Severity Medium Analysis Summary CVE-2022-20662 Cisco Duo for macOS could allow a local attacker to bypass security restrictions, caused by the assigned user of a smart […]
Severity Medium Analysis Summary CVE-2022-35280 IBM Robotic Process Automation 21.0.0, 21.0.1, and 21.0.2 does not require that users should have strong passwords by default, which makes […]
Severity Medium Analysis Summary CVE-2022-24373 Node.js react-native-reanimated module is vulnerable to a denial of service, caused by a regular expression denial of service (ReDoS) flaw in […]
Severity Medium Analysis Summary CVE-2022-21222 CVSS:5.3 Node.js css-what module is vulnerable to a denial of service, caused by a regular expression denial of service (ReDoS) flaw in […]
Severity High Analysis Summary CVE-2022-3373 CVSS:8.8 Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by an out-of-bounds write in […]
Severity High Analysis Summary CVE-2022-36965 CVSS:7.5SolarWinds Orion Platform is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the QoE application input field. […]
Severity High Analysis Summary A recent cyberattack campaign that may have been motivated by cyber espionage targeted many military and weapons contractor businesses using spear-phishing emails […]
Severity High Analysis Summary Microsoft verified that two zero-day vulnerabilities in Microsoft Exchange discovered by GTSC researchers are being actively exploited in the wild.The IT giant has […]
Severity High Analysis Summary Phobos Ransomware is based on the Dharma malware that first appeared at the beginning of 2019. It spreads into several systems via […]