NEWS

There are no events to display

SERVICES

The service aims at offering a representation of the  Cybersecurity domain through the creation of a controlled...

The service shows a 3D representation of network traffic related to attacks on a honeypot in Pisa. In addition, the...

The service offers a platform that allows Registrars to check for any performance and security problems present on...

This service shows statistics related to Tweets related to Cyber-Security, allowing to search them by keywords such as...

LATEST CVE

Published Description
CVE-2019-9717
19-09-2019 17:15:10
In Libav 12.3, a denial of service in the subtitle decoder allows attackers to hog the CPU via a crafted video file in Matroska format, because srt_to_ass in libavcodec/srtdec.c has a complex format argument to sscanf.
CVE-2019-9619
19-09-2019 16:15:11
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
CVE-2019-16525
19-09-2019 16:15:11
An XSS issue was discovered in the checklist plugin before 1.1.9 for WordPress. The fill parameter is not correctly filtered in the checklist-icon.php file, and it is possible to inject JavaScript code.
CVE-2019-14821
19-09-2019 14:15:10
An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein write indices 'ring->first' and 'ring->last' value could be supplied by a host user-space process. An unprivileged host user or process with access to '/dev/kvm' device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.
CVE-2019-15033
19-09-2019 13:15:12
Pydio 6.0.8 allows Authenticated SSRF during a Remote Link Feature download. An attacker can specify an intranet address in the file parameter to index.php, when sending a file to a remote server, as demonstrated by the file=http%3A%2F%2F192.168.1.2 substring.

Pages