Severity High Analysis Summary CVE-2022-39947 Fortinet FortiADC could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an OS command injection […]
Severity High Analysis Summary The STOP/DJVU ransomware initially made headlines in 2018 and has since been attacking individuals all around the world. It’s widespread on torrent […]
Severity High Analysis Summary WannaCry also called WCry or WanaCrptor ransomware malware, was discovered in May 2017, it infected networks running Microsoft Windows as part of […]
Severity High Analysis Summary CVE-2023-0038 AYS Pro Plugins Survey Maker plugin for WordPress is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by […]
Severity High Analysis Summary CVE-2023-0039 ODude UPG plugin for WordPress could allow a remote attacker to execute arbitrary commands on the system, caused by an authorization […]
Severity Medium Analysis Summary Ursnif banking trojan also known as Gozi and Dreambot has been around for more than 10 years. It gained popularity in 2015 […]
Severity High Analysis Summary CVE-2022-45143 Apache Tomcat could allow a remote attacker to bypass security restrictions, caused by not escape the type, message or description values […]
Severity Medium Analysis Summary Amadey infects a victim’s computer and incorporates it into a. botnet. The Amadey trojan can also download additional malware. and exfiltrate user […]
Severity High Analysis Summary CrySIS, also known as Dharma, is a group of ransomware that has been developing starting around 2016. We have seen that this […]