Behind the scenes look at the new version of the Cyber Assessment Framework. NCSC Feed
TinyDir 1.2.5 Buffer Overflow
TinyDir versions 1.2.5 and below suffer from a buffer overflow vulnerability with long path names. Exploit Files ≈ Packet Storm
Behind the scenes look at the new version of the Cyber Assessment Framework. NCSC Feed
TinyDir versions 1.2.5 and below suffer from a buffer overflow vulnerability with long path names. Exploit Files ≈ Packet Storm
PHPJabbers Appointment Scheduler version 3.0 suffers from a CSV injection vulnerability. Exploit Files ≈ Packet Storm
Ensure your Organization Assets are well protected in front of the Cyber Attacks
Let us demonstrate how we can help you secure your business and give you peace of mind.
Get free security guidelines and updates that help protect your business against the latest cyber threats & attacks.
All rights reserved 2023 ®Cyber Legion Ltd, Registered in England & Wales, company number 13278010
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |
Access to all of Cyber Legion's services is provided through the Web Secure Client Portal. To create a Free account, you can sign up through the portal, or contact the Cyber Legion team and they will set up an account for you.
The integration of Digital Signature in our Web Client Portal allows us to legally sign all necessary documents and agreements, enabling us to carry out security assessments on targeted systems.
Our pricing structure is adaptable to meet the needs of all clients. By filling out the Work Request Form, you can select from pre-existing services or request a personalized proposal.
The Cyber Legion team will acknowledge your order, set up a project in your account, and proceed with the testing and delivery.
We meet agreed upon SLAs and follow security testing framework checklists. Based on our commitment, our team of engineers will utilize all of our tools, automation, and testing capabilities to achieve the objectives.
Within the agreed upon timeframe, you will receive a report on the security test that was conducted, including the results, recommendations, and references for addressing any identified issues.
We not only identify potential threats, risks, and vulnerabilities, but also provide detailed recommendations for resolution. To ensure complete remediation, we offer complimentary retesting and a range of ongoing security testing options for continued vulnerability detection and verification.