Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Mobile Device Security for a Safer Digital Life

July 16, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

July 14, 2025
unlock_membership
  • Premium Members Content

Mastering Web Application Security Strategies

July 11, 2025
unlock_membership
  • Premium Members Content

Unlocking the Power of Zero Trust Security for Modern Organizations

July 9, 2025
unlock_membership
  • Premium Members Content

Unlocking Blockchain Security Strategies for a Safer Digital Future

July 7, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
CVE-prog
  • Vulnerabilities

SoftExpert Excellence Suite file inclusion | CVE-2023-30330

May 6, 2023

NAME__________SoftExpert Excellence Suite file inclusionPlatforms Affected:Risk Level:7.5Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION__________SoftExpert Excellence Suite could allow a remote attacker to include...

Read MoreRead more about SoftExpert Excellence Suite file inclusion | CVE-2023-30330
CVE-prog
  • Vulnerabilities

Apache Ranger code execution | CVE-2022-45048

May 6, 2023

NAME__________Apache Ranger code executionPlatforms Affected:Apache Ranger 2.3.0Risk Level:6.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Apache Ranger could allow a remote authenticated attacker to execute arbitrary...

Read MoreRead more about Apache Ranger code execution | CVE-2022-45048
CVE-prog
  • Vulnerabilities

Dell Command Monitor privilege escalation | CVE-2023-28068

May 6, 2023

NAME__________Dell Command Monitor privilege escalationPlatforms Affected:Dell Command Monitor 10.9Risk Level:7.3Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION__________Dell Command Monitor could allow a local authenticated attacker...

Read MoreRead more about Dell Command Monitor privilege escalation | CVE-2023-28068
CVE-prog
  • Vulnerabilities

Samsung Mobile devices security bypass | CVE-2023-21496

May 6, 2023

NAME__________Samsung Mobile devices security bypassPlatforms Affected:Samsung mobile devicesRisk Level:6.1Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Samsung Mobile devices could allow a local attacker to bypass...

Read MoreRead more about Samsung Mobile devices security bypass | CVE-2023-21496
CVE-prog
  • Vulnerabilities

IBM Cognos Command Center information disclosure | CVE-2022-38707

May 6, 2023

NAME__________IBM Cognos Command Center information disclosurePlatforms Affected:IBM Cognos Command Center 10.2.4.1Risk Level:4Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION__________IBM Cognos Command Center 10.2.4.1 could allow...

Read MoreRead more about IBM Cognos Command Center information disclosure | CVE-2022-38707
CVE-prog
  • Vulnerabilities

Samsung Mobiles buffer overflow | CVE-2023-21494

May 6, 2023

NAME__________Samsung Mobiles buffer overflowPlatforms Affected:Samsung mobile devicesRisk Level:5.6Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Samsung Mobiles is vulnerable to a buffer overflow, caused by improper...

Read MoreRead more about Samsung Mobiles buffer overflow | CVE-2023-21494
CVE-prog
  • Vulnerabilities

Samsung Core Service security bypass | CVE-2023-21505

May 6, 2023

NAME__________Samsung Core Service security bypassPlatforms Affected:Samsung Core ServiceRisk Level:4Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Samsung Core Service could allow a local attacker to bypass...

Read MoreRead more about Samsung Core Service security bypass | CVE-2023-21505
CVE-prog
  • Vulnerabilities

Samsung Blockchain Keystore code execution | CVE-2023-21508

May 6, 2023

NAME__________Samsung Blockchain Keystore code executionPlatforms Affected:Samsung Blockchain KeystoreRisk Level:6.7Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Samsung Blockchain Keystore could allow a local authenticated attacker to...

Read MoreRead more about Samsung Blockchain Keystore code execution | CVE-2023-21508
CVE-prog
  • Vulnerabilities

Samsung Mobiles information disclosure | CVE-0232-1500

May 6, 2023

NAME__________Samsung Mobiles information disclosurePlatforms Affected:Samsung mobile devicesRisk Level:6Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Samsung Mobiles could allow a local authenticated attacker to obtain sensitive...

Read MoreRead more about Samsung Mobiles information disclosure | CVE-0232-1500
CVE-prog
  • Vulnerabilities

Samsung Mobile devices security bypass | CVE-2023-21495

May 6, 2023

NAME__________Samsung Mobile devices security bypassPlatforms Affected:Samsung mobile devicesRisk Level:4Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Samsung Mobile devices could allow a local attacker to bypass...

Read MoreRead more about Samsung Mobile devices security bypass | CVE-2023-21495
CVE-prog
  • Vulnerabilities

aws-sdk-go S3 bucket information disclosure |

May 6, 2023

NAME__________aws-sdk-go S3 bucket information disclosurePlatforms Affected:Amazon AWS SDK for Go 1.30.0Risk Level:6.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________AWS SDK for the Go programming language...

Read MoreRead more about aws-sdk-go S3 bucket information disclosure |
CVE-prog
  • Vulnerabilities

Samsung Blockchain Keystore information disclosure | CVE-2023-21507

May 6, 2023

NAME__________Samsung Blockchain Keystore information disclosurePlatforms Affected:Samsung Blockchain KeystoreRisk Level:4.4Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Samsung Blockchain Keystore could allow a local authenticated attacker to...

