Severity Medium Analysis Summary CVE-2023-36556 CVSS:8.8 Fortinet FortiMail could allow a remote authenticated attacker to bypass security restrictions, caused by an incorrect authorization vulnerability. By sending […]
Severity Medium Analysis Summary CVE-2023-45750 CVSS:7.1 Nexter Plugin for WordPress is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could […]
Severity Medium Analysis Summary CVE-2023-5363 OpenSSL could allow a remote attacker to obtain sensitive information, caused by an incorrect cipher key and IV length processing during […]
Severity Medium Analysis Summary Quasar RAT is an open-source remote access trojan that has been recently discovered using DLL side-loading to stealthily steal data from infected […]
Severity Medium Analysis Summary AsyncRAT is an open-source tool designed for remote monitoring via encrypted connections. However, it could be utilized by threat actors as it […]
Severity High Analysis Summary Kimsuky is a North Korean advanced persistent threat (APT) group, also known as “Black Banshee”. The group has been active since at […]
Severity High Analysis Summary CVE-2023-22029 CVSS:6.1 An unspecified vulnerability in Oracle Commerce Guided Search related to the Workbench component could allow a remote attacker to cause […]
Severity Medium Analysis Summary CVE-2023-43065 CVSS:5.5 Dell Unity is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote authenticated attacker could exploit […]
Severity High Analysis Summary Redline Stealer is a type of malware that is used to steal sensitive information from infected systems. The malware was first discovered […]