Severity High Analysis Summary The STOP/DJVU ransomware initially made headlines in 2018 and has since been attacking individuals all around the world. It’s widespread on torrent […]
Severity High Analysis Summary CVE-2023-20879 CVSS:6.7 VMware Aria Operations could allow a local authenticated attacker to gain elevated privileges on the system, caused by an unspecified […]
Severity High Analysis Summary Redline Stealer is a type of malware that is used to steal sensitive information from infected systems. The malware was first discovered […]
Severity High Analysis Summary CVE-2023-29032 CVSS:9.1 Apache OpenMeetings could allow a remote attacker to bypass security restrictions, caused by improper protection to sensitive information. By sending […]
Severity High Analysis Summary CVE-2023-29246 Apache OpenMeetings could allow a remote authenticated attacker to execute arbitrary code on the system, caused by null-byte injection flaw. By […]
Severity Medium Analysis Summary CVE-2023-20878 VMware Aria Operations could allow a remote authenticated attacker to execute arbitrary commands on the system, caused by an unsafe deserialization […]
Severity High Analysis Summary Researchers discovered Cactus, a new ransomware operation, that has been observed exploiting vulnerabilities in VPN appliances to get early access to targeted […]
Severity High Analysis Summary STRRat is a Java-based Remote-Access Trojan (RAT) with a slew of malicious features, notably information theft and backdoor capabilities. This RAT was […]
Severity Medium Analysis Summary CVE-2023-2181 GitLab could allow a remote authenticated attacker to bypass security restrictions. By using a git feature called refs/replace, an attacker could […]