Severity Medium Analysis Summary CVE-2022-45398 CVSS:4.3Jenkins Cluster Statistics Plugin is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By persuading an authenticated […]
Severity High Analysis Summary CVE-2022-41622 F5 BIG-IP and BIG-IQ is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By persuading an authenticated […]
Severity Medium Analysis Summary CVE-2022-42898 Samba’s Kerberos libraries and AD DC failed to guard against integer overflows when parsing a PAC on a 32-bit system, which […]
Severity High Analysis Summary Tofsee malware has been around since 2016. Once installed on a compromised computer, it can be used to send spam emails and […]
Severity Medium Analysis Summary HawkEye, primarily an infostealer, has additional capabilities such as bypassing of AV systems and keylogging. A spear-phishing campaign is detected using malicious […]
Severity High Analysis Summary CVE-2022-45419 CVSS:6.5Mozilla Firefox could provide weaker than expected security, when deleting a security exception fails to effect immediately. By persuading a victim […]
Severity Medium Analysis Summary CVE-2022-20967 CVSS:4.8Cisco Identity Services Engine is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by an application feature before […]
Severity High Analysis Summary CVE-2022-45047 Apache MINA SSHD could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an unsafe deserialization […]
Severity High Analysis Summary Tofsee malware has been around since 2016. Once installed on a compromised computer, it can be used to send spam emails and […]