Severity High Analysis Summary A recently uncovered Linux security flaw, named “Looney Tunables,” has been found within the GNU C library’s ld.so dynamic loader. This vulnerability, […]
Severity High Analysis Summary CVE-2023-20235 CVSS:6.5 Cisco IOS XE Software could allow a remote authenticated attacker to gain elevated privileges on the system, caused by a […]
Severity Medium Analysis Summary CVE-2023-40684 IBM Content Navigator 3.0.11, 3.0.13, and 3.0.14 with IBM Daeja ViewOne Virtual is vulnerable to cross-site scripting. This vulnerability allows users […]
Severity High Analysis Summary Cybersecurity researchers have recently discovered a malware-as-a-service dubbed as BunnyLoader emerging as a new threat for sale in the cybercrime market. It […]
Severity High Analysis Summary CVE-2023-42824 Apple iOS and iPadOS could allow a local attacker to gain elevated privileges on the system, caused by an error in […]
Severity High Analysis Summary CVE-2023-3440 Hitachi JP1/Performance Management could allow a local attacker to bypass security restrictions, caused by incorrect default permissions vulnerability. By sending a […]
Severity Medium Analysis Summary CVE-2023-3335 CVSS:6.5 Hitachi Ops Center Administrator on Linux could allow a local authenticated attacker to obtain sensitive information, caused by the insertion […]
Severity Medium Analysis Summary Snake is a modular .NET keylogger that was first spotted in late November 2020. Snake malware’s main feature is keylogging, but it […]
Severity High Analysis Summary CVE-2023-22515 Atlassian Confluence Data Center and Server could allow a remote attacker to gain elevated privileges on the system, caused by an […]