LockBit 3.0 Ransomware Victim: ance[.]org[.]mx
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
NAME__________D-Link DIR-605L buffer overflowPlatforms Affected:D-Link DIR-605L 1.17B01 BETARisk Level:7.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________D-Link DIR-605L is vulnerable to a stack-based buffer overflow, caused...
NAME__________Online Computer and Laptop Store SQL injectionPlatforms Affected:Sourcecodester Online Computer and Laptop Store 1.0Risk Level:6.3Exploitability:HighConsequences:Data Manipulation DESCRIPTION__________Online Computer and Laptop...
NAME__________Vitess denial of servicePlatforms Affected:Vitess Vitess 16.0.0 Vitess Vitess 16.0.1Risk Level:4.1Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Vitess is vulnerable to a denial of...
NAME__________ICT Laboratory Management System cross-site scriptingPlatforms Affected:Sourcecodester ICT Laboratory Management System 1.0Risk Level:3.5Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________ICT Laboratory Management System is vulnerable...
NAME__________Online Computer and Laptop Store SQL injectionPlatforms Affected:Sourcecodester Online Computer and Laptop Store 1.0Risk Level:6.3Exploitability:HighConsequences:Data Manipulation DESCRIPTION__________Online Computer and Laptop...
NAME__________Online Computer and Laptop Store SQL injectionPlatforms Affected:Sourcecodester Online Computer and Laptop Store 1.0Risk Level:6.3Exploitability:HighConsequences:Data Manipulation DESCRIPTION__________Online Computer and Laptop...
NAME__________Online Computer and Laptop Store cross-site scriptingPlatforms Affected:Sourcecodester Online Computer and Laptop Store 1.0Risk Level:3.5Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________Online Computer and Laptop...
NAME__________Gin-Gonic Gin Web Framework security bypassPlatforms Affected:Gin-Gonic Gin Web Framework 1.9.0Risk Level:7.5Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Gin-Gonic Gin Web Framework could allow a...
NAME__________Online Computer and Laptop Store SQL injectionPlatforms Affected:Sourcecodester Online Computer and Laptop Store 1.0Risk Level:6.3Exploitability:HighConsequences:Data Manipulation DESCRIPTION__________Online Computer and Laptop...
NAME__________D-Link DIR-2150 command executionPlatforms Affected:D-Link DIR-2150Risk Level:6.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________D-Link DIR-2150 could allow a remote authenticated attacker to execute arbitrary commands...
NAME__________D-Link DIR-2150 command executionPlatforms Affected:D-Link DIR-2150Risk Level:6.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________D-Link DIR-2150 could allow a remote authenticated attacker to execute arbitrary commands...
NAME__________Personnel Property Equipment System SQL injectionPlatforms Affected:Sourcecodester Personnel Property Equipment System 1.0Risk Level:6.3Exploitability:HighConsequences:Data Manipulation DESCRIPTION__________Personnel Property Equipment System is vulnerable...
NAME__________Kiddoware Kids Place Parental Control Android App security bypassPlatforms Affected:Kiddoware Kids Place Parental Control Android App 3.8.49Risk Level:7.8Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Kiddoware...