Signal Disputes Alleged Zero-Day Flaw
The encrypted messaging app Signal has refuted widespread claims of a zero-day software vulnerability. After an investigation, the company has...
The encrypted messaging app Signal has refuted widespread claims of a zero-day software vulnerability. After an investigation, the company has...
Unpatched WS_FTP servers exposed to the internet have become prime targets for ransomware attacks, with threat actors exploiting a critical...
The Information provided at the time of posting was detected as "Posh C2". Depending on when you are viewing this...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Info3ds -- teamwork_cloud_no_magic_releaseA Cross-Site Request Forgery (CSRF) vulnerability affecting Teamwork Cloud from...
This is a GCP resource scanner that can help determine what level of access certain credentials possess on GCP. The...
Company Name: b'curl' Company HackerOne URL: https://hackerone.com/curl Submitted By:b'shelldoit'Link to Submitters Profile:https://hackerone.com/b'shelldoit' Report Title:b' Curl CVE-2023-38545 vulnerability code changes are...
Company Name: b'Nextcloud' Company HackerOne URL: https://hackerone.com/nextcloud Submitted By:b'shuvam321'Link to Submitters Profile:https://hackerone.com/b'shuvam321' Report Title:b'Inviting excessive long email addresses to a...
Black Basta Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
Black Basta Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NAME__________Lenovo Desktop, Smart Edge and ThinkStation products privilege escalationPlatforms Affected:Lenovo ThinkStation Lenovo Desktop Lenovo Smart EdgeRisk Level:7.8Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION__________Lenovo Desktop,...
NAME__________Lenovo Desktop, Smart Edge and ThinkStation products privilege escalationPlatforms Affected:Lenovo ThinkStation Lenovo Desktop Lenovo Smart EdgeRisk Level:7.8Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION__________Lenovo Desktop,...
NAME__________SAP S/4HANA Core information disclosurePlatforms Affected:SAP S/4Hana Core S4CORE 102 SAP S/4Hana Core S4CORE 103 SAP S/4Hana Core S4CORE 104...
NAME__________IBM Security Verify Governance file uploadPlatforms Affected:IBM Security Verify Governance 10.0Risk Level:3.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________IBM Security Verify Governance 10.0 could allow...
NAME__________HCL BigFix Insights for Vulnerability Remediation (IVR) information disclosurePlatforms Affected:HCL BigFix IVR 2.0.2Risk Level:6.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________HCL BigFix Insights for Vulnerability...
NAME__________Node.js undici module information disclosurePlatforms Affected:Node.js undici 5.26.1Risk Level:3.9Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Node.js undici module could allow a remote authenticated attacker to...