PLATFORM
/
Vectors

Vectors

Vectors are zero-days, n-days, vulnerabilities and other exposures or misconfigurations that are found by ULTRA RED’s scanning engine

Impact & threat based prioritization

01
Informational
No impact
02
Low
Minor exposure of  hard-to-leverage data
03
Medium
Used by adversaries as a starting point to escalate
04
High
Significant threat/impact possible using this vector
05
Critical
An immediate risk that threatens the asset

Scan Engine - how are they found?

Affected platform is expected a certain behavior to happen
Behavior is exploited in an unintended or unconventional way
Platform is widely used, affecting all users and customers of that platform

Zero-day scenario & Examples

01
Server is awaiting
for a request
02
A maliciously crafted request
adds unexpected commands
03
Server performs the commandsand executes the attacker’s malicious code

Scanning Coverage Examples

0-days

A security hole in software no one knows about. Hackers exploit it before anyone can fix it, causing trouble like data breaches. Think "surprise attack" on your computer, making it urgent to update defenses quickly.

OWASP Top 100

The OWASP Top 10, officially known as the OWASP Top 10 Most Critical Web Application Security Risks, is a crucial security standard curated by the Open Web Application Security Project (OWASP).

CVEs & Public

CVEs (Common Vulnerabilities and Exposures) are unique IDs for publicly known security weaknesses, while public exploits are readily available code that attackers can use to take advantage of those vulnerabilities.

Proprietary Techniques

A security hole in software no one knows about. Hackers exploit it before anyone can fix it, causing trouble like data breaches. Think "surprise attack" on your computer, making it urgent to update defenses quickly.

Zero-days detected
by ULTRA RED research

ULTRA RED’s research team continuously tests widely used libraries in order to proactively identify zero-days.To date, about 10 CVEs have been registered that were based on Zero-Days located by ULTRA RED's team of experts. The vulnerabilities found affected millions of users worldwide. ULTRA RED customers were the first to protect themselves from the threat.