Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Mobile Device Security for a Safer Digital Life

July 16, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

July 14, 2025
unlock_membership
  • Premium Members Content

Mastering Web Application Security Strategies

July 11, 2025
unlock_membership
  • Premium Members Content

Unlocking the Power of Zero Trust Security for Modern Organizations

July 9, 2025
unlock_membership
  • Premium Members Content

Unlocking Blockchain Security Strategies for a Safer Digital Future

July 7, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
CVE-prog
  • Vulnerabilities

WOLF Plugin for WordPress cross-site scripting | CVE-2023-44990

October 21, 2023

NAME__________WOLF Plugin for WordPress cross-site scriptingPlatforms Affected:WordPress WOLF Plugin for WordPress 1.0.7.1Risk Level:5.9Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________WOLF Plugin for WordPress is vulnerable...

Read MoreRead more about WOLF Plugin for WordPress cross-site scripting | CVE-2023-44990
CVE-prog
  • Vulnerabilities

Directus denial of service | CVE-2023-45820

October 21, 2023

NAME__________Directus denial of servicePlatforms Affected:Directus Directus 10.4 Directus Directus 10.6.1Risk Level:5.9Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Directus is vulnerable to a denial of...

Read MoreRead more about Directus denial of service | CVE-2023-45820
CVE-prog
  • Vulnerabilities

AI ChatBot plugin for WordPress cross-site request forgery | CVE-2023-5655

October 21, 2023

NAME__________AI ChatBot plugin for WordPress cross-site request forgeryPlatforms Affected:WordPress AI ChatBot plugin for WordPress 4.9.2Risk Level:4.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________AI ChatBot plugin...

Read MoreRead more about AI ChatBot plugin for WordPress cross-site request forgery | CVE-2023-5655
CVE-prog
  • Vulnerabilities

VMware Workstation and Fusion information disclosure | CVE-2023-34044

October 21, 2023

NAME__________VMware Workstation and Fusion information disclosurePlatforms Affected:VMware Fusion 13 VMware Workstation 17Risk Level:7.1Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________VMware Workstation and Fusion could allow...

Read MoreRead more about VMware Workstation and Fusion information disclosure | CVE-2023-34044
CVE-prog
  • Vulnerabilities

Order auto complete for WooCommerce Plugin for WordPress cross-site scripting | CVE-2023-45072

October 21, 2023

NAME__________Order auto complete for WooCommerce Plugin for WordPress cross-site scriptingPlatforms Affected:WordPress Order auto complete for WooCommerce Plugin for WordPress 1.2.0Risk...

Read MoreRead more about Order auto complete for WooCommerce Plugin for WordPress cross-site scripting | CVE-2023-45072
CVE-prog
  • Vulnerabilities

Artifact Hub directory traversal | CVE-2023-45823

October 21, 2023

NAME__________Artifact Hub directory traversalPlatforms Affected:Artifact Hub Artifact Hub 1.15.0 Artifact Hub Artifact Hub 1.14.0 Artifact Hub Artifact Hub 1.13.0Risk Level:7.5Exploitability:UnprovenConsequences:Obtain...

Read MoreRead more about Artifact Hub directory traversal | CVE-2023-45823
CVE-prog
  • Vulnerabilities

JustSystems Ichitaro code execution | CVE-2023-35126

October 21, 2023

NAME__________JustSystems Ichitaro code executionPlatforms Affected:JustSystems Ichitaro 2023 1.0.1.59372Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________JustSystems Ichitaro could allow a remote attacker to execute arbitrary...

Read MoreRead more about JustSystems Ichitaro code execution | CVE-2023-35126
CVE-prog
  • Vulnerabilities

Form Maker by 10Web Plugin for WordPress cross-site scripting | CVE-2023-45071

October 21, 2023

NAME__________Form Maker by 10Web Plugin for WordPress cross-site scriptingPlatforms Affected:WordPress Form Maker by 10Web plugin for WordPress 1.15.19Risk Level:7.2Exploitability:HighConsequences:Cross-Site Scripting...

Read MoreRead more about Form Maker by 10Web Plugin for WordPress cross-site scripting | CVE-2023-45071
CVE-prog
  • Vulnerabilities

VMware Fusion privilege escalation | CVE-2023-34045

October 21, 2023

NAME__________VMware Fusion privilege escalationPlatforms Affected:VMware Fusion 13Risk Level:6.6Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION__________VMware Fusion could allow a local authenticated attacker to gain elevated...

Read MoreRead more about VMware Fusion privilege escalation | CVE-2023-34045
CVE-prog
  • Vulnerabilities

AI ChatBot plugin for WordPress security bypass | CVE-2023-5656

October 21, 2023

NAME__________AI ChatBot plugin for WordPress security bypassPlatforms Affected:WordPress AI ChatBot plugin for WordPress 4.9.2Risk Level:5.3Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________AI ChatBot plugin for...

Read MoreRead more about AI ChatBot plugin for WordPress security bypass | CVE-2023-5656
CVE-prog
  • Vulnerabilities

JustSystems Ichitaro code execution | CVE-2023-34366

October 21, 2023

NAME__________JustSystems Ichitaro code executionPlatforms Affected:JustSystems Ichitaro 2023 1.0.1.59372Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________JustSystems Ichitaro could allow a remote attacker to execute arbitrary...

Read MoreRead more about JustSystems Ichitaro code execution | CVE-2023-34366
CVE-prog
  • Vulnerabilities

Apache Santuario information disclosure | CVE-2023-44483

October 21, 2023

NAME__________Apache Santuario information disclosurePlatforms Affected:Apache Santuario 2.2.5 Apache Santuario 2.3.3 Apache Santuario 3.0.2Risk Level:6.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Apache Santuario could allow a...

