Severity High Analysis Summary CVE-2022-38476 CVSS:8.8Mozilla Firefox and Thunderbird could allow a remote attacker to execute arbitrary code on the system, caused by a data race […]
Severity Medium Analysis Summary CVE-2022-38475 Mozilla Firefox could allow a remote attacker to bypass security restrictions. By persuading a victim to visit a specially-crafted Web site, […]
Severity Medium Analysis Summary CVE-2022-38474 Mozilla Firefox for Android could allow a remote attacker to bypass security restrictions. By persuading a victim to visit a specially-crafted […]
Severity High Analysis Summary CVE-2022-31676 VMware Tools could allow a local authenticated attacker to gain elevated privileges on the system, caused by improper privilege management. By […]
Severity High Analysis Summary Threat actors are using WordPress websites to propagate malware that installs the RaccoonStealer password-stealing Trojan and the NetSupport RAT by displaying fake […]
Severity High Analysis Summary The STOP/DJVU ransomware initially made headlines in 2018 and has since been attacking individuals all around the world. It’s widespread on torrent […]
Severity High Analysis Summary Racoon gathers private data such as credit card numbers, cryptocurrency wallet addresses, login passwords, and browser information like cookies and history. It […]
Severity High Analysis Summary DanaBot is a persistent and ever-evolving threat that has been circulating in the wild since 2018. DanaBot was originally marketed as a […]
Severity Medium Analysis Summary Malspam is being used to target victims in an Agent Tesla campaign. Since its initial appearance in 2014, this has beendeployed in […]