[LYNX] – Ransomware Victim: astaphans[.]com
Ransomware Group: LYNX VICTIM NAME: astaphanscom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: LYNX VICTIM NAME: astaphanscom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: FUNKSEC VICTIM NAME: ndcegcom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: LYNX VICTIM NAME: jimthompsoncom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Vulnerability Summary: CVE-2024-45546 Memory corruption while processing FIPS encryption or decryption IOCTL call invoked from user-space. Affected Endpoints: No affected...
Vulnerability Summary: CVE-2024-45541 Memory corruption when IOCTL call is invoked from user-space to read board data. Affected Endpoints: No affected...
Vulnerability Summary: CVE-2024-43064 Uncontrolled resource consumption when a driver, an application or a SMMU client tries to access the global...
Vulnerability Summary: CVE-2024-45542 Memory corruption when IOCTL call is invoked from user-space to write board data to WLAN driver. Affected...
Vulnerability Summary: CVE-2024-45559 Transient DOS can occur when GVM sends a specific message type to the Vdev-FastRPC backend. Affected Endpoints:...
Vulnerability Summary: CVE-2024-45558 Transient DOS can occur when the driver parses the per STA profile IE and tries to access...
Vulnerability Summary: CVE-2024-45553 Memory corruption can occur when process-specific maps are added to the global list. If a map is...
Vulnerability Summary: CVE-2024-12970 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in TUBITAK BILGEM...
Vulnerability Summary: CVE-2024-45555 Memory corruption can occur if an already verified IFS2 image is overwritten, bypassing boot verification. This allows...
Vulnerability Summary: CVE-2024-45550 Memory corruption occurs when invoking any IOCTL-calling application that executes all MCDM driver IOCTL calls. Affected Endpoints:...
Ransomware Group: MORPHEUS VICTIM NAME: Pus Gmbh NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
Ransomware Group: MORPHEUS VICTIM NAME: Arrotex Pharmaceuticals NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
Company Name: Mozilla Company HackerOne URL: https://hackerone.com/mozilla Submitted By:dotxmlLink to Submitters Profile:https://hackerone.com/dotxml Report Title:Bypass Email Verification on Add Email MonitoringReport...
Ransomware Group: AKIRA VICTIM NAME: AAA Environmental NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
Ransomware Group: AKIRA VICTIM NAME: Drywall Partitions NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
Ransomware Group: AKIRA VICTIM NAME: Drivestream NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Vulnerability Summary: CVE-2024-31913 IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.2 is vulnerable to stored...
Vulnerability Summary: CVE-2024-5594 OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which attackers can use to inject unexpected arbitrary...
Vulnerability Summary: CVE-2024-8474 OpenVPN Connect before version 3.5.0 can contain the configuration profile's clear-text private key which is logged in...
Vulnerability Summary: CVE-2024-51111 Cross-Site Scripting (XSS) vulnerability in Pnetlab 5.3.11 allows an attacker to inject malicious scripts into a web...
Vulnerability Summary: CVE-2024-31914 IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.2 is vulnerable to stored...