Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Ethical Hacking and Penetration Testing: A Practical Guide to Secure Systems

November 3, 2025
unlock_membership
  • Premium Members Content

Ransomware Attacks Demystified A Practical Guide for 2025

October 29, 2025
unlock_membership
  • Premium Members Content

Forensic Analysis Unlocked A Practical Guide for Cybersecurity Investigators

October 27, 2025
unlock_membership
  • Premium Members Content

Artificial Intelligence and Cybersecurity A New Era of Defense

October 13, 2025
unlock_membership
  • Premium Members Content

Fortifying Web Apps Practical Guide to Web Application Security

September 26, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
CVE-prog
  • Vulnerabilities

GNU Emacs weak security | CVE-2024-30205

March 27, 2024

NAME__________GNU Emacs weak securityPlatforms Affected:GUN Emacs 29.2Risk Level:7.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________GNU Emacs could provide weaker than expected security, caused by an...

Read MoreRead more about GNU Emacs weak security | CVE-2024-30205
CVE-prog
  • Vulnerabilities

Wallos file upload |

March 27, 2024

NAME__________Wallos file uploadPlatforms Affected:Wallos Wallos 1.11.1Risk Level:6.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Wallos could allow a remote authenticated attacker to upload arbitrary files, caused...

Read MoreRead more about Wallos file upload |
CVE-prog
  • Vulnerabilities

GNU Emacs weak security | CVE-2024-30204

March 27, 2024

NAME__________GNU Emacs weak securityPlatforms Affected:GUN Emacs 29.2Risk Level:7.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________GNU Emacs could provide weaker than expected security, caused by an...

Read MoreRead more about GNU Emacs weak security | CVE-2024-30204
CVE-prog
  • Vulnerabilities

Azure C Shared Utility integer overflow | CVE-2024-29195

March 27, 2024

NAME__________Azure C Shared Utility integer overflowPlatforms Affected:Azure azure-c-shared-utility 2023-12-01Risk Level:6Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Azure C Shared Utility could allow a remote authenticated...

Read MoreRead more about Azure C Shared Utility integer overflow | CVE-2024-29195
CVE-prog
  • Vulnerabilities

Apple macOS Sonoma and Safari denial of service | CVE-2024-42956

March 27, 2024

NAME__________Apple macOS Sonoma and Safari denial of servicePlatforms Affected:Apple macOS Sonoma 14.1 Apple Safari 17.1Risk Level:6.5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Apple macOS...

Read MoreRead more about Apple macOS Sonoma and Safari denial of service | CVE-2024-42956
CVE-prog
  • Vulnerabilities

GNU Emacs weak security | CVE-2024-30203

March 27, 2024

NAME__________GNU Emacs weak securityPlatforms Affected:GUN Emacs 29.2Risk Level:7.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________GNU Emacs could provide weaker than expected security, caused by an...

Read MoreRead more about GNU Emacs weak security | CVE-2024-30203
CVE-prog
  • Vulnerabilities

Mobile Shop SQL injection |

March 27, 2024

NAME__________Mobile Shop SQL injectionPlatforms Affected:Mobile Shop Mobile Shop 1.0Risk Level:6.5Exploitability:HighConsequences:Data Manipulation DESCRIPTION__________Mobile Shop is vulnerable to SQL injection. A remote...

Read MoreRead more about Mobile Shop SQL injection |
CVE-prog
  • Vulnerabilities

LimeSurvey Community Edition cross-site scripting | CVE-2024-24506

March 27, 2024

NAME__________LimeSurvey Community Edition cross-site scriptingPlatforms Affected:LimeSurvey LimeSurvey Community 5.3.32Risk Level:5.5Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________LimeSurvey Community Edition is vulnerable to cross-site scripting, caused...

Read MoreRead more about LimeSurvey Community Edition cross-site scripting | CVE-2024-24506
CVE-prog
  • Vulnerabilities

IBM App Connect Enterprise and IBM Integration Bus for z/OS information disclosure | CVE-2024-22356

March 27, 2024

NAME__________IBM App Connect Enterprise and IBM Integration Bus for z/OS information disclosurePlatforms Affected:IBM App Connect Enterprise 11.0.0.1 IBM App Connect...

Read MoreRead more about IBM App Connect Enterprise and IBM Integration Bus for z/OS information disclosure | CVE-2024-22356
CVE-prog
  • Vulnerabilities

LG LED Assistant directory traversal | CVE-2024-2863

March 27, 2024

NAME__________LG LED Assistant directory traversalPlatforms Affected:LG LED AssistantRisk Level:5.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________LG LED Assistant could allow a remote attacker to traverse...

Read MoreRead more about LG LED Assistant directory traversal | CVE-2024-2863
CVE-prog
  • Vulnerabilities

Nautobot information disclosure | CVE-2024-29199

March 27, 2024

NAME__________Nautobot information disclosurePlatforms Affected:Nautobot Nautobot 1.6.6 Nautobot Nautobot 2.0.5Risk Level:3.7Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Nautobot could allow a remote attacker to obtain sensitive...

Read MoreRead more about Nautobot information disclosure | CVE-2024-29199
CVE-prog
  • Vulnerabilities

PyAnsys Geometry command execution | CVE-2024-29189

March 27, 2024

NAME__________PyAnsys Geometry command executionPlatforms Affected:ansys pyansys-geometry >= 0.3.0 < 0.3.3Risk Level:7.4Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________PyAnsys Geometry could allow a local attacker to...

Read MoreRead more about PyAnsys Geometry command execution | CVE-2024-29189
CVE-prog
  • Vulnerabilities

0ch BBS Script cross-site scripting | CVE-2024-28126

March 27, 2024

NAME__________0ch BBS Script cross-site scriptingPlatforms Affected:0ch BBS ScriptRisk Level:6.1Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________0ch BBS Script is vulnerable to cross-site scripting, caused by...

Read MoreRead more about 0ch BBS Script cross-site scripting | CVE-2024-28126
CVE-prog
  • Vulnerabilities

Rockwell Automation Arena Simulation buffer overflow | CVE-2024-21913

March 27, 2024

NAME__________Rockwell Automation Arena Simulation buffer overflowPlatforms Affected:Rockwell Automation Arena Simulation Software 16.00Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Rockwell Automation Arena Simulation is vulnerable...

Read MoreRead more about Rockwell Automation Arena Simulation buffer overflow | CVE-2024-21913
CVE-prog
  • Vulnerabilities

Mini Thread provided by Flash CGI cross-site scripting | CVE-2022-8034

March 27, 2024

NAME__________Mini Thread provided by Flash CGI cross-site scriptingPlatforms Affected:Flash CGI Mini Thread 3.31 bataRisk Level:6.1Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________Mini Thread provided by...

Read MoreRead more about Mini Thread provided by Flash CGI cross-site scripting | CVE-2022-8034
CVE-prog
  • Vulnerabilities

IBM Common Cryptographic Architecture information disclosure | CVE-2023-33855

March 27, 2024

NAME__________IBM Common Cryptographic Architecture information disclosurePlatforms Affected:IBM Common Cryptographic Architecture 7.0.0 IBM Common Cryptographic Architecture 7.5.36 IBM 4769 Developers Toolkit...

Read MoreRead more about IBM Common Cryptographic Architecture information disclosure | CVE-2023-33855
CVE-prog
  • Vulnerabilities

phpMyFAQ directory traversal | CVE-2024-29196

March 27, 2024

NAME__________phpMyFAQ directory traversalPlatforms Affected:phpMyFAQ phpMyFAQ 3.2.5Risk Level:3.8Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________phpMyFAQ could allow a remote authenticated attacker to traverse directories on the...

Read MoreRead more about phpMyFAQ directory traversal | CVE-2024-29196
CVE-prog
  • Vulnerabilities

VK All in One Expansion Unit Plugin for WordPress cross-site scripting | CVE-2024-2170

March 27, 2024

NAME__________VK All in One Expansion Unit Plugin for WordPress cross-site scriptingPlatforms Affected:WordPress VK All in One Expansion Unit Plugin for...

Read MoreRead more about VK All in One Expansion Unit Plugin for WordPress cross-site scripting | CVE-2024-2170
CVE-prog
  • Vulnerabilities

IBM Common Cryptographic Architecture denial of service | CVE-2023-47150

March 27, 2024

NAME__________IBM Common Cryptographic Architecture denial of servicePlatforms Affected:IBM Common Cryptographic Architecture 7.0.0 IBM Common Cryptographic Architecture 7.5.36 IBM 4769 Developers...

Read MoreRead more about IBM Common Cryptographic Architecture denial of service | CVE-2023-47150
CVE-prog
  • Vulnerabilities

Dell Grab for Windows information disclosure | CVE-2024-25957

March 27, 2024

NAME__________Dell Grab for Windows information disclosurePlatforms Affected:Dell Dell Grab for Windows 5.0.4Risk Level:4.8Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Dell Grab for Windows could allow...

Read MoreRead more about Dell Grab for Windows information disclosure | CVE-2024-25957
CVE-prog
  • Vulnerabilities

Dell Grab for Windows privilege escalation | CVE-2024-25958

March 27, 2024

NAME__________Dell Grab for Windows privilege escalationPlatforms Affected:Dell Dell Grab for Windows 5.0.4Risk Level:6.7Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION__________Dell Grab for Windows could allow...

Read MoreRead more about Dell Grab for Windows privilege escalation | CVE-2024-25958
CVE-prog
  • Vulnerabilities

Rockwell Automation Arena Simulation information disclosure | CVE-2024-21920

March 27, 2024

NAME__________Rockwell Automation Arena Simulation information disclosurePlatforms Affected:Rockwell Automation Arena Simulation Software 16.00Risk Level:4.4Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Rockwell Automation Arena Simulation could allow...

Read MoreRead more about Rockwell Automation Arena Simulation information disclosure | CVE-2024-21920
CVE-prog
  • Vulnerabilities

Rockwell Automation Arena Simulation code execution | CVE-2024-21919

March 27, 2024

NAME__________Rockwell Automation Arena Simulation code executionPlatforms Affected:Rockwell Automation Arena Simulation Software 16.00Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Rockwell Automation Arena Simulation could allow...

Read MoreRead more about Rockwell Automation Arena Simulation code execution | CVE-2024-21919
CVE-prog
  • Vulnerabilities

Apache Airflow security bypass | CVE-2024-29735

March 27, 2024

NAME__________Apache Airflow security bypassPlatforms Affected:Apache Airflow 2.8.2 Apache Airflow 2.8.3Risk Level:4.9Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Apache Airflow could allow a remote authenticated attacker...

Read MoreRead more about Apache Airflow security bypass | CVE-2024-29735

Posts pagination

Previous 1 … 1,568 1,569 1,570 1,571 1,572 1,573 1,574 … 4,522 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware Qilin ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[CRYPTO24] – Ransomware Victim: AsahiKASEI MICRODEVICES

November 12, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-59511 – Microsoft – Windows 10 Version 1809

November 12, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-59512 – Microsoft – Windows 10 Version 1809

November 12, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-59507 – Microsoft – Windows 10 Version 1809

November 12, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-59508 – Microsoft – Windows 10 Version 1809

November 12, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel