Severity High Analysis Summary CVE-2023-27346 TP-Link AX1800 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking when parsing firmware images. By sending a […]
Severity Medium Analysis Summary Rhadamanthys is a type of malware known as a stealer, which is designed to steal sensitive information from infected computers. It was […]
Severity High Analysis Summary CVE-2022-36060 Node.js matrix-react-sdk module is vulnerable to a denial of service, caused by a prototype pollution. By sending a specially-crafted request, a […]
Severity High Analysis Summary Security researchers have discovered another North Korean threat actor gang that uses cybercrime operations to fund espionage activities against South Korean and US […]
Severity High Analysis Summary The STOP/DJVU ransomware initially made headlines in 2018 and has since been attacking individuals all around the world. It’s widespread on torrent […]
Severity Medium Analysis Summary CVE-2023-27967 CVSS:7.8 Apple Xcode could allow a local attacker to execute arbitrary code on the system, caused by an issue in the […]
Severity Medium Analysis Summary CVE-2023-0614 CVSS:7.7 Samba could allow a remote authenticated attacker to obtain sensitive information, caused by an insufficient fix for CVE-2018-10919 for confidential […]
Severity High Analysis Summary CVE-2022-3686 CVSS:4.8 Hitachi SDM600 could allow a remote attacker to bypass security restrictions, caused by a flaw in API permission check mechanism. […]
Severity High Analysis Summary CVE-2023-26269 Apache James Server could allow a local attacker to gain elevated privileges on the system, caused by the provision of a […]