NEWS

There are no events to display

SERVICES

The service detects malicious signatures in analysed files, by scanning it with 57 different commercial anti-malware....

This service analyses sets of email file in .eml format to identify the unsolicited ones (SPAM). Moreover, the service...

The main goal of the tool is to provide a simple and quick tool for cyber risk self-assessment. The tool requires two...

This service offers the possibility of searching public domain information related to known security hardware and...

LATEST CVE

Published Description
CVE-2019-12115
18-03-2020 19:15:00
An issue was discovered in ONAP SDC through Dublin. By accessing port 4000 of demo-sdc-sdc-be pod, an unauthenticated attacker (who already has access to pod-to-pod communication) may execute arbitrary code inside that pod. All ONAP Operations Manager (OOM) setups are affected.
CVE-2020-10659
18-03-2020 02:15:00
Entrust Entelligence Security Provider (ESP) before 10.0.60 on Windows mishandles errors during SSL Certificate Validation, leading to situations where (for example) a user continues to interact with a web site that has an invalid certificate chain.
CVE-2020-8599
18-03-2020 01:15:00
Trend Micro Apex One (2019) and OfficeScan XG server contain a vulnerable EXE file that could allow a remote attacker to write arbitrary data to an arbitrary path on affected installations and bypass ROOT login. Authentication is not required to exploit this vulnerability.
CVE-2020-8468
18-03-2020 01:15:00
Trend Micro Apex One (2019), OfficeScan XG and Worry-Free Business Security (9.0, 9.5, 10.0) agents are affected by a content validation escape vulnerability which could allow an attacker to manipulate certain agent client components. An attempted attack requires user authentication.
CVE-2020-8598
18-03-2020 01:15:00
Trend Micro Apex One (2019), OfficeScan XG and Worry-Free Business Security (9.0, 9.5, 10.0) server contains a vulnerable service DLL file that could allow a remote attacker to execute arbitrary code on affected installations with SYSTEM level privileges. Authentication is not required to exploit this vulnerability.

Pages

LATEST EXPLOIT

Date Title Platform Author
10-02-2020
OpenSMTPD - MAIL FROM Remote Code Execution (Metasploit) linux Metasploit
10-02-2020
LearnDash WordPress LMS Plugin 3.1.2 - Reflective Cross-Site Scripting php Jinson Varghese Behanan
10-02-2020
Wedding Slideshow Studio 1.36 - 'Key' Buffer Overflow windows ZwX
10-02-2020
Dota 2 7.23f - Denial of Service (PoC) windows Bogdan Kurinnoy
10-02-2020
Ricoh Driver - Privilege Escalation (Metasploit) windows Metasploit

Pages