Severity High Analysis Summary CVE-2024-0222 CVSS:8.8 Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in ANGLE. […]
Severity High Analysis Summary Shuckworm APT – aka Actinium, Armageddon, Primitive Bear, Gamaredon, and Trident Ursa – has been a Russia-backed advanced persistent threat (APT) since […]
Severity High Analysis Summary Amadey is a botnet, a type of malicious software that infects computers and turns them into “bots” or “zombies” that can be […]
Severity High Analysis Summary A threat group called UAC-0050 has been discovered using phishing attacks to propagate Remcos RAT using novel strategies for detection evasion from […]
Severity High Analysis Summary CVE-2023-44807 D-Link DIR-820L is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by cancelPing function. By sending a specially […]
Severity High Analysis Summary CVE-2023-40537 F5 BIG-IP could allow a remote attacker to bypass security restrictions, caused by improper validating session cookie for a limited time […]
Severity High Analysis Summary CVE-2023-6847 GitHub Enterprise Server could allow a remote attacker to bypass security restrictions, caused by an improper authentication vulnerability. By using a […]
Severity High Analysis Summary CVE-2023-51784 CVSS:9.8 Apache InLong could allow a remote attacker to execute arbitrary code on the system, caused by a flaw in the […]
Severity High Analysis Summary CVE-2024-0222 CVSS:8.8 Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in ANGLE. […]