Severity Medium Analysis Summary Multiple PDF samples are discovered in the wild which exploit a Google Chrome unpatched flaw. The exploited vulnerability allows the sender of […]
Severity Low Analysis Summary A vulnerability has been reported in multiple F5 products, which can be exploited by malicious people to bypass certain security restrictions. An […]
Severity: Medium Analysis Summary The vulnerability is an OS Command Injection described it as a “bypass to avoid the new controls” put in place by Cisco after […]
Severity Medium Analysis Summary A use-after-free vulnerability was found in the way the Linux kernel’s KVM hypervisor implements its device control API. While creating a device […]
Severity High Analysis Summary If UAC is running, when you attempt to extract the archive it will fail to place the malware in the C:\ProgramData folder […]
Severity High Analysis Summary Windows servers running Internet Information Services (IIS) are vulnerable to denial-of-service (DoS) attacks carried out through malicious HTTP/2 requests. Attackers can trigger […]
Severity Medium Analysis Summary The fix for CVE-2019-7089 first introduced in 2019.010.20091, 2017.011.30120 and 2015.006.30475 has been bypassed, leading to CVE-2019-7815. Successful exploitation could lead to […]
Severity Medium Analysis Summary A vulnerability in multiple F5 BIG-IP products can be exploited by malicious people to compromise a vulnerable system. The libcurl API function […]
Severity Medium Analysis Summary CVE-2019-0251 The Fiori Launchpad of SAP BusinessObjects, before versions 4.2 and 4.3, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting […]