Nagios XI SQL injection | CVE-2023-40933
NAME__________Nagios XI SQL injectionPlatforms Affected:Nagios Nagios XI 5.2.7 Nagios Nagios XI 5.2.9 Nagios Nagios XI 5.4.12 Nagios Nagios XI 5.4.13...
NAME__________Nagios XI SQL injectionPlatforms Affected:Nagios Nagios XI 5.2.7 Nagios Nagios XI 5.2.9 Nagios Nagios XI 5.4.12 Nagios Nagios XI 5.4.13...
NAME__________JetBrains TeamCity cross-site scriptingPlatforms Affected:JetBrains TeamCity 2018.2.1 JetBrains TeamCity 2018.2.2 JetBrains TeamCity 2019.1.1 JetBrains TeamCity 2018.2.4 JetBrains TeamCity 2023.05Risk Level:3.5Exploitability:UnprovenConsequences:Cross-Site...
NAME__________Foxconn Live Update Utility privilege escalationPlatforms Affected:Foxconn Live Update Utility 2.1.6.26Risk Level:7.8Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION__________Foxconn Live Update Utility could allow a...
NAME__________OpenPrinting CUPS buffer overflowPlatforms Affected:OpenPrinting CUPS 2.5b1Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________OpenPrinting CUPS is vulnerable to a heap-based buffer overflow, caused by...
NAME__________ISC BIND denial of servicePlatforms Affected:ISC BIND 9.4.3b1 ISC BIND 9.4.3b2 ISC BIND 9.4.3b3 ISC BIND 9.5.0-P1 ISC BIND 9.5.0-P2...
NAME__________IOBit Malware Fighter denial of servicePlatforms Affected:IOBit Malware Fighter 8.0.2Risk Level:4Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________IOBit Malware Fighter is vulnerable to a...
NAME__________Jenkins Build Failure Analyzer Plugin cross-site request forgeryPlatforms Affected:Jenkins Build Failure Analyzer Plugin 2.4.1Risk Level:4.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Jenkins Build Failure Analyzer...
NAME__________Jenkins weekly and LTS security bypassPlatforms Affected:Jenkins weekly 2.423 Jenkins LTS 2.414.1Risk Level:3.6Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Jenkins weekly and LTS could allow...
NAME__________Jenkins weekly and LTS information disclosurePlatforms Affected:Jenkins weekly 2.423 Jenkins LTS 2.414.1Risk Level:4.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Jenkins weekly and LTS could allow...
NAME__________Jenkins weekly and LTS code executionPlatforms Affected:Jenkins weekly 2.423 Jenkins LTS 2.414.1Risk Level:7Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Jenkins weekly and LTS could allow...
NAME__________Jenkins weekly and LTS security bypassPlatforms Affected:Jenkins weekly 2.423 Jenkins LTS 2.414.1Risk Level:3.6Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Jenkins weekly and LTS could allow...
NAME__________Jenkins Build Failure Analyzer Plugin cross-site request forgeryPlatforms Affected:Jenkins Build Failure Analyzer Plugin 2.4.1Risk Level:4.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Jenkins Build Failure Analyzer...
RansomHouse Logo NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
RansomHouse Logo NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
The dreaded data breach is an outcome feared by companies of all sizes in today’s threat landscape, largely due to...
Signal has announced that it upgraded its end-to-end communication protocol to use quantum-resistant encryption keys to protect users from future...
Credit reporting firm TransUnion has denied claims of a security breach after a threat actor known as USDoD leaked data...
Today, T-Mobile customers said they could see other peoples' account and billing information after logging into the company's official mobile...
The P2PInfect botnet worm is going through a period of highly elevated activity volumes starting in late August and then...
The developers of Free Download Manager (FDM) have published a script to check if a Linux device was infected through...
A hacker is spreading a fake proof-of-concept (PoC) exploit for a recently fixed WinRAR vulnerability on GitHub, attempting to infect...
Around 10% of British adults have lost money to fraudsters over the past year, amounting to estimated losses of £7.5bn...
Investigators in Finland have seized and shut down a web server used to operate a local dark web marketplace.Piilopuoti opened...