LockBit 3.0 Ransomware Victim: mehmetceylanyapi[.]com[.]tr
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
NAME__________mooSocial mooDating cross-site scriptingPlatforms Affected:mooSocial mooSocial 3.1.7 mooSocial mooSocial 3.1.6Risk Level:6.1Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________mooSocial mooDating is vulnerable to cross-site scripting, caused...
NAME__________Vehicle Management In PHP With Source Code cross-site scriptingPlatforms Affected:SOURCE CODE & PROJECTS Vehicle Management In PHP With Source Code...
NAME__________Froala Text Editor cross-site scriptingPlatforms Affected:Froala Text Editor 4.1.0Risk Level:6.1Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________Froala Text Editor is vulnerable to cross-site scripting, caused...
NAME__________Eclipse Jetty weak securityPlatforms Affected:Eclipse Jetty 11.0.15 Eclipse Jetty 9.4.51 Eclipse Jetty 10.0.15 Eclipse Jetty 12.0.0-beta1Risk Level:3.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Eclipse Jetty...
NAME__________Bytecodealliance wasmtime security bypassPlatforms Affected:bytecodealliance Wasmtime 10.0.0 bytecodealliance Wasmtime 10.0.1 bytecodealliance Wasmtime 11.0.0 bytecodealliance Wasmtime 11.0.1 bytecodealliance Wasmtime 12.0.0 bytecodealliance...
NAME__________Quay Container Registry cross-site request forgeryPlatforms Affected:Red Hat Quay 3Risk Level:5.4Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Quay Container Registry is vulnerable to cross-site request...
NAME__________Cheese Cafe Line information disclosurePlatforms Affected:THE_B_members card 13.6.1Risk Level:5.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Cheese Cafe Line could allow a remote attacker to obtain...
NAME__________mooSocial cross-site request forgeryPlatforms Affected:mooSocial mooSocial 3.1.7 mooSocial mooSocial 3.1.6Risk Level:5.4Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________mooSocial is vulnerable to cross-site request forgery, caused...
NAME__________Jetty request smugglingPlatforms Affected:Eclipse Jetty 10.0.0 Eclipse Jetty 11.0.0 Eclipse Jetty 10.0.15 Eclipse Jetty 11.0.15 Eclipse Jetty 12.0.0 Eclipse Jetty...
NAME__________YKC Tokushima_awayokocho information disclosurePlatforms Affected:THE_B_members card 13.6.1Risk Level:5.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________YKC Tokushima_awayokocho could allow a remote attacker to obtain sensitive information,...
NAME__________THE_B_members card information disclosurePlatforms Affected:THE_B_members card 13.6.1Risk Level:5.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________THE_B_members card could allow a remote attacker to obtain sensitive information,...
NAME__________youmart-tokunaga information disclosurePlatforms Affected:THE_B_members card 13.6.1Risk Level:5.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________youmart-tokunaga could allow a remote attacker to obtain sensitive information, caused by...
NAME__________memos cross-site request forgeryPlatforms Affected:Memos Memos 0.14.4Risk Level:7.3Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION__________memos is vulnerable to cross-site request forgery, caused by...
NAME__________TonTon-Tei_waiting Line information disclosurePlatforms Affected:THE_B_members card 13.6.1Risk Level:5.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________TonTon-Tei_waiting Line could allow a remote attacker to obtain sensitive information,...
NAME__________Vyperlang Vyper security bypassPlatforms Affected:Vyper Vyper 0.3.9Risk Level:5.3Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Vyperlang Vyper could allow a remote attacker to bypass security restrictions,...
NAME__________Coffee-jumbo information disclosurePlatforms Affected:THE_B_members card 13.6.1Risk Level:5.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Coffee-jumbo could allow a remote attacker to obtain sensitive information, caused by...
NAME__________Pow security bypassPlatforms Affected:Pow Pow 1.0.33Risk Level:6.5Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Pow could allow a
NAME__________Summernote Rich Text Editor cross-site scriptingPlatforms Affected:Summernote Rich Text Editor 0.8.18Risk Level:6.1Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________Summernote Rich Text Editor is vulnerable to...
NAME__________CSZ CMS cross-site scriptingPlatforms Affected:CSZ CMS CSZ CMS 1.3.0Risk Level:6.4Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________CSZ CMS is vulnerable to cross-site scripting, caused by...