Vulnerability Reports

Our dedicated research team diligently explores software and operating system vulnerabilities, with the goal of identifying them before they can be exploited by malicious entities. We prioritize responsible disclosure, sharing our findings with vendors to facilitate the swift development of patches, ultimately aiding in safeguarding their customers against potential cyber threats.

Zero-Day Vulnerabilities

Pentraze Report IDVendor
PENTRAZE-2024-0119Grandstream
PENTRAZE-2023-11272Newland
PENTRAZE-2023-11271Newland
PENTRAZE-2023-1110Irontec

Disclosed Vulnerabilities

Pentraze Report IDVendorCVE NUMBER
PENTRAZE-2023-11222Gravity FormsCVE-2023-2707
PENTRAZE-2023-11221Gravity FormsCVE-2023-2705
PENTRAZE-2023-07112CitrixCVE-2023-24492
PENTRAZE-2023-07111CitrixCVE-2023-24491
PENTRAZE-2023-0703OpenCVCVE-2023-31990
PENTRAZE-2023-05265WiresharkCVE-2023-2858
PENTRAZE-2023-05264WiresharkCVE-2023-2857
PENTRAZE-2023-05263WiresharkCVE-2023-2856
PENTRAZE-2023-05262WiresharkCVE-2023-2855
PENTRAZE-2023-05261WiresharkCVE-2023-2854
PENTRAZE-2023-0509MaraDNSCVE-2023-31137
PENTRAZE-2023-0428SmartDNSCVE-2023-31470
PENTRAZE-2011-0903MicrosoftEDB-16940
PENTRAZE-2008-1222No-IPCVE-2008-5697
PENTRAZE-2007-0430FreePBXCVE-2007-2350
PENTRAZE-2007-0424FreePBXCVE-2007-2191

Services

Penetration Testing

Proactive assessment using tactics, techniques, and procedures of actual attackers to identify security flaws, incorrect configurations, and vulnerabilities.

Learn more

Application Security Testing

Comprehensive application protection, ensuring robust security throughout the entire software development lifecycle.

Learn more

Red Team Exercises

Simulate and emulate advanced cyber attacks to pinpoint vulnerabilities and test your organization's defense mechanisms, ensuring robust resilience against real-world threats.

Learn more

Vulnerability Management

Proactive process to identify, prioritize, and address security vulnerabilities in systems and software, enhancing an organization's defense against evolving cyber threats.

Learn more