Vulnerability Audit Reports

Check our regular Vulnerability Audit Reports blog posts.

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Blog Articles

Combined Vulnerability Report Q1 2019

This report will provide an overview of the vulnerability updates we released in Q1 of 2019. If your asset has software on it which had a vulnerability we reported on in Q1, it will display whether th...

7 Comments

Firefox 67 Critical Security Issue

Hi everyone,Mozilla released a new Firefox and Firefox ESR version yesterday which also included fixes for a list of vulnerabilities. More information about the vulnerabilities can be found on our blo...

2 Comments

INTEL-SA-00233 "Zombieload/RIDL/Fallout"

Intel, along with all major operating system manufactures released security advisories regarding the Zombieload, RIDL and Fallout vulnerabilities or CVE-2018-12126, CVE-2018-12127, CVE-2018-12130. You...

8 Comments

Nvidia GPU Display Driver Vulnerability

Nvidia released new drivers for most of it's products last week in light of the new security bulletin it released. To help indetify devices in your network that might be at risk, we've created a repor...

11 Comments

Confluence Vulnerability Report

Hi everyone,I've created a report based on the confluence security advisory for anyone running Confluence locally to check if they need to update or not.The report is color-coded to indicate whether a...

0 Comments

PuTTY 0.71 Report

PuTTY released a new version which fixes some high-severity issues. To help you update your putty installations, I've created a color-coded report to check if your PuTTY installations are up-to-date.T...

0 Comments

Google Chrome Zero-day vulnerability

A new Google Chrome vulnerability has been discovered. Take a look at the details on our blog post.You can find the deployment package for Chrome here.The report below gives an overview of all active ...

23 Comments

Winrar Vulnerability Report

We've released a new blog post about the recent Winrar vulnerability. If you're interested in the specifics, I suggest you give the blog post a read.The report below will give you a color-coded overvi...

0 Comments

LibreOffice Vulnerability Report

Hey everybody,We've released a new blog post regarding the LibreOffice vulnerability. If you're interested in the specifics, I suggest you give it a read.The report below will give you a color-coded o...

2 Comments

MEGA Chrome Extension Vulnerability

The Chrome extension of MEGA was recently compromised to steal user credentials. MEGA released the following statement on their official blog:On 4 September at 14:30 UTC, an unknown attacker managed t...

0 Comments

Intel Foreshadow Vulnerability

Researchers have identified new vulnerabilities in many Intel processors called Foreshadow or L1TF (L1 Terminal Fault). This vulnerability consists of 3 major vulnerabilities: CVE-2018-3615: Vulnerabi...

0 Comments

TLBleed Vulnerability

Dutch researchers found a new vulnerability in Intel processors which have Hyper-threading enabled.The vulnerability allows the extraction of crypto keys from other programs running on the same proces...

0 Comments

Google Chrome Arbitrary Code Execution Vulnerability

A new vulnerability has been discovered in Google Chrome. Web pages designed to utilize this vulnerability can allow for an attacker to perform arbitrary code executions in context of the browser. Thi...

1 Comments

Discover VPNFilter malware vulnerable devices

Based on the information from multiple sources, routers from Linksys, MikroTik, Netgear, and TP-Link, as well as QNAP network-attached storage (NAS) devices are vulnerable to this malware.Based on inf...

0 Comments

Discover VPNFilter malware vulnerable devices

Due to the recent discovery of the new VPNFilter malware, we created a report to discover potential vulnerable devices.The VPNFilter malware allows attackers to gather information and even disable equ...

1 Comments

7-Zip Arbitrary Code Execution Vulnerability

An arbitrary code execution vulnerability has recently been discovered in 7-Zip. By exploiting this arbitrary code execution, depending on the privileges of the user, an attacker can install programs;...

1 Comments

7-Zip Arbitrary Code Execution Vulnerability Check

Update 7th of May, posted a different report that is immune to conversion errors: due to the high variance in the formatting of 7-zip version numbers our previous report could cause conversion errors ...

1 Comments