Severity High Analysis Summary CVE-2022-24526 Microsoft Visual Studio Code could allow a remote attacker to conduct spoofing attacks to cause an impact on confidentiality and integrity. […]
Severity High Analysis Summary CVE-2021-39689 Google Android could allow a local authenticated attacker to gain elevated privileges on the system, caused by a flaw in the […]
Severity Medium Analysis Summary CVE-2022-26355 Citrix Federated Authentication Service (FAS) could allow a local authenticated attacker to obtain sensitive information, caused by a flaw when using […]
Severity Medium Analysis Summary CVE-2022-26104 SAP Financial Consolidation could allow a remote authenticated attacker to bypass security restrictions, caused by improper authorization validation for updating homepage […]
Severity High Analysis Summary CVE-2022-0002 Multiple Intel Processors could allow a local authenticated attacker to obtain sensitive information, caused by an issue with non-transparent sharing of […]
Severity High Analysis Summary Snake emerged for the first time in late November 2020. Since November 2020, malicious actors have started releasing Snake through phishing attacks. […]
Severity High Analysis Summary CVE-2022-26387 Mozilla Firefox could allow a remote attacker to bypass security restrictions, caused by a time-of-check time-of-use bug when verifying add-on signatures […]
Severity Medium Analysis Summary CVE-2022-24090 Adobe Photoshop could allow a remote attacker to obtain sensitive information, caused by access of memory location after end of buffer. […]
Severity High Analysis Summary APT28 is one of Russia’s longest-running APTs and its operations date back to at least 2007. The group supports Russia in their […]