Search : 227033 résultats
7.8 CVE-2021-21551
Dell dbutil_2_3.sys driver contains an insufficient access control vulnerability which may lead to escalation...
8.8 CVE-2023-0506
The web service of ByDemes Group Airspace CCTV Web Service in its 2.616.BY00.11 version, contains a...
7.5 CVE-2023-3349
Information exposure vulnerability in IBERMATICA RPS 2019, which exploitation could allow an unauthenticated...
6.5 CVE-2023-2544
Authorization bypass vulnerability in UPV PEIX, affecting the component "pdf_curri_new.php"....
8.8 CVE-2023-27435
Cross-Site Request Forgery (CSRF) vulnerability in Sami Ahmed Siddiqui HTTP Auth plugin <= 0.3.2...
7.5 CVE-2023-4883
Invalid pointer release vulnerability. Exploitation of this vulnerability could allow an attacker to...
7.5 CVE-2023-4882
DOS vulnerability that could allow an attacker to register a new VNF (Virtual Network Function) value....
7.5 CVE-2023-3350
A Cryptographic Issue vulnerability has been found on IBERMATICA RPS, affecting version 2019. By firstly...
5.9 CVE-2023-4885
Man in the Middle vulnerability, which could allow an attacker to intercept VNF (Virtual Network Function)...
7.5 CVE-2023-4884
An attacker could send an HTTP request to an Open5GS endpoint and retrieve the information stored on...
4.4 CVE-2023-4886
A sensitive information exposure vulnerability was found in foreman. Contents of tomcat's server.xml...
4.8 CVE-2023-4564
This vulnerability could allow an attacker to store a malicious JavaScript payload in the broadcast...
What is the Sherlock® KB project?
First of all KB for "Knowledge Base". The company ProHacktive is making its database of known vulnerabilities to date available for free. This database combines Nist's CVE database (https://nvd.nist.gov/), the CWE database (https://cwe.mitre.org/) and the CAPEC database (https://capec.mitre.org/).
For what purpose?
ProHacktive's promise is the democratization of the Cybersecurity Audit. For this, it seemed relevant to us to offer our "Knowledge Base" in different languages. Associated with this multilingual database, a clear and concise interface allows you to consult all the CVE ("Common Vulnerabilities and Exposures") present on your network. The Sherlock® service database is updated every hour from the various sources enriching our Sherlock® KB and immediately tested on the devices concerned by the new vulnerability.
Search for vulnerabilities
We also offer a simple search module in the description of each CVE. For the more curious, an advanced search allows you to point precisely to an application, an OS or a hardware. This advanced search is based on the mechanics used in our solution Sherlock®: the permanent Cybersecurity audit accessible financially and technically to all.
Developments?
We will add new languages regularly. A monitoring module will be implemented: you will be able to monitor an application, an OS or a hardware to be alerted of new vulnerabilities concerning it. Subscribe to our mailing list to be alerted when this feature is released (available on search results).