Severity Medium Analysis Summary CVE-2023-0011 VMware Workspace ONE Access and Identity Manager could allow a remote attacker to conduct phishing attacks, caused by an insecure redirect […]
Severity Medium Analysis Summary CVE-2023-32958 CVSS:5.9 Novelist Plugin for WordPress is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote authenticated attacker […]
Severity High Analysis Summary AveMaria RAT – aka WarzoneRAT – is a remote access trojan that targets Windows systems that provides the capability to gain unauthorized […]
Severity High Analysis Summary CVE-2023-2866 Advantech WebAccess/SCADA could allow a remote authenticated attacker to execute arbitrary code on the system, caused by the improper validation of […]
Severity High Analysis Summary CVE-2023-2941 CVSS:6.5 Google Chrome could allow a remote attacker to bypass security restrictions, caused by inappropriate implementation in the Extensions component. By […]
Severity High Analysis Summary Recently, researchers discovered an advanced phishing method called “file archiver in the browser” that exploits .ZIP domains to deceive unsuspecting individuals. This […]
Severity High Analysis Summary CVE-2023-32257 CVSS:8.1 Linux Kernel could allow a remote attacker to execute arbitrary code on the system, caused by a race condition in […]
Severity Medium Analysis Summary AsyncRAT is an open-source tool designed for remote monitoring via encrypted connections. However, it could be utilized by threat actors as it […]
Severity High Analysis Summary Gafgyt is a type of malware that is used to conduct Distributed Denial of Service (DDoS) attacks. These attacks involve overwhelming a […]