Andrea Micalizzi

rgod of 9sg Security Team, working with Trend Micro's Zero Day Initiative. rgod is for the tibetan "rgod-tsid-pa he-ru-ka". In 2019, rgod ranked #5 in Microsoft "MSRC Most Valuable Security Researchers" list, related to security research in Microsoft Windows Jet, Office, Visual Studio and Skype. At the moment, rgod is collaborating mainly with Vulnerability Report Programs.




CVEs Disclosed by Andrea Micalizzi

11/10 CVE-2020-26817

SAP 3D Visual Enterprise Viewer, version - 9, allows an user to open manipulated HPGL file received from untrusted...

7.8 HIGH
10/27 CVE-2020-27859

This vulnerability allows remote attackers to disclose sensitive information on affected installations of NEC ESMPRO...

7.5 HIGH
10/27 CVE-2020-27858

This vulnerability allows remote attackers to disclose sensitive information on affected installations of CA Arcserve...

7.5 HIGH
10/20 CVE-2020-25157

The R-SeeNet webpage (1.5.1 through 2.4.10) suffers from SQL injection, which allows a remote attacker to invoke queries...

7.5 HIGH
10/20 CVE-2020-6315

SAP 3D Visual Enterprise Viewer, version 9, allows an attacker to send certain manipulated file to the victim, which can...

5.5 MEDIUM
10/16 CVE-2020-17003

A remote code execution vulnerability exists when the Base3D rendering engine improperly handles memory.An attacker who...

7.8 HIGH
10/16 CVE-2020-1167

A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory, aka...

7.8 HIGH
10/15 CVE-2020-6374

SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated Jupiter Tessallation(.jt) file received...

7.8 HIGH
09/23 CVE-2020-24626

Unathenticated directory traversal in the ReceiverServlet class doPost() method can lead to arbitrary remote code...

9.8 CRITICAL
09/23 CVE-2020-24624

Unathenticated directory traversal in the DownloadServlet class execute() method can lead to arbitrary file reads in HPE...

7.5 HIGH

This page is open source. Noticed a typo? Or something missing?

Improve this page