Severity High Analysis Summary CVE-2023-31414 CVSS:8.2 Elastic Kibana could allow a local authenticated attacker to execute arbitrary code on the system, caused by improper input validation. […]
Severity High Analysis Summary APT-17, also known as “Bitter APT” or “DeputyDog” is a state-sponsored cyber espionage group that is believed to operate out of China. […]
Severity High Analysis Summary APT-C-35 (also known as “Donot APT Group”) is a cyber espionage group that has been active since at least 2013. The group […]
Severity Medium Analysis Summary QBot, often known as QakBot, is modular information malware. It has been operational since 2007. This banking Trojan, QakBot steals financial data […]
Severity Medium Analysis Summary CVE-2023-25787 CVSS:5.9 download-info-page Plugin for WordPress for WordPress is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote […]
Severity High Analysis Summary Redline Stealer is a type of malware that is used to steal sensitive information from infected systems. The malware was first discovered […]
Severity Medium Analysis Summary CVE-2022-43950 CVSS:4.3 Fortinet FortiNAC could allow a remote attacker to conduct phishing attacks, caused by an open redirect vulnerability. An attacker could […]
Severity Medium Analysis Summary CVE-2023-1265 GitLab could allow a remote authenticated attacker to bypass security restrictions, caused by improper access control. By sending a specially crafted […]
Severity High Analysis Summary CVE-2023-29246 Apache OpenMeetings could allow a remote authenticated attacker to execute arbitrary code on the system, caused by null-byte injection flaw. By […]