Read MoreRead more about Apache Santuario information disclosure | CVE-2023-44483
CVE-prog
  • Vulnerabilities

Home Assistant cross-site scripting | CVE-2023-41896

October 21, 2023

NAME__________Home Assistant cross-site scriptingPlatforms Affected:Home Assistant Home Assistant 2023.8.4 Home Assistant Home Assistant 2023.8.3 Home Assistant Home Assistant 2023.8.2Risk Level:7.1Exploitability:HighConsequences:Cross-Site...

Read MoreRead more about Home Assistant cross-site scripting | CVE-2023-41896
CVE-prog
  • Vulnerabilities

Home Assistant server-side request forgery | CVE-2023-41899

October 21, 2023

NAME__________Home Assistant server-side request forgeryPlatforms Affected:Home Assistant Home Assistant 2023.8.4 Home Assistant Home Assistant 2023.8.3 Home Assistant Home Assistant 2023.8.2Risk...

Read MoreRead more about Home Assistant server-side request forgery | CVE-2023-41899
CVE-prog
  • Vulnerabilities

Wagtail information disclosure | CVE-2023-45809

October 21, 2023

NAME__________Wagtail information disclosurePlatforms Affected:Wagtail Wagtail 4.2 Wagtail Wagtail 4.1.8 Wagtail Wagtail 5.0.4 Wagtail Wagtail 5.1 Wagtail Wagtail 5.1.2Risk Level:2.7Exploitability:UnprovenConsequences:Obtain Information...

Read MoreRead more about Wagtail information disclosure | CVE-2023-45809
CVE-prog
  • Vulnerabilities

VMware Fusion privilege escalation | CVE-2023-34046

October 21, 2023

NAME__________VMware Fusion privilege escalationPlatforms Affected:VMware Fusion 13Risk Level:6.7Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION__________VMware Fusion could allow a local authenticated attacker to gain elevated...

Read MoreRead more about VMware Fusion privilege escalation | CVE-2023-34046
CVE-prog
  • Vulnerabilities

JustSystems Ichitaro code execution | CVE-2023-38128

October 21, 2023

NAME__________JustSystems Ichitaro code executionPlatforms Affected:JustSystems Ichitaro 2023 1.0.1.59372Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________JustSystems Ichitaro could allow a remote attacker to execute arbitrary...

Read MoreRead more about JustSystems Ichitaro code execution | CVE-2023-38128
CVE-prog
  • Vulnerabilities

Artifact Hub information disclosure | CVE-2023-45822

October 21, 2023

NAME__________Artifact Hub information disclosurePlatforms Affected:Artifact Hub Artifact Hub 1.15.0 Artifact Hub Artifact Hub 1.14.0 Artifact Hub Artifact Hub 1.13.0Risk Level:3.7Exploitability:UnprovenConsequences:Obtain...

Read MoreRead more about Artifact Hub information disclosure | CVE-2023-45822
CVE-prog
  • Vulnerabilities

Home Assistant information disclosure | CVE-2023-41894

October 21, 2023

NAME__________Home Assistant information disclosurePlatforms Affected:Home Assistant Home Assistant 2023.8.4 Home Assistant Home Assistant 2023.8.3 Home Assistant Home Assistant 2023.8.2Risk Level:5.3Exploitability:UnprovenConsequences:Obtain...

Read MoreRead more about Home Assistant information disclosure | CVE-2023-41894
CVE-prog
  • Vulnerabilities

Cisco IOS XE privilege escalation | CVE-2023-20273

October 21, 2023

NAME__________Cisco IOS XE privilege escalationPlatforms Affected:Cisco IOS XE SoftwareRisk Level:7.2Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION__________Cisco IOS XE could allow a remote authenticated attacker...

Read MoreRead more about Cisco IOS XE privilege escalation | CVE-2023-20273
CVE-prog
  • Vulnerabilities

Artifact Hub hijacking | CVE-2023-45821

October 21, 2023

NAME__________Artifact Hub hijackingPlatforms Affected:Artifact Hub Artifact Hub 1.15.0 Artifact Hub Artifact Hub 1.14.0 Artifact Hub Artifact Hub 1.13.0Risk Level:6.3Exploitability:UnprovenConsequences:Gain Access...

Read MoreRead more about Artifact Hub hijacking | CVE-2023-45821
trend-20
  • Vulnerabilities

Daily Vulnerability Trends: Sat Oct 21 2023

October 21, 2023

Daily Vulnerability Trends (sourced from VulnMon) CVE NAMECVE DescriptionCVE-2023-20198Cisco is aware of active exploitation of a previously unknown vulnerability in...

Read MoreRead more about Daily Vulnerability Trends: Sat Oct 21 2023
hacker-holding-linkedin-3
  • News

Fake Corsair job offers on LinkedIn push DarkGate malware

October 21, 2023

A threat actor is using fake LinkedIn posts and direct messages about a Facebook Ads specialist position at hardware maker Corsair...

Read MoreRead more about Fake Corsair job offers on LinkedIn push DarkGate malware
kwik_trip
  • News

Kwik Trip finally confirms cyberattack was behind ongoing outage

October 21, 2023

Two weeks into an ongoing IT outage, Kwik Trip finally confirmed that it's investigating a cyberattack impacting the convenience store...

Read MoreRead more about Kwik Trip finally confirms cyberattack was behind ongoing outage

Posts pagination

Previous 1 … 1,788 1,789 1,790 1,791 1,792 1,793 1,794 … 4,248 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-50088

July 16, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-50073

July 16, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-50087

July 16, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-50086

July 16, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-50089

July 16, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel