Brute Ratel C4 Detected – 167[.]71[.]62[.]156:3200
The Information provided at the time of posting was detected as "Brute Ratel C4". Depending on when you are viewing...
The Information provided at the time of posting was detected as "Brute Ratel C4". Depending on when you are viewing...
NAME__________LIVEBOX Collaboration vDesk privilege escalationPlatforms Affected:Risk Level:9.8Exploitability:UnprovenConsequences:Gain Privilege DESCRIPTION__________LIVEBOX Collaboration vDesk could allow a remote attacker to gain elevated privileges...
NAME__________Ampache cross-site scriptingPlatforms Affected:Risk Level:9.3Exploitability:UnprovenConsequences:Cross-Site Scripting DESCRIPTION__________Ampache is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A...
NAME__________Tenable tenable.io, tenable.sc and Nessus privilege escalationPlatforms Affected:Tenable Network Security Nessus Tenable Tenable.io Tenable Tenable.scRisk Level:9.1Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION__________Tenable tenable.io, tenable.sc...
NAME__________Serenissima Informatica FastCheckIn directory traversalPlatforms Affected:Risk Level:9.8Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Serenissima Informatica FastCheckIn could allow a remote attacker to traverse directories on...
NAME__________Trend Micro Apex One file uploadPlatforms Affected:Risk Level:8.2Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Trend Micro Apex could allow a remote attacker to upload arbitrary...
NAME__________Dompdf code executionPlatforms Affected:Risk Level:10Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Dompdf could allow a remote attacker to execute arbitrary code on the system, caused...
NAME__________reason-jose security bypassPlatforms Affected:Risk Level:9.8Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________reason-jose could allow a remote authenticated attacker to bypass security restrictions, caused by improper...
NAME__________OrangeScrum directory traversalPlatforms Affected:Risk Level:8.1Exploitability:Proof of ConceptConsequences:Obtain Information DESCRIPTION__________OrangeScrum could allow a remote authenticated attacker to traverse directories on the...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
Daily Vulnerability Trends (sourced from VulnMon) CVE NAMECVE DescriptionCVE-2022-26485Removing an XSLT parameter during processing could have lead to an exploitable...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
Score: 1 MALWARE FAMILY: TAGS:MD5: 59e7451acc5feed8d6a314297a970ad4SHA1: 920ae92c754e70364329123687b21bbd983ae57bANALYSIS DATE: 2023-02-01T21:12:01ZTTPS: T1012, T1082 ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more...
Score: 10 MALWARE FAMILY: amadeyTAGS:family:amadey, family:djvu, family:smokeloader, backdoor, discovery, evasion, persistence, ransomware, spyware, stealer, trojan, vmprotectMD5: 1fd5d23bab8f8f4073ca84e64593e277SHA1: 63dc3ea29ba3b3887e4c03742c3f3894041c8312ANALYSIS DATE: 2023-02-01T21:15:58ZTTPS:...
Score: 10 MALWARE FAMILY: discoveryTAGS:discovery, persistence, ransomwareMD5: d3add4ef9940f485a12da9e987771f32SHA1: 37870b8d6fc40baff80e30cd28fe1e4e01f471b8ANALYSIS DATE: 2023-02-01T22:30:19ZTTPS: T1082, T1012, T1112, T1042, T1060 ScoreMeaningExample10Known badA malware family...
Score: 10 MALWARE FAMILY: discoveryTAGS:discovery, ransomwareMD5: 3c9feef5f4ded10f5aebe2d8e06ddf17SHA1: c1974124faf157e7683cd110d0ca6319676eed4eANALYSIS DATE: 2023-02-01T22:24:43ZTTPS: T1082, T1057, T1012 ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne...
Score: 10 MALWARE FAMILY: amadeyTAGS:family:amadey, family:djvu, family:smokeloader, family:vidar, botnet:19, backdoor, discovery, persistence, ransomware, spyware, stealer, trojan, vmprotectMD5: 12b8a1f114a8b3e2ce261847cffef2dbSHA1: 13165ab78229bddefb49036b15a641c0d898485eANALYSIS DATE:...
Score: 10 MALWARE FAMILY: discoveryTAGS:discovery, ransomwareMD5: d62342979412c311e9cda07fb7e31457SHA1: 91019c22f1b2dfb3818af0364be37cd5c8dfec0cANALYSIS DATE: 2023-02-01T22:44:54ZTTPS: T1012, T1082, T1130, T1112, T1057 ScoreMeaningExample10Known badA malware family was...
Score: 10 MALWARE FAMILY: amadeyTAGS:family:amadey, family:djvu, family:smokeloader, family:vidar, botnet:19, backdoor, discovery, persistence, ransomware, stealer, trojan, vmprotectMD5: f9223ce10430ed989beb6315b8ef10eeSHA1: e743ca02767c216b72506488a1ebcea005009823ANALYSIS DATE: 2023-02-01T23:13:52ZTTPS:...
Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:19, discovery, persistence, ransomware, spyware, stealerMD5: b8ccee89fe62647ffa515842a7fc372cSHA1: ff05bc15583f196940c11908793a515b38ae9594ANALYSIS DATE: 2023-02-01T23:26:15ZTTPS: T1222, T1053, T1005, T1081,...
Score: 10 MALWARE FAMILY: discoveryTAGS:discovery, evasion, persistence, ransomware, trojanMD5: 6ac694ad2f3d2ca003102f6e842b2eafSHA1: 1aefddc5e887434ab99057ae2c12cbf17bf3ce04ANALYSIS DATE: 2023-02-01T22:59:50ZTTPS: T1012, T1082, T1112, T1018, T1060 ScoreMeaningExample10Known badA...
The Information provided at the time of posting was detected as "Brute Ratel C4". Depending on when you are viewing...
Programme HackerOne Judge.me Judge.me Submitted by criptex criptex Report HTML INJECTION (STORED) Full Report A considerable amount of time and...
Programme HackerOne Judge.me Judge.me Submitted by penguinshelp penguinshelp Report Self-XSS due to image URL can be eploited via XSSJacking techniques...