Severity Medium Analysis Summary In early 2016, LokiBot was originally made available on underground forums for cybercriminals to use against Microsoft Android phones. This malware steals […]
Severity High Analysis Summary Redline is an info stealer malware that steals information from web browsers and has the ability to corrupt operating systems by installing […]
Severity High Analysis Summary QBot, often known as QakBot, is modular information malware. It has been operational since 2007. This banking Trojan, QakBot steals financial data […]
Severity Medium Analysis Summary Malspam is being used to target victims in an Agent Tesla campaign. Since its initial appearance in 2014, this has beendeployed in […]
Severity High Analysis Summary CVE-2022-33680 Microsoft Edge (Chromium-based) could allow a remote attacker to gain elevated privileges on the system. By sending a specially-crafted request, an […]
Severity High Analysis Summary CVE-2022-34777 Jenkins GitLab Plugin is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the multiple user-provided values. A […]
Severity Medium Analysis Summary CVE-2022-22367 CVSS:4 IBM UrbanCode Deploy (UCD) 6.2.7.15, 7.0.5.10, 7.1.2.6, and 7.2.2.1 could disclose sensitive database information to a local user in plain […]
Severity High Analysis Summary CVE-2022-22373 An improper validation vulnerability in IBM InfoSphere Information Server 11.7 Pack for SAP Apps and BW Packs may lead to creation […]
Severity High Analysis Summary CVE-2022-31112 Node.js parse-server module could allow a remote attacker to obtain sensitive information, caused by not removing protected fields in classes when […]