Cobalt Strike Beacon Detected – 139[.]59[.]182[.]127:8080
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
Vulnerability Summary: CVE-2025-1463 The Spreadsheet Integration plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to,...
Vulnerability Summary: CVE-2024-13471 The DesignThemes Core Features plugin for WordPress is vulnerable to unauthorized access of data due to a...
Vulnerability Summary: CVE-2024-11216 Authorization Bypass Through User-Controlled Key, Exposure of Private Personal Information to an Unauthorized Actor vulnerability in PozitifIK...
Vulnerability Summary: CVE-2024-12097 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Boceksoft Informatics E-Travel...
Vulnerability Summary: CVE-2024-13147 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Merkur Software B2B...
Vulnerability Summary: CVE-2025-22212 A SQL injection vulnerability in the ConvertForms component versions 1.0.0-1.0.0 - 4.4.9 for Joomla allows authenticated attackers...
Vulnerability Summary: CVE-2025-24494 Path traversal may allow remote code execution using privileged account (requires device admin account, cannot be performed...
Vulnerability Summary: CVE-2023-38693 Lucee Server (or simply Lucee) is a dynamic, Java based, tag and scripting language used for rapid...
Vulnerability Summary: CVE-2025-21095 Path traversal may lead to arbitrary file download. The score without least privilege principle violation is as...
Vulnerability Summary: CVE-2025-23416 Path traversal may lead to arbitrary file deletion. The score without least privilege principle violation is as...
Vulnerability Summary: CVE-2025-24521 External XML entity injection allows arbitrary download of files. The score without least privilege principle violation is...
Vulnerability Summary: CVE-2025-27412 REDAXO is a PHP-based CMS. In Redaxo from 5.0.0 through 5.18.2, the rex-api-result parameter is vulnerable to...
Vulnerability Summary: CVE-2025-27411 REDAXO is a PHP-based CMS. In Redaxo before 5.18.3, the mediapool/media page is vulnerable to arbitrary file...
Vulnerability Summary: CVE-2024-11035 Carbon Black Cloud Windows Sensor, prior to 4.0.3, may be susceptible to an Information Leak vulnerability, which...
Vulnerability Summary: CVE-2025-20208 A vulnerability in the web-based management interface of Cisco TelePresence Management Suite (TMS) could allow a low-privileged,...
Vulnerability Summary: CVE-2025-20206 A vulnerability in the interprocess communication (IPC) channel of Cisco Secure Client for Windows could allow an...
Vulnerability Summary: CVE-2025-2003 Incorrect authorization in PAM vaults in Devolutions Server 2024.3.12 and earlier allows an authenticated user to bypass...
Vulnerability Summary: CVE-2024-53458 Sysax Multi Server 6.99 is vulnerable to a denial of service (DoS) condition when processing specially crafted...
Vulnerability Summary: CVE-2025-27513 OpenTelemetry dotnet is a dotnet telemetry framework. A vulnerability in OpenTelemetry.Api package 1.10.0 to 1.11.1 could cause...
Vulnerability Summary: CVE-2025-27508 Emissary is a P2P based data-driven workflow engine. The ChecksumCalculator class within allows for hashing and checksum...
Ransomware Group: FOG VICTIM NAME: Bizcode NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...