Actian Zen PSQL security bypass | CVE-2022-40756
NAME Actian Zen PSQL security bypass Platforms Affected:Actian Zen PSQL 15.11.004 Actian Zen PSQL 15.01.016 Actian Zen PSQL 14.21.021Risk Level:8.8Exploitability:UnprovenConsequences:Bypass...
NAME Actian Zen PSQL security bypass Platforms Affected:Actian Zen PSQL 15.11.004 Actian Zen PSQL 15.01.016 Actian Zen PSQL 14.21.021Risk Level:8.8Exploitability:UnprovenConsequences:Bypass...
NAME Microsoft Edge (Chromium-based) spoofing Platforms Affected:Microsoft Edge (Chromium-based) 106.0Risk Level:8.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Microsoft Edge (Chromium-based) could allow a remote...
NAME Node.js sfos-ui module code execution Platforms Affected:Node.js sfos-uiRisk Level:9.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Node.js sfos-ui module could allow a remote attacker...
NAME Node.js wumonster module code execution Platforms Affected:Node.js wumonsterRisk Level:9.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Node.js wumonster module could allow a remote attacker...
NAME Node.js ccctftest module code execution Platforms Affected:Node.js ccctftestRisk Level:9.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Node.js ccctftest module could allow a remote attacker...
Researchers link recently discovered Linux ransomware Cheerscrypt to the China-linked cyberespionage group DEV-0401. Researchers at cybersecurity firm Sygnia attributed the...
The mitigation shared by Microsoft for the two recently disclosed Exchange zero-day vulnerabilities can be bypassed, expert warns. Last week,...
Daily Vulnerability Trends (sourced from VulnMon) CVE NAMECVE DescriptionCVE-2022-0847A flaw was found in the way the "flags" member of the...
Earlier this year, we started hunting for possible new DeftTorero (aka Lebanese Cedar, Volatile Cedar) artifacts. This threat actor is...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Posh C2". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Posh C2". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Posh C2". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Posh C2". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Posh C2". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Posh C2". Depending on when you are viewing this...
A threat actor used a trojanized installer for the Comm100 Live Chat application to distribute a JavaScript backdoor. Cybersecurity firm...