Vulnerability Reports

Our dedicated research team diligently explores software and operating system vulnerabilities, prioritizing responsible disclosure with the goal of identifying them before they can be exploited by malicious entities.

Vulnerability Reports

Zero-Day Vulnerabilities

VENDORCVSSREPORT DATE
OSSEC8.1Apr 1, 2024

Published Techniques

VENDORREPORT IDREPORT DATE
Multiple EDRsPTRZ-2024-0306Mar 6, 2024
MicrosoftPTRZ-2024-0225Feb 25, 2024
HashiCorpPTRZ-2024-0104Jan 4, 2024
MicrosoftPTRZ-2023-1025Oct 25, 2023
GNU C Library (glibc)PTRZ-2023-0425Apr 25, 2023

Disclosed Vulnerabilities

VENDORCVECVSSREPORT DATE
Nimble CommanderCVE-2024-70628.8Jul 24, 2024
WebkulCVE-2024-091610.0Apr 25, 2024
IrontecCVE-2024-31209.0Apr 5, 2024
IrontecCVE-2024-31199.0Apr 4, 2024
WazuhCVE-2024-12438.1Feb 7, 2024
GrandstreamCVE-2023-500158.0Dec 4, 2023
Newland EMEACVE-2023-493408.8Nov 27, 2023
Newland EMEACVE-2023-493416.5Nov 27, 2023
gAppointmentsCVE-2023-27073.5Oct 31, 2023
gAppointmentsCVE-2023-27057.1Aug 21, 2023
CitrixCVE-2023-244917.8Jul 11, 2023
CitrixCVE-2023-244928.8Jul 11, 2023
OpenCVCVE-2023-319909.0Jul 3, 2023
WiresharkCVE-2023-28559.0May 26, 2023
WiresharkCVE-2023-28569.0May 26, 2023
WiresharkCVE-2023-28579.0May 26, 2023
WiresharkCVE-2023-28589.0May 26, 2023
WiresharkCVE-2023-28549.0May 22, 2023
MaraDNSCVE-2023-311377.5May 9, 2023
SmartDNSCVE-2023-314709.8Apr 21, 2023
MicrosoftEDB-169409.6Mar 8, 2011
No-IPCVE-2008-52977.6Dec 1, 2008
FreePBXCVE-2007-23506.5Apr 30, 2007
FreePBXCVE-2007-21916.5Apr 24, 2007

Services

Penetration Testing

Proactive assessment using tactics, techniques, and procedures of actual attackers to identify security flaws, incorrect configurations, and vulnerabilities.

Learn more

Application Security Testing

Comprehensive application protection, ensuring robust security throughout the entire software development lifecycle.

Learn more

Red Team Exercises

Simulate and emulate advanced cyber attacks to pinpoint vulnerabilities and test your organization's defense mechanisms, ensuring robust resilience against real-world threats.

Learn more

Vulnerability Management

Proactive process to identify, prioritize, and address security vulnerabilities in systems and software, enhancing an organization's defense against evolving cyber threats.

Learn more