Severity High Analysis Summary Ghost RAT is a remote access trojan that allows an attacker to access an infected machine to harvest sensitive information and data. […]
Severity Medium Analysis Summary NjRat is a Remote Access Trojan, which is found leveraging Pastebin to deliver a second-stage payload after initial infection. There are multiple […]
Severity Medium Analysis Summary Cobalt Strike first appeared in 2012 in response to alleged flaws in the Metasploit Framework, an existing red team (penetration testing) tool. […]
Severity High Analysis Summary CVE-2023-20025 CVSS:9 Cisco Small Business RV016, RV042, RV042G, and RV082 Routers could allow a remote attacker to bypass security restrictions, caused by […]
Severity High Analysis Summary AsyncRAT is an open-source tool designed for remote monitoring via encrypted connections. However, it could be utilized by threat actors as it […]
Severity High Analysis Summary CVE-2023-22303 TP-Link SG105PE could allow a remote attacker to bypass security restrictions, caused by an authentication bypass vulnerability. By sending a specially-crafted […]
Severity High Analysis Summary CVE-2023-0210 Linux Kernel is vulnerable to a denial of service, caused by a heap-based buffer overflow in the ksmbd_decode_ntlmssp_auth_blob function in ksmbd […]
Severity High Analysis Summary CVE-2022-47967 Siemens Solid Edge could allow a remote attacker to execute arbitrary code on the system, caused by memory corruption in the […]