6.5 CVE-2022-3551
A vulnerability, which was classified as problematic, has been found in X.org Server. Affected by this...

2022-11-24 04:15:00

8.8 CVE-2022-3550
A vulnerability classified as critical was found in X.org Server. Affected by this vulnerability is...

2022-11-24 04:15:00

9.9 CVE-2022-34827
Carel Boss Mini 1.5.0 has Improper Access Control.

2022-11-24 04:10:00

7.5 CVE-2022-38871
In Free5gc v3.0.5, the AMF breaks due to malformed NAS messages.

2022-11-24 04:01:00

7.1 CVE-2022-42327
x86: unintended memory sharing between guests On Intel systems that support the "virtualize APIC...

2022-11-24 03:15:00

5.5 CVE-2022-42326
Xenstore: Guests can create arbitrary number of nodes via transactions T[his CNA information record...

2022-11-24 03:15:00

5.5 CVE-2022-42325
Xenstore: Guests can create arbitrary number of nodes via transactions T[his CNA information record...

2022-11-24 03:15:00

5.5 CVE-2022-42324
Oxenstored 32->31 bit integer truncation issues Integers in Ocaml are 63 or 31 bits of signed precision....

2022-11-24 03:15:00

5.5 CVE-2022-42323
Xenstore: Cooperating guests can create arbitrary numbers of nodes T[his CNA information record relates...

2022-11-24 03:15:00

5.5 CVE-2022-42322
Xenstore: Cooperating guests can create arbitrary numbers of nodes T[his CNA information record relates...

2022-11-24 03:15:00

6.5 CVE-2022-42321
Xenstore: Guests can crash xenstored via exhausting the stack Xenstored is using recursion for some...

2022-11-24 03:15:00

7 CVE-2022-42320
Xenstore: Guests can get access to Xenstore nodes of deleted domains Access rights of Xenstore nodes...

2022-11-24 03:15:00

What is the Sherlock® KB project?

First of all KB for "Knowledge Base". The company ProHacktive is making its database of known vulnerabilities to date available for free. This database combines Nist's CVE database (https://nvd.nist.gov/), the CWE database (https://cwe.mitre.org/) and the CAPEC database (https://capec.mitre.org/).

For what purpose?

ProHacktive's promise is the democratization of the Cybersecurity Audit. For this, it seemed relevant to us to offer our "Knowledge Base" in different languages. Associated with this multilingual database, a clear and concise interface allows you to consult all the CVE ("Common Vulnerabilities and Exposures") present on your network. The Sherlock® service database is updated every hour from the various sources enriching our Sherlock® KB and immediately tested on the devices concerned by the new vulnerability.

Search for vulnerabilities

We also offer a simple search module in the description of each CVE. For the more curious, an advanced search allows you to point precisely to an application, an OS or a hardware. This advanced search is based on the mechanics used in our solution Sherlock®: the permanent Cybersecurity audit accessible financially and technically to all.

Developments?

We will add new languages regularly. A monitoring module will be implemented: you will be able to monitor an application, an OS or a hardware to be alerted of new vulnerabilities concerning it. Subscribe to our mailing list to be alerted when this feature is released (available on search results).