Medusa Locker Ransomware Victim: Limburg
Medusa Locker Logo NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the...
Medusa Locker Logo NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the...
Medusa Locker Logo NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the...
Generative AI will enable anyone to launch sophisticated phishing attacks that only Next-generation MFA devices can stop The least surprising...
Cybersecurity researchers have identified an updated version of a macOS information stealer called Atomic (or AMOS), indicating that the threat...
Ivanti has disclosed two zero-day vulnerabilities (CVE-2023-46805 and CVE-2024-21887) that are being actively exploited. The vulnerabilities are:- CVE-2023-46805: Successful exploitation of...
NAME__________AMI MegaRAC SP-X Baseboard Management Controllers code executionPlatforms Affected:AMI MegaRAC SPX 13Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________AMI MegaRAC SP-X Baseboard Management Controllers...
NAME__________Microsoft Windows TCP/IP information disclosurePlatforms Affected:Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 Microsoft Windows 10 x32 Microsoft Windows...
NAME__________SAP S/4HANA Finance security bypassPlatforms Affected:SAP S/4HANA Finance SAPSCORE 128 SAP S/4HANA Finance S4CORE 10Risk Level:6.4Exploitability:UnprovenConsequences:Other DESCRIPTION__________SAP S/4HANA Finance could...
NAME__________OpenSSL denial of servicePlatforms Affected:OpenSSL OpenSSL 3.0.0 OpenSSL OpenSSL 3.1.0 OpenSSL OpenSSL 3.2.0Risk Level:5.9Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________OpenSSL is vulnerable to...
NAME__________AMI MegaRAC SP-X Baseboard Management Controllers code executionPlatforms Affected:AMI MegaRAC SPX 13Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________AMI MegaRAC SP-X Baseboard Management Controllers...
NAME__________Multiple TP-LINK products command executionPlatforms Affected:TP-Link Archer AX3000 TP-Link Archer AX5400 TP-Link Deco X50 TP-Link Deco XE200 TP-Link Archer AXE75Risk...
NAME__________Multiple TP-LINK products command executionPlatforms Affected:TP-Link Archer AX3000 TP-Link Archer AX5400 TP-Link Archer AXE75Risk Level:7.1Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Multiple TP-LINK products could...
NAME__________IBM AIX denial of servicePlatforms Affected:IBM AIX 7.2 IBM VIOS 3.1 IBM AIX 7.3Risk Level:6.2Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________IBM AIX 7.2,...
NAME__________IBM AIX denial of servicePlatforms Affected:IBM AIX 7.2 IBM VIOS 3.1 IBM AIX 7.3Risk Level:6.2Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________IBM AIX 7.2,...
NAME__________IBM AIX denial of servicePlatforms Affected:IBM AIX 7.2 IBM VIOS 3.1 IBM AIX 7.3Risk Level:6.2Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________IBM AIX 7.2,...
NAME__________IBM Security Access Manager Container information disclosurePlatforms Affected:IBM Security Verify Access Appliance 10.0.0.0 IBM Security Verify Access Docker 10.0.0.0 IBM...
NAME__________Multiple TP-LINK products command executionPlatforms Affected:TP-Link Archer AX3000 TP-Link Archer AX5400 TP-Link Deco X50 TP-Link Deco XE200Risk Level:7.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Multiple...
NAME__________Lenovo XClarity Administrator information disclosurePlatforms Affected:Lenovo XClarity Administrator 3.6 Lenovo XClarity Administrator 4.0Risk Level:6.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Lenovo XClarity Administrator could allow...
NAME__________Apache Answer security bypassPlatforms Affected:Apache Answer 1.2.0Risk Level:5.3Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Apache Answer could allow a remote attacker to bypass security restrictions,...
NAME__________MetaCPAN Spreadsheet::ParseXLSX package for Perl denial of servicePlatforms Affected:MetaCPAN Spreadsheet::ParseXLSX for Perl 0.27Risk Level:7.5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________MetaCPAN Spreadsheet::ParseXLSX package for...
NAME__________TianoCore EDK2 buffer overflowPlatforms Affected:TianoCore EDK II 202311Risk Level:7Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________TianoCore EDK2 is vulnerable to a heap-based buffer overflow, caused...
NAME__________Cisco EPNM and Cisco Prime Infrastructure SQL injectionPlatforms Affected:Cisco Prime Infrastructure Cisco Evolved Programmable Network ManagerRisk Level:6.5Exploitability:HighConsequences:Data Manipulation DESCRIPTION__________Cisco EPNM...
NAME__________TianoCore EDK2 buffer overflowPlatforms Affected:TianoCore EDK II 202311Risk Level:7Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________TianoCore EDK2 is vulnerable to a heap-based buffer overflow, caused...
NAME__________IBM Security Access Manager Appliance information disclosurePlatforms Affected:IBM Security Verify Access Appliance 10.0.0.0 IBM Security Verify Access Docker 10.0.0.0 IBM...