Vulnerability Reports
Our dedicated research team diligently explores software and operating system vulnerabilities, prioritizing responsible disclosure with the goal of identifying them before they can be exploited by malicious entities.
Our dedicated research team diligently explores software and operating system vulnerabilities, prioritizing responsible disclosure with the goal of identifying them before they can be exploited by malicious entities.
VENDOR | CVSS | REPORT DATE |
---|---|---|
OSSEC | 8.1 | Apr 1, 2024 |
VENDOR | REPORT ID | REPORT DATE |
---|---|---|
Multiple EDRs | PTRZ-2024-0306 | Mar 6, 2024 |
Microsoft | PTRZ-2024-0225 | Feb 25, 2024 |
HashiCorp | PTRZ-2024-0104 | Jan 4, 2024 |
Microsoft | PTRZ-2023-1025 | Oct 25, 2023 |
GNU C Library (glibc) | PTRZ-2023-0425 | Apr 25, 2023 |
VENDOR | CVE | CVSS | REPORT DATE |
---|---|---|---|
Nimble Commander | CVE-2024-7062 | 8.8 | Jul 24, 2024 |
Webkul | CVE-2024-0916 | 10.0 | Apr 25, 2024 |
Irontec | CVE-2024-3120 | 9.0 | Apr 5, 2024 |
Irontec | CVE-2024-3119 | 9.0 | Apr 4, 2024 |
Wazuh | CVE-2024-1243 | 8.1 | Feb 7, 2024 |
Grandstream | CVE-2023-50015 | 8.0 | Dec 4, 2023 |
Newland EMEA | CVE-2023-49340 | 8.8 | Nov 27, 2023 |
Newland EMEA | CVE-2023-49341 | 6.5 | Nov 27, 2023 |
gAppointments | CVE-2023-2707 | 3.5 | Oct 31, 2023 |
gAppointments | CVE-2023-2705 | 7.1 | Aug 21, 2023 |
Citrix | CVE-2023-24491 | 7.8 | Jul 11, 2023 |
Citrix | CVE-2023-24492 | 8.8 | Jul 11, 2023 |
OpenCV | CVE-2023-31990 | 9.0 | Jul 3, 2023 |
Wireshark | CVE-2023-2855 | 9.0 | May 26, 2023 |
Wireshark | CVE-2023-2856 | 9.0 | May 26, 2023 |
Wireshark | CVE-2023-2857 | 9.0 | May 26, 2023 |
Wireshark | CVE-2023-2858 | 9.0 | May 26, 2023 |
Wireshark | CVE-2023-2854 | 9.0 | May 22, 2023 |
MaraDNS | CVE-2023-31137 | 7.5 | May 9, 2023 |
SmartDNS | CVE-2023-31470 | 9.8 | Apr 21, 2023 |
Microsoft | EDB-16940 | 9.6 | Mar 8, 2011 |
No-IP | CVE-2008-5297 | 7.6 | Dec 1, 2008 |
FreePBX | CVE-2007-2350 | 6.5 | Apr 30, 2007 |
FreePBX | CVE-2007-2191 | 6.5 | Apr 24, 2007 |
Proactive assessment using tactics, techniques, and procedures of actual attackers to identify security flaws, incorrect configurations, and vulnerabilities.
Comprehensive application protection, ensuring robust security throughout the entire software development lifecycle.
Simulate and emulate advanced cyber attacks to pinpoint vulnerabilities and test your organization's defense mechanisms, ensuring robust resilience against real-world threats.
Proactive process to identify, prioritize, and address security vulnerabilities in systems and software, enhancing an organization's defense against evolving cyber threats.