Severity High Analysis Summary CVE-2022-26419 The affected product is vulnerable to multiple stack-based buffer overflow conditions while parsing a specific project file, which may allow an […]
Severity Medium Analysis Summary CVE-2022-27641 NETGEAR R6700v3 could allow a remote attacker to execute arbitrary code on the system, caused by integer overflow within the NetUSB […]
Severity High Analysis Summary Vidar, which first appeared in late 2018, is a malware family that primarily acts as an information stealer and is frequently seen […]
Severity High Analysis Summary Lazarus APT is one of North Korea’s most sophisticated threat actors, operating since at least 2009. Initially, they concentrated on South Korea. […]
Severity Medium Analysis Summary CVE-2022-23183 Advanced Custom Fields plugin for WordPress and Advanced Custom Fields Pro plugin for WordPress could allow a remote authenticated attacker to […]
Severity High Analysis Summary Remcos malware has been operating since 2016. This RAT was originally promoted as genuine software for remote control of Microsoft Windows from […]
Severity Medium Analysis Summary In early 2016, LokiBot was originally made available on underground forums for cybercriminals to use against Microsoft Android phones. This malware steals […]
Severity Medium Analysis Summary CVE-2022-22963 In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, when using routing functionality it is possible for a user […]
Severity High Analysis Summary Snake emerged for the first time in late November 2020. Since November 2020, malicious actors have started releasing Snake through phishing attacks. […]