Severity Medium Analysis Summary In early 2016, LokiBot was originally made available on underground forums for cybercriminals to use against Microsoft Android phones. This malware steals […]
Severity High Analysis Summary CVE-2021-35254 SolarWinds Web Help Desk could allow a remote authenticated attacker to execute arbitrary code on the system, caused by improper input […]
Severity High Analysis Summary CVE-2022-22274 SonicWall SonicOS is vulnerable to a stack-based buffer overflow, caused by improper bounds checking. By sending a specially-crafted HTTP request, a […]
Severity High Analysis Summary CVE-2022-1098 Delta Electronics DIAEnergie could allow a local authenticated attacker to gain elevated privileges on the system, caused by DLL hijacking vulnerability. […]
Severity High Analysis Summary CVE-2022-1146 CVSS:6.5 Google Chrome could allow a remote attacker to bypass security restrictions, caused by inappropriate implementation in Resource Timing. By persuading […]
Severity High Analysis Summary GraphSteel and GrimPlant Backdoors have been used in conducting cyberattacks on Ukrainian authorities. The backdoors allow threat actors to gain unauthorized access […]
Severity Medium Analysis Summary Since 2016, FormBook has been active as a data-stealing malware that affects 4% of enterprises in 2020. It tracks and monitors keystrokes, […]
Severity High Analysis Summary CVE-2022-25757 Apache APISIX could allow a remote attacker to bypass security restrictions, caused by improper input validation. By passing a specially-crafted JSON […]
Severity High Analysis Summary CVE-2022-1048 Linux Kernel could allow a local authenticated attacker to gain elevated privileges on the system, caused by a use-after-free flaw in […]