The Vulnerability of Zero Trust: Lessons from the Storm 0558 Hack
While IT security managers in companies and public administrations rely on the concept of Zero Trust, APTS (Advanced Persistent Threats)...
While IT security managers in companies and public administrations rely on the concept of Zero Trust, APTS (Advanced Persistent Threats)...
A coordinated law enforcement operation across 25 African countries has led to the arrest of 14 suspected cybercriminals, INTERPOL announced...
A new "mass-spreading" social engineering campaign is targeting users of the Zimbra Collaboration email server with an aim to collect...
Back in January 2020, we blogged about a tech support scam campaign dubbed WoofLocker that was by far using the...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NAME__________Genesys Administrator Extension cross-site scriptingPlatforms Affected:Genesys Administrator Extension 9.0.104.18 Genesys Administrator Extension 9.0.104.17 Genesys Administrator Extension 9.0.104.16Risk Level:6.1Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________Genesys...
NAME__________a3 Portfolio Plugin for WordPress cross-site scriptingPlatforms Affected:WordPress a3 Portfolio Plugin for WordPress 3.1.0Risk Level:5.9Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________a3 Portfolio Plugin for...
NAME__________Parsec Loader privilege escalationPlatforms Affected:Parsec Parsec Loader 7Risk Level:7.8Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION__________Parsec Loader could allow a local authenticated attacker to gain...
NAME__________InfiniteWP Client Plugin for WordPress information disclosurePlatforms Affected:WordPress InfiniteWP Client Plugin for WordPress 1.11.1Risk Level:7.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________InfiniteWP Client Plugin for...
NAME__________Image Optimizer by 10web Plugin for WordPress cross-site scriptingPlatforms Affected:WordPress Image Optimizer by 10web Plugin for WordPress 1.0.26Risk Level:6.1Exploitability:HighConsequences:Cross-Site Scripting...
NAME__________Zyxel XGS2220-30 denial of servicePlatforms Affected:Zyxel XGS2220-30 4.80(ABXN.1) Zyxel XGS2220-30F 4.80(ABYE.1) Zyxel XGS2220-30HP 4.80(ABXO.1) Zyxel XGS2220-54 4.80(ABXP.1) Zyxel XGS2220-54FP 4.80(ACCE.1)...
NAME__________PDF-XChange Editor information disclosurePlatforms Affected:PDF-XChange Editor 9.4.363.0Risk Level:3.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________PDF-XChange Editor could allow a remote attacker to obtain sensitive information,...
NAME__________Cisco P Phone 6800, 7800, and 8800 Series cross-site request forgeryPlatforms Affected:Cisco IP Phone 6800 Series Phones with Multiplatform Firmware...
NAME__________Excalidraw cross-site scriptingPlatforms Affected:Excalidraw Excalidraw 0.15.0 Excalidraw Excalidraw 0.14.2 Excalidraw Excalidraw 0.14.1 Excalidraw Excalidraw 0.14.0Risk Level:6.1Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________Excalidraw is vulnerable...
NAME__________Tiempo.com plugin for WordPress cross-site request forgeryPlatforms Affected:WordPress Tiempo.com plugin for WordPress 0.1.2Risk Level:5.4Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Tiempo.com plugin for WordPress is...
NAME__________Tracker Software PDF-XChange Editor information disclosurePlatforms Affected:Tracker Software PDF-XChange Editor 9.5.367.0Risk Level:3.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Tracker Software PDF-XChange Editor could allow a...
NAME__________Tracker Software PDF-XChange Editor information disclosurePlatforms Affected:Tracker Software PDF-XChange Editor 9.5.367.0Risk Level:3.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Tracker Software PDF-XChange Editor could allow a...
NAME__________Tracker Software PDF-XChange Editor code executionPlatforms Affected:Tracker Software PDF-XChange Editor 9.5.367.0Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Tracker Software PDF-XChange Editor could allow a...
NAME__________Walchem Intuition 9 information disclosurePlatforms Affected:Walchem Intuition 9 4.20Risk Level:6.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Walchem Intuition 9 could allow a remote authenticated attacker...
NAME__________PDF-XChange Editor information disclosurePlatforms Affected:PDF-XChange Editor 9.4.363.0Risk Level:5.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________PDF-XChange Editor could allow a remote attacker to obtain sensitive information,...
NAME__________PDF-XChange Editor information disclosurePlatforms Affected:PDF-XChange Editor 9.4.363.0Risk Level:3.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________PDF-XChange Editor could allow a remote attacker to obtain sensitive information,...
NAME__________Juniper Networks Junos OS on EX Series security bypassPlatforms Affected:Juniper Networks EX Series Juniper Networks Junos OS 21.2 Juniper Networks...
NAME__________PDF-XChange Editor code executionPlatforms Affected:PDF-XChange Editor 9.4.363.0Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________PDF-XChange Editor could allow a remote attacker to execute arbitrary code...
NAME__________PDF-XChange Editor code executionPlatforms Affected:PDF-XChange Editor 9.4.363.0Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________PDF-XChange Editor could allow a remote attacker to execute arbitrary code...