The service detects malicious signatures in analysed files, by scanning it with 57 different commercial anti-malware....

This service analyses sets of email file in .eml format to identify the unsolicited ones (SPAM). Moreover, the service...

The service analyzes a DNS request log and detects if there are domain names which can be generated by a Domain...

The main goal of the tool is to provide a simple and quick tool for cyber risk self-assessment. The tool requires two...


Published Description
21-07-2020 22:15:00
Lua through 5.4.0 has a getobjname heap-based buffer over-read because youngcollection in lgc.c uses markold for an insufficient number of list members.
21-07-2020 22:15:00
LuaJit through 2.1.0-beta3 has an out-of-bounds read because __gc handler frame traversal is mishandled.
21-07-2020 22:15:00
Lua through 5.4.0 mishandles the interaction between stack resizes and garbage collection, leading to a heap-based buffer overflow, heap-based buffer over-read, or use-after-free.
21-07-2020 18:15:00
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2015-3796. Reason: This candidate is a reservation duplicate of CVE-2015-3796. Notes: All CVE users should reference CVE-2015-3796 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
21-07-2020 18:15:00
In PrestaShop Dashboard Productions before version 2.1.0, there is improper authorization which enables an attacker to change the configuration. The problem is fixed in 2.1.0.