Cobalt Stike Beacon Detected – 103[.]234[.]72[.]150:80
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Brute Ratel C4". Depending on when you are viewing...
NAME__________Microworld Technologies eScan Management Console cross-site scriptingPlatforms Affected:Microworld Technologies eScan Management Console 14.0.1400.2281Risk Level:6.5Exploitability:UnprovenConsequences:Cross-Site Scripting DESCRIPTION__________Microworld Technologies eScan Management Console...
NAME__________Microworld Technologies eScan Management Console cross-site scriptingPlatforms Affected:Microworld Technologies eScan Management Console 14.0.1400.2281Risk Level:6.5Exploitability:UnprovenConsequences:Cross-Site Scripting DESCRIPTION__________Microworld Technologies eScan Management Console...
NAME__________OpenFGA denial of servicePlatforms Affected:OpenFGA OpenFGA 1.1.0Risk Level:5.9Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________OpenFGA is vulnerable to a denial of service, caused by...
NAME__________DataEase security bypassPlatforms Affected:DataEase DataEase 1.18.7Risk Level:6.3Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________DataEase could allow a remote authenticated attacker to bypass security restrictions, caused...
NAME__________Mailchimp module for Drupal cross-site request forgeryPlatforms Affected:Drupal Mailchimp module for Drupal 2.2.1Risk Level:5.3Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Mailchimp module for Drupal is...
NAME__________Apple macOS Ventura security bypassPlatforms Affected:Apple macOS VenturaRisk Level:5.5Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Apple macOS Ventura could allow a remote attacker to bypass...
NAME__________Microworld Technologies eScan Management Console cross-site scriptingPlatforms Affected:Microworld Technologies eScan Management Console 14.0.1400.2281Risk Level:7.4Exploitability:UnprovenConsequences:Cross-Site Scripting DESCRIPTION__________Microworld Technologies eScan Management Console...
NAME__________ROS2 Foxy Fitzroy denial of servicePlatforms Affected:ROS2 Foxy Fitzroy ROS_VERSION 2 ROS2 Foxy Fitzroy ROS_PYTHON_VERSION 2Risk Level:7.5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________ROS2...
NAME__________Microworld Technologies eScan Management Console cross-site scriptingPlatforms Affected:Microworld Technologies eScan Management Console 14.0.1400.2281Risk Level:6.5Exploitability:UnprovenConsequences:Cross-Site Scripting DESCRIPTION__________Microworld Technologies eScan Management Console...
NAME__________DataEase information disclosurePlatforms Affected:DataEase DataEase 1.18.7Risk Level:6.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________DataEase could allow a remote authetnicated attacker to obtain sensitive information, caused...
NAME__________IssabelPBX cross-site request forgeryPlatforms Affected:Issabel IssabelPBX 4.0.0-6Risk Level:7.2Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________IssabelPBX is vulnerable to cross-site request forgery, caused by improper validation...
NAME__________CloudExplorer-Lite brute forcePlatforms Affected:CloudExplorer-Lite Team of @fit2cloud CloudExplorer-Lite 1.1.0Risk Level:6.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________CloudExplorer-Lite is vulnerable to a brute force attack, caused...