Severity High Analysis Summary CVE-2023-24892 Microsoft Edge (Chromium-based) could allow a remote attacker to conduct spoofing attacks. Impact Indicators Of Compromise CVE Affected Vendors Microsoft Affected […]
Severity Medium Analysis Summary CVE-2023-23391 Microsoft Office for Android could allow a remote attacker to conduct spoofing attacks. Impact Indicators Of Compromise CVE Affected Vendors Microsoft […]
Severity Medium Analysis Summary CVE-2023-23408 CVSS:4.5 Microsoft Azure HDInsight could allow a remote authenticated attacker to conduct spoofing attacks. CVE-2023-23383 CVSS:8.2 Microsoft Azure Service Fabric could […]
Severity High Analysis Summary CVE-2023-23857 CVSS:7.2 SAP NetWeaver AS for Java could allow a remote attacker to bypass security restrictions, caused by improper access control. By […]
Severity Medium Analysis Summary Smoke Loader – a malicious bot application – can be used to load additional malware. Smoke Loader has been spotted in the […]
Severity Medium Analysis Summary Snake is a modular .NET keylogger that was first spotted in late November 2020. Snake malware’s main feature is keylogging, but it […]
Severity High Analysis Summary CVE-2023-27896 CVSS:6.5 SAP BusinessObjects Business Intelligence Platform is vulnerable to a denial of service, caused by improper access control. By sending a […]
Severity High Analysis Summary According to researchers, a Golang-based botnet named GoBruteforcer has been discovered, which is specifically targeting web servers running FTP, MySQL, phpMyAdmin, and […]
Severity High Analysis Summary DarkComet RAT (Remote Administration Tool) is a type of malware that is designed to allow attackers to gain remote access to a […]