Friday, November 24 2017, Exim announced two vulnerabilities in versions 4.88 and later.
We were made aware of a CVE in Dovecot Versions 2.0.14 - 2.3.5 that involves using Solr on Thursday, March 28th 2019.
On 27 January 2015, a vulnerability in all versions of the GNU C library (glibc) was announced by Qualys.
On July 25 2016, Perl announced a vulnerability in all versions of the Perl 5 software.
On Wednesday, March 2, 2016, Exim announced a vulnerability in all versions of the Exim software.
On Tuesday, May 3 2016, ImageMagick announced a vulnerability in all versions of the ImageMagick software. ImageMagick is a software package commonly used by web services to process images.
This document describes the Apache-disclosed vulnerability that affects application code which runs in CGI, or CGI-like environments.
On Sunday, December 25, 2016, Exim announced a vulnerability in versions 4.69 to 4.87 of the Exim software.
Red Hat has been made aware of multiple microarchitectural (hardware) implementation issues affecting many modern microprocessors, requiring updates to the Linux kernel, virtualization-related components, and/or in combination with a microcode update.
Exim maintainers announced that they received a report of a potential remote exploit in Exim from version 4.87 to version 4.91.
Hosting providers and system administrators can use this document to determine whether their systems have been compromised.
cPanel & WHM includes functionality to validate that you download all cPanel & WHM-delivered files in an uncorrupted state.
This document explains how to configure your Microsoft Windows® 7 workstation and Microsoft Outlook® 2010 mail clients to use Transport Layer Security (TLS) protocol version 1.2.
This document describes how to install the KernelCare software via the command line.