The service detects malicious signatures in analysed files, by scanning it with 57 different commercial anti-malware....

The main goal of the tool is to provide a simple and quick tool for cyber risk self-assessment. The tool requires two...

This service identifies typical ransomware behaviours such as file ciphering. Differently from signature-based anti-...

The service analyzes a DNS request log and detects if there are domain names which can be generated by a Domain...


Published Description
07-07-2020 22:15:00
An issue was discovered in CMSUno before 1.6.1. uno.php allows CSRF to change the admin password.
07-07-2020 21:15:00
A memory leak in Openthread's wpantund versions up to commit 0e5d1601febb869f583e944785e5685c6c747be7, when used in an environment where wpanctl is directly interfacing with the control driver (eg: debug environments) can allow an attacker to crash the service (DoS). We recommend updating, or to restrict access in your debug environments.
07-07-2020 21:15:00
Victor CMS through 2019-02-28 allows XSS via the register.php user_firstname or user_lastname field.
07-07-2020 20:15:00
A SQLi exists in the probe code of all Connectwise Automate versions before 2020.7 or 2019.12. A SQL Injection in the probe implementation to save data to a custom table exists due to inadequate server side validation. As the code creates dynamic SQL for the insert statement and utilizes the user supplied table name with little validation, the table name can be modified to allow arbitrary update commands to be run. Usage of other SQL injection techniques such as timing attacks, it is possible to perform full data extraction as well. Patched in 2020.7 and in a hotfix for 2019.12.
07-07-2020 20:15:00
Code42 environments with on-premises server versions 7.0.4 and earlier allow for possible remote code execution. When an administrator creates a local (non-SSO) user via a Code42-generated email, the administrator has the option to modify content for the email invitation. If the administrator entered template language code in the subject line, that code could be interpreted by the email generation services, potentially resulting in server-side code injection.