Il servizio offre una piattaforma che consente ai Registrar di verificare eventuali problemi di performance e sicurezza...

Il servizio si prefigge di individuare comportamenti tipici dei ransomware quali, ad esempio, la cifratura di una...

Il servizio mostra una rappresentazione 3D del traffico di rete relativo ad attacchi ad una honeypot a Pisa. Inoltre,...

Il servizio analizza un log di richieste DNS e identifica se all’interno sono stati risolti dei nomi a dominio che...


Published Description
02-11-2020 22:15:00
This affects all versions of package droppy. It is possible to traverse directories to fetch configuration files from a droopy server.
02-11-2020 22:15:00
NeDi 1.9C allows pwsec.php oid XSS.
02-11-2020 22:15:00
This affects all versions of package browserless-chrome. User input flowing from the workspace endpoint gets used to create a file path filePath and this is fetched and then sent back to a user. This can be escaped to fetch arbitrary files from a server.
02-11-2020 22:15:00
NeDi 1.9C allows inc/rt-popup.php d XSS.
02-11-2020 22:15:00
In Legion of the Bouncy Castle BC before 1.55 and BC-FJA before, attackers can obtain sensitive information about a private exponent because of Observable Differences in Behavior to Error Inputs. This occurs in org.bouncycastle.crypto.encodings.OAEPEncoding. Sending invalid ciphertext that decrypts to a short payload in the OAEP Decoder could result in the throwing of an early exception, potentially leaking some information about the private exponent of the RSA private key performing the encryption.