Severity High Analysis Summary CVE-2021-39675 Google Android could allow a remote attacker to gain elevated privileges on the system, caused by a flaw in the System […]
Severity High Analysis Summary CVE-2022-22807 Schneider Electric EcoStruxure EV Charging Expert could allow a remote attacker to bypass security restrictions, caused by improper restriction of rendered […]
Severity High Analysis Summary CVE-2022-22620 Apple iOS and iPadOS and macOS Monterey could allow a remote attacker to execute arbitrary code on the system, caused by […]
Severity High Analysis Summary CVE-2022-0016 Palo Alto Networks could allow a local attacker to gain elevated privileges on the system, caused by improper handling of exceptional […]
Severity High Analysis Summary Siemens COMOS Web CVE-2021-37194 The COMOS Web component of COMOS allows to upload and store arbitrary files at the webserver. This could […]
Severity High Analysis Summary CVE-2022-0435 Linux Kernel is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the Transparent Inter Process Communication (TIPC) […]
Severity High Analysis Summary CVE-2021-37185 An unauthenticated attacker could cause a denial-of-service condition in a PLC when sending specially prepared packets over Port 102/TCP. A restart […]
Severity High Analysis Summary Linux environments are considered safer and more secure than windows environments. For the accessibility and security reasons, cloud services, container-based infrastructure, and […]
Severity Medium Analysis Summary Qbot and Lokibot trojans are being deployed using the windows Regsvr32.exe tool also known as LOLBin (living-off-the-land binary). Various types of malicious Microsoft […]