Severity High Analysis Summary CVE-2024-0517 CVSS:8.8 Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by an out-of-bounds write in […]
Severity Medium Analysis Summary CVE-2024-20979 CVSS:5.4 An unspecified vulnerability in Oracle BI Publisher related to the Web Server component could allow a remote authenticated attacker to […]
Severity High Analysis Summary CVE-2024-0200 CVSS:7.9 GitHub Enterprise Server could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an unsafe […]
Severity High Analysis Summary Cybersecurity analysts have discovered that the eight-year-old stealer malware named AZORult has returned to the cyber landscape. It steals information and harvests […]
Severity Low Analysis Summary CVE-2023-50950 IBM QRadar SIEM 7.5 could disclose sensitive email information in responses from offense rules. Impact Indicators Of Compromise CVE Affected Vendors […]
Severity High Analysis Summary Various information stealers designed to target the macOS platform have evolved to the point where they have developed the capability to evade […]
Severity High Analysis Summary CVE-2023-34063 VMware Aria Automation could allow a remote authenticated attacker to bypass security restrictions, caused by a missing access control vulnerability. By […]
Severity High Analysis Summary Kimsuky is a North Korean advanced persistent threat (APT) group, also known as “Black Banshee”. The group has been active since at […]
Severity Medium Analysis Summary Snake is a modular .NET keylogger that was first spotted in late November 2020. Snake malware’s main feature is keylogging, but it […]