Search : 226498 résultats
8.8 CVE-2023-39434
A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17...
6.5 CVE-2023-39233
The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. Processing web...
7.8 CVE-2023-36874
Windows Error Reporting Service Elevation of Privilege Vulnerability
8.8 CVE-2023-4934
Authorization Bypass Through User-Controlled Key vulnerability in Usta AYBS allows Authentication Abuse,...
9.8 CVE-2023-44172
SeaCMS V12.9 was discovered to contain an arbitrary file write vulnerability via the component admin_weixin.php....
9.8 CVE-2023-44171
SeaCMS V12.9 was discovered to contain an arbitrary file write vulnerability via the component admin_smtp.php....
9.8 CVE-2023-44170
SeaCMS V12.9 was discovered to contain an arbitrary file write vulnerability via the component admin_ping.php....
9.8 CVE-2023-44169
SeaCMS V12.9 was discovered to contain an arbitrary file write vulnerability via the component admin_notify.php....
9.8 CVE-2023-43222
SeaCMS v12.8 has an arbitrary code writing vulnerability in the /jxz7g2/admin_ping.php file.
9.8 CVE-2023-43216
SeaCMS V12.9 was discovered to contain an arbitrary file write vulnerability via the component admin_ip.php....
8.8 CVE-2018-17700
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of...
6.5 CVE-2020-36023
An issue was discovered in freedesktop poppler version 20.12.1, allows remote attackers to cause a denial...
What is the Sherlock® KB project?
First of all KB for "Knowledge Base". The company ProHacktive is making its database of known vulnerabilities to date available for free. This database combines Nist's CVE database (https://nvd.nist.gov/), the CWE database (https://cwe.mitre.org/) and the CAPEC database (https://capec.mitre.org/).
For what purpose?
ProHacktive's promise is the democratization of the Cybersecurity Audit. For this, it seemed relevant to us to offer our "Knowledge Base" in different languages. Associated with this multilingual database, a clear and concise interface allows you to consult all the CVE ("Common Vulnerabilities and Exposures") present on your network. The Sherlock® service database is updated every hour from the various sources enriching our Sherlock® KB and immediately tested on the devices concerned by the new vulnerability.
Search for vulnerabilities
We also offer a simple search module in the description of each CVE. For the more curious, an advanced search allows you to point precisely to an application, an OS or a hardware. This advanced search is based on the mechanics used in our solution Sherlock®: the permanent Cybersecurity audit accessible financially and technically to all.
Developments?
We will add new languages regularly. A monitoring module will be implemented: you will be able to monitor an application, an OS or a hardware to be alerted of new vulnerabilities concerning it. Subscribe to our mailing list to be alerted when this feature is released (available on search results).