Severity High Analysis Summary CVE-2023-40336 Jenkins Folders Plugin is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By persuading an authenticated user […]
Severity Medium Analysis Summary CVE-2023-36769 Microsoft OneNote could allow a remote authenticated attacker to conduct spoofing attacks. Impact Indicators Of Compromise CVE Affected Vendors Microsoft Affected […]
Severity High Analysis Summary APT37, also known as ScarCruft or Red Eyes, is a state-sponsored cyber espionage group originating from North Korea. The group has been […]
Severity High Analysis Summary LockBit ransomware takes as little as five minutes to deploy the encryption routine on target systems once it lands on the victim […]
Severity High Analysis Summary A substantial cybersecurity incident has come to light involving the exploitation of nearly 2,000 Citrix NetScaler servers through the critical-severity remote code […]
Severity High Analysis Summary CVE-2023-33013 Zyxel NBG6604 devices could allow a remote authenticated attacker to execute arbitrary commands on the system, caused by a flaw in […]
Severity Medium Analysis Summary CVE-2023-21132 CVSS:6.4 Google Android could allow a physically proximate attacker to gain elevated privileges on the system, caused by a missing permission […]
Severity High Analysis Summary CVE-2023-37988 Contact Form Generator Plugin for WordPress is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker […]
Severity High Analysis Summary CVE-2023-4366 Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in Extensions. By […]