Read MoreRead more about Samsung Blockchain Keystore information disclosure | CVE-2023-21507
CVE-prog
  • Vulnerabilities

D-Link DAP-1360 devices buffer overflow | CVE-2023-32140

May 6, 2023

NAME__________D-Link DAP-1360 devices buffer overflowPlatforms Affected:D-Link DAP-1360 6.14b01Risk Level:7.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________D-Link DAP-1360 devices is vulnerable to a heap-based buffer overflow,...

Read MoreRead more about D-Link DAP-1360 devices buffer overflow | CVE-2023-32140
CVE-prog
  • Vulnerabilities

Samsung Mobile devices information disclosure | CVE-2023-21497

May 6, 2023

NAME__________Samsung Mobile devices information disclosurePlatforms Affected:Samsung mobile devicesRisk Level:4.4Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Samsung Mobile devices could allow a local authenticated attacker to...

Read MoreRead more about Samsung Mobile devices information disclosure | CVE-2023-21497
CVE-prog
  • Vulnerabilities

Samsung Blockchain Keystore code execution | CVE-2023-21509

May 6, 2023

NAME__________Samsung Blockchain Keystore code executionPlatforms Affected:Samsung Blockchain KeystoreRisk Level:6.7Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Samsung Blockchain Keystore could allow a local authenticated attacker to...

Read MoreRead more about Samsung Blockchain Keystore code execution | CVE-2023-21509
CVE-prog
  • Vulnerabilities

D-Link DAP-1360 devices directory traversal | CVE-2023-32137

May 6, 2023

NAME__________D-Link DAP-1360 devices directory traversalPlatforms Affected:D-Link DAP-1360 6.14b01Risk Level:4.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________D-Link DAP-1360 devices could allow a remote attacker to traverse...

Read MoreRead more about D-Link DAP-1360 devices directory traversal | CVE-2023-32137
CVE-prog
  • Vulnerabilities

Samsung Mobiles buffer overflow | CVE-2023-21504

May 6, 2023

NAME__________Samsung Mobiles buffer overflowPlatforms Affected:Samsung mobile devicesRisk Level:7.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Samsung Mobiles is vulnerable to a buffer overflow, caused by improper...

Read MoreRead more about Samsung Mobiles buffer overflow | CVE-2023-21504
CVE-prog
  • Vulnerabilities

OPC Foundation UA .NET Standard denial of service | CVE-2023-27321

May 6, 2023

NAME__________OPC Foundation UA .NET Standard denial of servicePlatforms Affected:OPC Foundation OPC UA .NET StandardRisk Level:7.5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________OPC Foundation UA...

Read MoreRead more about OPC Foundation UA .NET Standard denial of service | CVE-2023-27321
CVE-prog
  • Vulnerabilities

Samsung Blockchain Keystore information disclosure | CVE-2023-21510

May 6, 2023

NAME__________Samsung Blockchain Keystore information disclosurePlatforms Affected:Samsung Blockchain KeystoreRisk Level:6.7Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Samsung Blockchain Keystore could allow a local authenticated attacker to...

Read MoreRead more about Samsung Blockchain Keystore information disclosure | CVE-2023-21510
CVE-prog
  • Vulnerabilities

Samsung Mobile devices security bypass | CVE-2023-21498

May 6, 2023

NAME__________Samsung Mobile devices security bypassPlatforms Affected:Samsung mobile devicesRisk Level:6Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Samsung Mobile devices could allow a local authenticated attacker to...

Read MoreRead more about Samsung Mobile devices security bypass | CVE-2023-21498
CVE-prog
  • Vulnerabilities

IBM Storage Scale denial of service | CVE-2023-30434

May 6, 2023

NAME__________IBM Storage Scale denial of servicePlatforms Affected:IBM Spectrum Scale 5.1.0.0 IBM Spectrum Scale 5.1.3.0 IBM Elastic Storage System 6.1.0.0 IBM...

Read MoreRead more about IBM Storage Scale denial of service | CVE-2023-30434
CVE-prog
  • Vulnerabilities

Linux Kernel denial of service | CVE-2023-2156

May 6, 2023

NAME__________Linux Kernel denial of servicePlatforms Affected:Linux KernelRisk Level:7.5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Linux Kernel is vulnerable to a denial of service, caused...

Read MoreRead more about Linux Kernel denial of service | CVE-2023-2156
CVE-prog
  • Vulnerabilities

Samsung Blockchain Keystore code execution | CVE-2023-21506

May 6, 2023

NAME__________Samsung Blockchain Keystore code executionPlatforms Affected:Samsung Blockchain KeystoreRisk Level:6.7Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Samsung Blockchain Keystore could allow a local authenticated attacker to...

Read MoreRead more about Samsung Blockchain Keystore code execution | CVE-2023-21506
CVE-prog
  • Vulnerabilities

Samsung Blockchain Keystore information disclosure | CVE-2023-21511

May 6, 2023

NAME__________Samsung Blockchain Keystore information disclosurePlatforms Affected:Samsung Blockchain KeystoreRisk Level:6.7Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Samsung Blockchain Keystore could allow a local authenticated attacker to...

Read MoreRead more about Samsung Blockchain Keystore information disclosure | CVE-2023-21511

Posts pagination

Previous 1 … 2,331 2,332 2,333 2,334 2,335 2,336 2,337 … 4,250 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-20274

July 17, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-20284

July 17, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-20285

July 17, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-20337

July 17, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-20288

July 17, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel