Medusa Locker Ransomware Victim: Richmond Fellowship Scotland
Medusa Locker Logo NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the...
Medusa Locker Logo NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the...
Medusa Locker Logo NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the...
Medusa Locker Logo NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the...
Black Basta Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
We analyzed 2,5 million vulnerabilities we discovered in our customer's assets. This is what we found. Digging into the data...
The U.S. Federal Trade Commission (FTC) is continuing to clamp down on data brokers by prohibiting InMarket Media from selling...
Cybersecurity researchers have discovered a new Java-based "sophisticated" information stealer that uses a Discord bot to exfiltrate sensitive data from...
NAME__________Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition unspecifiedPlatforms Affected:Oracle GraalVM Enterprise Edition 21.3.8 Oracle GraalVM Enterprise...
NAME__________TianoCore EDK II denial of servicePlatforms Affected:Risk Level:7.5Exploitability:Proof of ConceptConsequences:Denial of Service DESCRIPTION__________TianoCore EDK II is vulnerable to a denial...
NAME__________TianoCore EDK II information disclosurePlatforms Affected:Risk Level:6.5Exploitability:Proof of ConceptConsequences:Obtain Information DESCRIPTION__________TianoCore EDK II could allow a remote attacker to obtain...
NAME__________Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition unspecifiedPlatforms Affected:Oracle GraalVM Enterprise Edition 21.3.8 Oracle GraalVM Enterprise...
NAME__________TianoCore EDK II denial of servicePlatforms Affected:Risk Level:7.5Exploitability:Proof of ConceptConsequences:Denial of Service DESCRIPTION__________TianoCore EDK II is vulnerable to a denial...
NAME__________Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition unspecifiedPlatforms Affected:Oracle GraalVM Enterprise Edition 21.3.8 Oracle GraalVM Enterprise...
NAME__________Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition unspecifiedPlatforms Affected:Oracle GraalVM Enterprise Edition 22.3.2 Oracle GraalVM Enterprise...
NAME__________PHPGurukul Company Visitor Management System cross-site scriptingPlatforms Affected:PHPGurukul Company Visitor Management System 1.0Risk Level:6.1Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________PHPGurukul Company Visitor Management System...
NAME__________TianoCore EDK II information disclosurePlatforms Affected:Risk Level:5.8Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________TianoCore EDK II could allow a remote attacker to obtain sensitive information,...
NAME__________Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition unspecifiedPlatforms Affected:Oracle GraalVM Enterprise Edition 22.3.2 Oracle GraalVM Enterprise...
NAME__________Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition unspecifiedPlatforms Affected:Oracle GraalVM Enterprise Edition 22.3.2 Oracle GraalVM Enterprise...
NAME__________ZhiHuiYun server-side request forgeryPlatforms Affected:ZhiHuiYun ZhiHuiYun 4.4.13Risk Level:7.2Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________ZhiHuiYun is vulnerable to server-side request forgery, caused by a flaw...
NAME__________Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition unspecifiedPlatforms Affected:Oracle GraalVM Enterprise Edition 22.3.2 Oracle GraalVM Enterprise...
NAME__________Sparksuite SimpleMDE cross-site scriptingPlatforms Affected:Sparksuite SimpleMDE 1.11.2Risk Level:6.1Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________Sparksuite SimpleMDE is vulnerable to cross-site scripting, caused by improper validation...
NAME__________Plone CMS cross-frame scriptingPlatforms Affected:Plone Plone CMS 6.0.6Risk Level:6.3Exploitability:HighConsequences:Obtain Information DESCRIPTION__________Plone CMS is vulnerable to cross-frame scripting, caused by improper...
NAME__________AtroCore AtroPIM cross-site scriptingPlatforms Affected:AtroCore AtroPIM 1.8.4Risk Level:6.1Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________AtroCore AtroPIM is vulnerable to cross-site scripting, caused by improper validation...
NAME__________DeepFaceLab code executionPlatforms Affected:DeepFaceLab DeepFaceLab pretrained DeepFaceLab DeepFaceLab DF.wf.288res.384.92.72.22Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________DeepFaceLab could allow a remote attacker to execute arbitrary...