Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

37322b4d-6610-4491-8ecb-1bb2d8e8840e
  • Premium Members Content

[Deep Research] Autonomous AI Adversaries: Inside the Rise of Vibe Hacking

July 22, 2025
unlock_membership
  • Premium Members Content

Securing Critical Infrastructure in the Digital Age

July 18, 2025
unlock_membership
  • Premium Members Content

Mastering Mobile Device Security for a Safer Digital Life

July 16, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

July 14, 2025
unlock_membership
  • Premium Members Content

Mastering Web Application Security Strategies

July 11, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
image-4
  • Data Breach
  • Ransomware

Akira Ransomware Victim: European Centre for Compensation

March 26, 2024

NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...

Read MoreRead more about Akira Ransomware Victim: European Centre for
Compensation
image-4
  • Data Breach
  • Ransomware

Akira Ransomware Victim: Vita IT

March 26, 2024

NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...

Read MoreRead more about Akira Ransomware Victim: Vita IT
CVE-prog
  • Vulnerabilities

Sentrifugo cross-site scripting | CVE-2024-29877

March 26, 2024

NAME__________Sentrifugo cross-site scriptingPlatforms Affected:Sentrifugo Sentrifugo 3.2Risk Level:7.1Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________Sentrifugo is vulnerable to cross-site scripting, caused by improper validation of user-supplied...

Read MoreRead more about Sentrifugo cross-site scripting | CVE-2024-29877
CVE-prog
  • Vulnerabilities

Advantech WebAccess/SCADA SQL injection | CVE-2024-2453

March 26, 2024

NAME__________Advantech WebAccess/SCADA SQL injectionPlatforms Affected:Advantech WebAccess/SCADA 9.1.5URisk Level:6.4Exploitability:HighConsequences:Data Manipulation DESCRIPTION__________Advantech WebAccess/SCADA is vulnerable to SQL injection. A remote authenticated attacker...

Read MoreRead more about Advantech WebAccess/SCADA SQL injection | CVE-2024-2453
CVE-prog
  • Vulnerabilities

GitHub Enterprise Server cross-site request forgery | CVE-2024-2748

March 26, 2024

NAME__________GitHub Enterprise Server cross-site request forgeryPlatforms Affected:GitHub Enterprise Server 3.12.0Risk Level:4.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________GitHub Enterprise Server is vulnerable to cross-site request...

Read MoreRead more about GitHub Enterprise Server cross-site request forgery | CVE-2024-2748
CVE-prog
  • Vulnerabilities

Sentrifugo cross-site scripting | CVE-2024-29879

March 26, 2024

NAME__________Sentrifugo cross-site scriptingPlatforms Affected:Sentrifugo Sentrifugo 3.2Risk Level:7.1Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________Sentrifugo is vulnerable to cross-site scripting, caused by improper validation of user-supplied...

Read MoreRead more about Sentrifugo cross-site scripting | CVE-2024-29879
CVE-prog
  • Vulnerabilities

Logpoint cross-site scripting | CVE-2024-29865

March 26, 2024

NAME__________Logpoint cross-site scriptingPlatforms Affected:Logpoint Logpoint 7.0.1Risk Level:6.4Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________Logpoint is vulnerable to cross-site scripting, caused by improper validation of user-supplied...

Read MoreRead more about Logpoint cross-site scripting | CVE-2024-29865
CVE-prog
  • Vulnerabilities

Sentrifugo cross-site scripting | CVE-2024-29878

March 26, 2024

NAME__________Sentrifugo cross-site scriptingPlatforms Affected:Sentrifugo Sentrifugo 3.2Risk Level:7.1Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________Sentrifugo is vulnerable to cross-site scripting, caused by improper validation of user-supplied...

Read MoreRead more about Sentrifugo cross-site scripting | CVE-2024-29878
CVE-prog
  • Vulnerabilities

Datalust Seq privilege escalation | CVE-2024-29866

March 26, 2024

NAME__________Datalust Seq privilege escalationPlatforms Affected:Datalust SeqRisk Level:7.2Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION__________Datalust Seq could allow a remote authenticated attacker to gain elevated privileges...

Read MoreRead more about Datalust Seq privilege escalation | CVE-2024-29866
CVE-prog
  • Vulnerabilities

JetBrains TeamCity privilege escalation | CVE-2024-29880

March 26, 2024

NAME__________JetBrains TeamCity privilege escalationPlatforms Affected:JetBrains TeamCityRisk Level:4.2Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION__________JetBrains TeamCity could allow a local authenticated attacker to gain elevated privileges...

Read MoreRead more about JetBrains TeamCity privilege escalation | CVE-2024-29880
CVE-prog
  • Vulnerabilities

Simple File Manager Web App file upload | CVE-2024-2849

March 26, 2024

NAME__________Simple File Manager Web App file uploadPlatforms Affected:Sourcecodester Simple File Manager Web App 1.0Risk Level:6.3Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION__________Simple File...

Read MoreRead more about Simple File Manager Web App file upload | CVE-2024-2849
CVE-prog
  • Vulnerabilities

Microsoft .NET Framework information disclosure | CVE-2024-29059

March 26, 2024

NAME__________Microsoft .NET Framework information disclosurePlatforms Affected:Microsoft Microsoft .NET Framework 4.8 4.8.0 Microsoft Microsoft .NET Framework 3.5 AND 4.8 4.8.0 Microsoft...

Read MoreRead more about Microsoft .NET Framework information disclosure | CVE-2024-29059
CVE-prog
  • Vulnerabilities

EmbedPress plugin for WordPress cross-site scripting | CVE-2024-2468

March 26, 2024

NAME__________EmbedPress plugin for WordPress cross-site scriptingPlatforms Affected:WordPress WordPress WordPress EmbedPress Plugin for WordPress 3.9.5 WordPress EmbedPress Plugin for WordPress 3.9.8Risk...

Read MoreRead more about EmbedPress plugin for WordPress cross-site scripting | CVE-2024-2468
CVE-prog
  • Vulnerabilities

Sourcecodester PHP Task Management System SQL injection | CVE-2024-29302

March 26, 2024

NAME__________Sourcecodester PHP Task Management System SQL injectionPlatforms Affected:SourceCodester PHP Task Management System 1.0Risk Level:5.4Exploitability:HighConsequences:Data Manipulation DESCRIPTION__________Sourcecodester PHP Task Management System...

Read MoreRead more about Sourcecodester PHP Task Management System SQL injection | CVE-2024-29302
CVE-prog
  • Vulnerabilities

WiX Toolset security bypass | CVE-2024-29188

March 26, 2024

NAME__________WiX Toolset security bypassPlatforms Affected:WiX Toolset WiX Toolset 4.0.4Risk Level:7.9Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________WiX Toolset could allow a local authenticated attacker to...

Read MoreRead more about WiX Toolset security bypass | CVE-2024-29188
CVE-prog
  • Vulnerabilities

Microsoft Edge (Chromium-based) spoofing | CVE-2024-29057

March 26, 2024

NAME__________Microsoft Edge (Chromium-based) spoofingPlatforms Affected:Microsoft Microsoft Edge (Chromium-based) 1.0.0Risk Level:4.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Microsoft Edge (Chromium-based) could allow a remote attacker to...

Read MoreRead more about Microsoft Edge (Chromium-based) spoofing | CVE-2024-29057
CVE-prog
  • Vulnerabilities

Sourcecodester PHP Task Management System SQL injection | CVE-2024-29303

March 26, 2024

NAME__________Sourcecodester PHP Task Management System SQL injectionPlatforms Affected:SourceCodester PHP Task Management System 1.0Risk Level:5.4Exploitability:HighConsequences:Data Manipulation DESCRIPTION__________Sourcecodester PHP Task Management System...

Read MoreRead more about Sourcecodester PHP Task Management System SQL injection | CVE-2024-29303
CVE-prog
  • Vulnerabilities

Microsoft Edge (Chromium-based) security bypass | CVE-2024-26247

March 26, 2024

NAME__________Microsoft Edge (Chromium-based) security bypassPlatforms Affected:Microsoft Microsoft Edge (Chromium-based) 1.0.0Risk Level:4.7Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Microsoft Edge (Chromium-based) could allow a remote attacker...

Read MoreRead more about Microsoft Edge (Chromium-based) security bypass | CVE-2024-26247
CVE-prog
  • Vulnerabilities

WiX Toolset privilege escalation | CVE-2024-29187

March 26, 2024

NAME__________WiX Toolset privilege escalationPlatforms Affected:WiX Toolset WiX Toolset 4.0.4Risk Level:7.3Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION__________WiX Toolset could allow a local authenticated attacker to...

Read MoreRead more about WiX Toolset privilege escalation | CVE-2024-29187
CVE-prog
  • Vulnerabilities

Sourcecodester PHP Task Management System SQL injection | CVE-2024-29301

March 26, 2024

NAME__________Sourcecodester PHP Task Management System SQL injectionPlatforms Affected:SourceCodester PHP Task Management System 1.0Risk Level:5.4Exploitability:HighConsequences:Data Manipulation DESCRIPTION__________Sourcecodester PHP Task Management System...

Read MoreRead more about Sourcecodester PHP Task Management System SQL injection | CVE-2024-29301
CVE-prog
  • Vulnerabilities

phpMyFAQ cross-site scripting | CVE-2024-28106

March 26, 2024

NAME__________phpMyFAQ cross-site scriptingPlatforms Affected:phpMyFAQ phpMyFAQ 3.2.5Risk Level:4.3Exploitability:UnprovenConsequences:Cross-Site Scripting DESCRIPTION__________phpMyFAQ is vulnerable to cross-site scripting, caused by improper validation of user-supplied...

Read MoreRead more about phpMyFAQ cross-site scripting | CVE-2024-28106
CVE-prog
  • Vulnerabilities

phpMyFAQ file upload | CVE-2024-28105

March 26, 2024

NAME__________phpMyFAQ file uploadPlatforms Affected:phpMyFAQ phpMyFAQ 3.2.5Risk Level:7.2Exploitability:UnprovenConsequences:File Manipulation DESCRIPTION__________phpMyFAQ could allow a remote authenticated attacker to upload arbitrary files caused...

Read MoreRead more about phpMyFAQ file upload | CVE-2024-28105
CVE-prog
  • Vulnerabilities

Anope weak security | CVE-2024-30187

March 26, 2024

NAME__________Anope weak securityPlatforms Affected:Anope Anope 2.0.14Risk Level:6.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Anope could provide weaker than expected security, caused by failing to prevent...

Read MoreRead more about Anope weak security | CVE-2024-30187
CVE-prog
  • Vulnerabilities

TvRock cross-site scripting | CVE-2024-26018

March 26, 2024

NAME__________TvRock cross-site scriptingPlatforms Affected:TvRock TvRock 0.9t8aRisk Level:6.1Exploitability:UnprovenConsequences:Cross-Site Scripting DESCRIPTION__________TvRock is vulnerable to cross-site scripting, caused by improper validation of user-supplied...

Read MoreRead more about TvRock cross-site scripting | CVE-2024-26018

Posts pagination

Previous 1 … 1,314 1,315 1,316 1,317 1,318 1,319 1,320 … 4,265 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[CRYPTO24] – Ransomware Victim: SOUBEIRAN CHOBET S[.]R[.]L[.]

July 22, 2025
image
  • Data Breach
  • Ransomware

[AKIRA] – Ransomware Victim: Pinnacle Woodwork

July 22, 2025
image
  • Data Breach
  • Ransomware

[LYNX] – Ransomware Victim: Nippn TH

July 22, 2025
0f645a392b509c847d4a19b40e1ad8aa777b70e3d5b060d0da8925cb3ab62dc7
  • News

If You’re Forced To Use Windows 11, Here’s How To Steal Some Of Your Time Back

July 22, 2025
9a407790e0d9a3e8767874ef549d60009f0b5ec7e1070c2c60d04a6cc2613ccb
  • News

Japan Discovers Object Out Beyond Pluto That Rewrites The Planet 9 Theory

July 22, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel