Severity High Analysis Summary CVE-2022-3398 CVSS:7.8 The affected product is vulnerable to an Out-of-Bounds Write in CX-P.exe, which may allow an attacker to execute arbitrary code. […]
Severity High Analysis Summary CVE-2022-3377 CVSS:7.8 The affected product does not properly validate user-supplied data. If a user opens a maliciously formed FNT file, then an […]
Severity High Analysis Summary CVE-2021-40335 CVSS:5 The affected product is vulnerable to cross site request forgery (CSRF), which if exploited could lead an attacker to gain […]
Severity High Analysis Summary CVE-2022-21936 Johnson Controls Metasys ADX Server could allow a remote authenticated attacker to bypass security restrictions, caused by the failure to prove […]
Severity High Analysis Summary CVE-2022-41672 Apache Airflow could allow a remote authenticated attacker to bypass security restrictions, caused by improper session expiration after deactivating a user. […]
Severity High Analysis Summary The STOP/DJVU ransomware initially made headlines in 2018 and has since been attacking individuals all around the world. It’s widespread on torrent […]
Severity High Analysis Summary A threat actor with ties to China has been attributed to a novel supply chain attack involving the deployment of a trojanized […]
Severity High Analysis Summary WannaCry is also called WCry or WanaCrptor ransomware malware, this ransomware can encrypt all your data files and demands a payment to […]
Severity Medium Analysis Summary The malware loader, Bumblebee, is used to download Cobalt Strike and perhaps other malware such as ransomware. It also replaces the BazarLoader […]