Severity High Analysis Summary CVE-2024-2370 ManageEngine Desktop Central could allow a remote attacker to upload arbitrary files, caused by the improper validation of file extensions. By […]
Severity High Analysis Summary Ducktail Malware is a malicious program designed by hackers to infiltrate computers and networks globally. Ducktail malware is typically delivered through a […]
Severity High Analysis Summary CVE-2024-20765 Adobe Acrobat and Adobe Reader could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free […]
Severity High Analysis Summary Shuckworm APT – aka Actinium, Armageddon, Primitive Bear, Gamaredon, and Trident Ursa – has been a Russia-backed advanced persistent threat (APT) since […]
Severity High Analysis Summary A cybercrime consortium, known as The Five Families which includes infamous groups like GhostSec and Stormous, has been conducting sophisticated ransomware attacks […]
Severity High Analysis Summary CVE-2024-25951 Dell iDRAC8 could allow a remote authenticated attacker to execute arbitrary commands on the system. By sending a specially crafted request, […]
Severity High Analysis Summary CVE-2023-6000 Looking Forward Software Popup Builder plugin for WordPress is vulnerable to cross-site scripting, caused by improper validation of user-supplied input when […]
Severity Medium Analysis Summary CVE-2024-23241 CVSS:5.5 Apple tvOS could allow a local attacker to obtain sensitive information, caused by an issue in the Spotlight component. By […]