CISA: Fortinet Releases Security Updates for Multiple Products
Fortinet Releases Security Updates for Multiple Products Fortinet has released security updates to address vulnerabilities in multiple Fortinet products. A...
Fortinet Releases Security Updates for Multiple Products Fortinet has released security updates to address vulnerabilities in multiple Fortinet products. A...
MacMaster is a versatile command line tool designed to change the MAC address of network interfaces on your system. It...
Technical details have emerged about two now-patched security flaws in Microsoft Windows that could be chained by threat actors to...
The developers of the information stealer malware known as Rhadamanthys are actively iterating on its features, broadening its information-gathering capabilities...
Low-code/no-code (LCNC) and robotic process automation (RPA) have gained immense popularity, but how secure are they? Is your security team...
Company Name: b'Mozilla Core Services' Company HackerOne URL: https://hackerone.com/mozilla_core_services Submitted By:b'yakirka'Link to Submitters Profile:https://hackerone.com/b'yakirka' Report Title:b"Mozilla Employee's Token for sql.telemetry.mozilla.org...
Company Name: b'Nextcloud' Company HackerOne URL: https://hackerone.com/nextcloud Submitted By:b'spell1'Link to Submitters Profile:https://hackerone.com/b'spell1' Report Title:b'App PIN code can be bypassed in...
WordPress has released updates addressing a critical vulnerability (CVE-2023-6553) in their Backup Migration plugin. The vulnerability has a Common Vulnerability...
QNAP has released security updates to address a zero-day vulnerability (CVE-2023-47565) in their NVR products. The vulnerability is reportedly being...
FBI, CISA, and ASD’s ACSC Release Advisory on Play Ransomware Today, the Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure...
Medusa Locker Logo NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the...
Medusa Locker Logo NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the...
Black Basta Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
Black Basta Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
Black Basta Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
Four U.S. nationals have been charged for participating in an illicit scheme that earned them more than $80 million via...
A new wave of phishing messages distributing the QakBot malware has been observed, more than three months after a law...
NAME__________GLPI SQL injectionPlatforms Affected:GLPI GLPI 10.0.10Risk Level:6.5Exploitability:HighConsequences:Data Manipulation DESCRIPTION__________GLPI is vulnerable to SQL injection. A remote authenticated attacker could send...
NAME__________Dell vApp Manager command executionPlatforms Affected:Dell vApp ManagerRisk Level:7.2Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Dell vApp Manager could allow a remote authenticated attacker to...
NAME__________Dell vApp Manager command executionPlatforms Affected:Dell vApp ManagerRisk Level:7.2Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Dell vApp Manager could allow a remote authenticated attacker to...
NAME__________Zoom Mobile App for Android, Zoom Mobile App for iOS and Zoom SDKs nformation disclosurePlatforms Affected:Zoom Video SDK Zoom Mobile...
NAME__________Stupid Simple CMS command executionPlatforms Affected:Stupid Simple CMS Stupid Simple CMS 1.2.3Risk Level:7.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Stupid Simple CMS could allow a...
NAME__________SchedMD Slurm security bypassPlatforms Affected:SchedMD Slurm 22.05 SchedMD Slurm 23.02Risk Level:4.3Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________SchedMD Slurm could allow a remote authenticated attacker...
NAME__________GLPI code executionPlatforms Affected:GLPI GLPI 10.0.10Risk Level:7.2Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________GLPI could allow a remote authenticated attacker to execute arbitrary code on...