New Python Variant of Chaes Malware Targets Banking and Logistics Industries
Banking and logistics industries are under the onslaught of a reworked variant of a malware called Chaes. "It has undergone...
Banking and logistics industries are under the onslaught of a reworked variant of a malware called Chaes. "It has undergone...
In today's digital age, it's not just about being online but how securely your organization operates online. Regardless of size...
The Computer Emergency Response Team of Ukraine (CERT-UA) on Tuesday said it thwarted a cyber attack against an unnamed critical...
Nine security flaws have been disclosed in electric power management products made by Schweitzer Engineering Laboratories (SEL). "The most severe...
A previously undocumented "phishing empire" has been linked to cyber attacks aimed at compromising Microsoft 365 business email accounts over...
An updated version of a malware loader known as BLISTER is being used as part of SocGholish infection chains to...
The role of the CISO keeps taking center stage as a business enabler: CISOs need to navigate the complex landscape...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NAME__________GPAC interger overflowPlatforms Affected:GPAC GPAC 2.3-DEV-revreleaseRisk Level:5.9Exploitability:Proof of ConceptConsequences:Denial of Service DESCRIPTION__________GPAC could allow a remote attacker to execute arbitrary...
NAME__________Waiting: One-click countdowns Plugin for cross-site request forgery,Platforms Affected:WordPress One-click countdowns Plugin for WordPress 0.6.2Risk Level:6.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Waiting: One-click countdowns...
NAME__________GPAC stack-based buffer overflowPlatforms Affected:GPAC GPAC 2.3-DEV-revreleaseRisk Level:5.9Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION__________GPAC is vulnerable to a stack-based buffer overflow, caused...
NAME__________General Solutions Steiner GmbH CASE 3 Taskmanagement cross-site scriptingPlatforms Affected:General Solutions Steiner GmbH CASE 3 Taskmanagement 3.3Risk Level:6.1Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________General...
NAME__________GPAC denial of servicePlatforms Affected:GPAC GPAC 2.3-DEV-revreleaseRisk Level:3.3Exploitability:Proof of ConceptConsequences:Denial of Service DESCRIPTION__________GPAC is vulnerable to a denial of service,...
NAME__________Typora cross-site scriptingPlatforms Affected:Typora Typora 1.6.7Risk Level:6.1Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________Typora is vulnerable to cross-site scripting, caused by improper validation of user-supplied...
NAME__________GPAC denial of servicePlatforms Affected:GPAC GPAC 2.3-DEV-revreleaseRisk Level:5.9Exploitability:Proof of ConceptConsequences:Denial of Service DESCRIPTION__________GPAC is vulnerable to a denial of service,...
NAME__________UNISOC mobile phone chipsets for Android information disclosurePlatforms Affected:Unisoc SC9863A Unisoc SC9832E Unisoc SC7731E Unisoc T610 Unisoc T606 Unisoc T618...
NAME__________General Solutions Steiner GmbH CASE 3 Taskmanagement cross-site scriptingPlatforms Affected:General Solutions Steiner GmbH CASE 3 Taskmanagement 3.3Risk Level:6.1Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________General...
NAME__________GPAC heap-based buffer overflowPlatforms Affected:GPAC GPAC 2.3-DEV-revreleaseRisk Level:5.9Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION__________GPAC is vulnerable to a heap-based buffer overflow, caused...
NAME__________General Solutions Steiner GmbH CASE 3 Taskmanagement cross-site scriptingPlatforms Affected:General Solutions Steiner GmbH CASE 3 Taskmanagement 3.3Risk Level:6.1Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________General...
NAME__________GPAC code executionPlatforms Affected:GPAC GPAC 2.3-DEV-revreleaseRisk Level:5.9Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION__________GPAC could allow a remote attacker to execute arbitrary code...
NAME__________Vim code executionPlatforms Affected:vim vim 9.0.1672Risk Level:7.3Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION__________Vim could allow a remote authenticated attacker to execute arbitrary...
NAME__________vyperlang Vyper unspecifiedPlatforms Affected:Vyper Vyper 0.3.9Risk Level:3.7Exploitability:UnprovenConsequences:Unknown DESCRIPTION__________An unspecified error with incorrect order of evaluation of side effects for some...
NAME__________UNISOC mobile phone chipsets for Android information disclosurePlatforms Affected:Unisoc SC9863A Unisoc SC9832E Unisoc SC7731E Unisoc T610 Unisoc T606 Unisoc T618...
NAME__________General Solutions Steiner GmbH CASE 3 Taskmanagement cross-site scriptingPlatforms Affected:General Solutions Steiner GmbH CASE 3 Taskmanagement 3.3Risk Level:6.1Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________General...