Severity High Analysis Summary CVE-2023-0266 Linux Kernel could allow a local authenticated attacker to gain elevated privileges on the system, caused by a use-after-free in the […]
Severity High Analysis Summary CVE-2022-3038 Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in Network Service. […]
Severity Medium Analysis Summary CVE-2023-28158 Apache Archiva is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the file upload service. A remote […]
Severity High Analysis Summary Shuckworm APT – aka Actinium, Armageddon, Primitive Bear, Gamaredon, and Trident Ursa – is a Russia-backed advanced persistent threat (APT) that has […]
Severity High Analysis Summary CVE-2023-1073 CVSS:6.3 Linux Kernel could allow a physical authenticated attacker to gain elevated privileges on the system, caused by a memory corruption […]
Severity Medium Analysis Summary Aurora Stealer is a type of information-stealing malware that targets sensitive information from infected computers. The activities aurora stealer performs are as […]
Severity High Analysis Summary Phobos Ransomware is based on the Dharma (aka CrySIS) malware that first appeared at the beginning of 2019. It spreads into several […]
Severity Medium Analysis Summary CVE-2023-27954 Apple Safari could allow a remote attacker to obtain sensitive information, caused by an error in WebKit. By persuading a victim […]
Severity Medium Analysis Summary CVE-2023-23494 CVSS:6.5 Apple iOS and iPadOS are vulnerable to a denial of service, caused by a buffer overflow in the CarPlay component. […]