BreachForums Database Leak Alert: Toumei
BreachForums - Databreach discussion & leaks forum. NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
BreachForums - Databreach discussion & leaks forum. NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
BreachForums - Databreach discussion & leaks forum. NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
A new cyber attack campaign has been observed using spurious MSIX Windows app package files for popular software such as...
A new ongoing campaign dubbed EleKtra-Leak has set its eyes on exposed Amazon Web Service (AWS) identity and access management...
Modern web app development relies on cloud infrastructure and containerization. These technologies scale on demand, handling millions of daily file...
Earlier this week, ServiceNow announced on its support site that misconfigurations within the platform could result in "unintended access" to...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
NAME__________JumpServer information disclosurePlatforms Affected:JumpServer JumpServer 3.7.2Risk Level:5.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________JumpServer could allow a remote attacker to obtain sensitive information, caused by...
NAME__________Man Group D-Tale cross-site scriptingPlatforms Affected:Man Group D-Tale 3.6.0Risk Level:6.1Exploitability:HighConsequences:Gain Access DESCRIPTION__________Man Group D-Tale is vulnerable to cross-site scripting, caused...
NAME__________Stellar rs-stellar-strkey denial of servicePlatforms Affected:Stellar rs-stellar-strkey 0.0.7Risk Level:5.3Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Stellar rs-stellar-strkey is vulnerable to a denial of service,...
NAME__________Linux Kernel denial of servicePlatforms Affected:Linux Kernel 6.5.9Risk Level:5.5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Linux Kernel is vulnerable to a denial of service,...
NAME__________CryptoES information disclosurePlatforms Affected:CryptoES CryptoES 2.0.4Risk Level:7.4Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________CryptoES could allow a remote attacker to obtain sensitive information, caused by...
NAME__________D-Link DAR-7000 SQL injectionPlatforms Affected:D-Link DAR-7000 V31R02B1413CRisk Level:6.5Exploitability:HighConsequences:Data Manipulation DESCRIPTION__________D-Link DAR-7000 is vulnerable to SQL injection. A remote attacker could...
NAME__________Twisted security bypassPlatforms Affected:Twisted Twisted 23.8.0Risk Level:5.3Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Twisted could allow a remote attacker to bypass security restrictions, caused by...
NAME__________CallRail Phone Call Tracking plugin for WordPress cross-site scriptingPlatforms Affected:WordPress CallRail Phone Call Tracking plugin for WordPress 0.5.2Risk Level:6.4Exploitability:HighConsequences:Cross-Site Scripting...
NAME__________Zephyr Project Zephyr buffer overflowPlatforms Affected:Zephyr Project Zephyr 3.4.0Risk Level:6.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Zephyr Project Zephyr is vulnerable to a buffer overflow,...
NAME__________Tenable Nessus Network Monitor privilege escalationPlatforms Affected:Tenable Nessus Network Monitor 6.2.3Risk Level:7.1Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION__________Tenable Nessus Network Monitor could allow a...
NAME__________Zephyr buffer overflowPlatforms Affected:Zephyr Project Zephyr 3.4.0Risk Level:4.4Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Zephyr is vulnerable to a buffer overflow, caused by improper bounds...
NAME__________Obl.ong security bypassPlatforms Affected:Obl.ong Obl.ong 1.1.1Risk Level:7.5Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Obl.ong could allow a remote attacker to bypass security restrictions, caused by...
NAME__________Tenable Nessus Network Monitor code executionPlatforms Affected:Tenable Nessus Network Monitor 6.2.3Risk Level:7Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Tenable Nessus Network Monitor could allow a...
NAME__________SourceCodester Task Reminder System SQL injectionPlatforms Affected:Sourcecodester Task Reminder System 1.0Risk Level:6.3Exploitability:HighConsequences:Data Manipulation DESCRIPTION__________SourceCodester Task Reminder System is vulnerable to...