Severity High Analysis Summary Ukraine hit with a new Golang-based ‘SwiftSlicer’ Wiper Malware in a latest cyber attack. The attack has been attributed to Sandworm, a […]
Severity High Analysis Summary Mimic Ransomware is a new type of ransomware that has been discovered to exploit the “Everything” Application Programming Interface (API) for its […]
Severity High Analysis Summary CVE-2022-41657 Delta Electronics InfraSuite Device Master could allow a remote attacker to traverse directories on the system. An attacker could send a […]
Severity High Analysis Summary CVE-2021-44014 CVSS:7.8 Siemens JT2Go and Teamcenter Visualization could allow a remote attacker to execute arbitrary code on the system, caused by a […]
Severity High Analysis Summary WSHRAT, also known as “Windows Script Host Remote Administration Tool,” is a type of malware that allows a hacker to remotely access […]
Severity Medium Analysis Summary CVE-2023-24452 CVSS:4.3 Jenkins TestQuality Updater Plugin is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By persuading an […]
Severity Medium Analysis Summary Some of the Common Vulnerabilities and Exposures (CVE) numbers assigned to security vulnerabilities found in WordPress plugins are listed below in the […]
Severity Medium Analysis Summary CVE-2023-24433 CVSS:5.4 Jenkins Orka by MacStadium Plugin could allow a remote authenticated attacker to bypass security restrictions, caused by not perform permission […]
Severity Medium Analysis Summary CVE-2023-24436 CVSS:4.3 Jenkins GitHub Pull Request Builder Plugin could allow a remote authenticated attacker to obtain sensitive information, caused by not perform […]