CISA: CISA Releases Joint Guide for Software Manufacturers: The Case for Memory Safe Roadmaps
CISA Releases Joint Guide for Software Manufacturers: The Case for Memory Safe Roadmaps Today, as part of the Secure by...
CISA Releases Joint Guide for Software Manufacturers: The Case for Memory Safe Roadmaps Today, as part of the Secure by...
py-amsi is a library that scans strings or files for malware using the Windows Antimalware Scan Interface (AMSI) API. AMSI...
Ransomware attacks have become a significant and pervasive threat in the ever-evolving realm of cybersecurity. Among the various iterations of...
A collection of security flaws in the firmware implementation of 5G mobile network modems from major chipset vendors such as...
The North Korean threat actor known as Kimsuky has been observed targeting research institutes in South Korea as part of...
Unauthorized websites distributing trojanized versions of cracked software have been found to infect Apple macOS users with a new Trojan-Proxy...
Unauthorized websites distributing trojanized versions of cracked software have been found to infect Apple macOS users with a new Trojan-Proxy...
Ransomware attacks have become a significant and pervasive threat in the ever-evolving realm of cybersecurity. Among the various iterations of...
A collection of security flaws in the firmware implementation of 5G mobile network modems from major chipset vendors such as...
The North Korean threat actor known as Kimsuky has been observed targeting research institutes in South Korea as part of...
The North Korean threat actor known as Kimsuky has been observed targeting research institutes in South Korea as part of...
Ransomware attacks have become a significant and pervasive threat in the ever-evolving realm of cybersecurity. Among the various iterations of...
Unauthorized websites distributing trojanized versions of cracked software have been found to infect Apple macOS users with a new Trojan-Proxy...
A collection of security flaws in the firmware implementation of 5G mobile network modems from major chipset vendors such as...
NAME__________Golang Go information disclosurePlatforms Affected:Golang Go 1.19.5Risk Level:5.9Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Golang Go could allow a remote attacker to obtain sensitive information,...
NAME__________Phoenix Technologies Phoenix SecureCore code executionPlatforms Affected:Phoenix Technologies Phoenix SecureCoreRisk Level:7.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Phoenix Technologies Phoenix SecureCore could allow a local...
NAME__________git-urls denial of servicePlatforms Affected:git-urls git-urls 1.0.0Risk Level:7.5Exploitability:Proof of ConceptConsequences:Denial of Service DESCRIPTION__________git-urls is vulnerable to a denial of service,...
NAME__________Insyde InsydeH2O denial of servicePlatforms Affected:Insyde InsydeH2O 5.2 Insyde InsydeH2O 5.3 Insyde InsydeH2O 5.4 Insyde InsydeH2O 5.5 Insyde InsydeH2O 5.6Risk...
NAME__________Apple macOS Sonoma code executionPlatforms Affected:Apple macOS SonomaRisk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Apple macOS Sonoma could allow a remote attacker to execute...
NAME__________AMI Aptio V code executionPlatforms Affected:AMI Aptio VRisk Level:7.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________AMI Aptio V could allow a local authenticated attacker to...
NAME__________Devolutions Workspace information disclosurePlatforms Affected:Devolutions Devolutions Workspace 2023.3.2.0Risk Level:4.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Devolutions Workspace could allow a remote authenticated attacker to obtain...
NAME__________EspoCRM server-side request forgeryPlatforms Affected:EspoCRM EspoCRM 8.0.4Risk Level:5.3Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION__________EspoCRM is vulnerable to server-side request forgery, caused by...
NAME__________AMI AptioV code executionPlatforms Affected:AMI Aptio VRisk Level:7.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________AMI AptioV could allow a local authenticated attacker to execute arbitrary...
Ransomware attacks have become a significant and pervasive threat in the ever-evolving realm of cybersecurity. Among the various iterations of...