This service collects data related to public available exploits. The database is updated daily through the official...

The main goal of the tool is to provide a simple and quick tool for cyber risk self-assessment. The tool requires two...

The service offers a platform that allows Registrars to check for any performance and security problems present on...

The service offers a survey to check the compliance of an organization with the GDPR (General Data Protection...


Published Description
16-05-2019 15:29:05
An elevation of privilege vulnerability exists in Microsoft Azure Active Directory Connect build, which allows an attacker to execute two PowerShell cmdlets in context of a privileged account, and perform privileged actions.To exploit this, an attacker would need to authenticate to the AzureÂ? AD Connect server, aka 'Microsoft Azure AD Connect Elevation of Privilege Vulnerability'.
16-05-2019 15:29:05
A security feature bypass vulnerability exists when urlmon.dll improperly handles certain Mark of the Web queries, aka 'Internet Explorer Security Feature Bypass Vulnerability'.
16-05-2019 15:29:05
A denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka 'ASP.NET Core Denial of Service Vulnerability'.
16-05-2019 15:29:05
A denial of service vulnerability exists when .NET Framework or .NET Core improperly handle web requests, aka '.Net Framework and .Net Core Denial of Service Vulnerability'. This CVE ID is unique from CVE-2019-0820, CVE-2019-0980.
16-05-2019 15:29:05
It was found that in ghostscript some privileged operators remained accessible from various places after the CVE-2019-6116 fix. A specially crafted PostScript file could use this flaw in order to, for example, have access to the file system outside of the constrains imposed by -dSAFER. Ghostscript versions before 9.28 are vulnerable.