CONPROSYS HMI System information disclosure | CVE-2023-28713
NAME__________CONPROSYS HMI System information disclosurePlatforms Affected:Contec CONPROSYS HMI System 3.5.1 Contec CONPROSYS HMI System 3.5.0 Contec CONPROSYS HMI System 3.5.2Risk...
NAME__________CONPROSYS HMI System information disclosurePlatforms Affected:Contec CONPROSYS HMI System 3.5.1 Contec CONPROSYS HMI System 3.5.0 Contec CONPROSYS HMI System 3.5.2Risk...
NAME__________CONPROSYS HMI System cross-site scriptingPlatforms Affected:Contec CONPROSYS HMI System 3.5.1 Contec CONPROSYS HMI System 3.5.0 Contec CONPROSYS HMI System 3.5.2Risk...
NAME__________CONPROSYS HMI System denial of servicePlatforms Affected:Contec CONPROSYS HMI System 3.5.1 Contec CONPROSYS HMI System 3.5.0 Contec CONPROSYS HMI System...
NAME__________Iubenda Integration module for Drupal cross-site scriptingPlatforms Affected:WordPress Iubenda Integration Module for WordPress 7.x-2.4Risk Level:6.4Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________Iubenda Integration module for...
NAME__________SAISON INFORMATION SYSTEMS DataSpider Servista default accountPlatforms Affected:SAISON INFORMATION SYSTEMS DataSpider Servista 4.4Risk Level:5.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________SAISON INFORMATION SYSTEMS DataSpider Servista...
NAME__________Consent Popup module for Drupal cross-site scriptingPlatforms Affected:WordPress Consent Popup Module for WordPress 1.0.2Risk Level:6.4Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________Consent Popup module for...
NAME__________CONPROSYS HMI System security bypassPlatforms Affected:Contec CONPROSYS HMI System 3.5.1 Contec CONPROSYS HMI System 3.5.0 Contec CONPROSYS HMI System 3.5.2Risk...
Microsoft has shared details of a now-patched flaw in Apple macOS that could be abused by threat actors with root...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a recently patched critical security flaw in Zyxel gear to...
Cybersecurity researchers have offered a closer look at the RokRAT remote access trojan that's employed by the North Korean state-sponsored...
WordPress has issued an automatic update to address a critical flaw in the Jetpack plugin that's installed on over five...
RansomHouse Logo NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
The Dark Pink APT hacking group continues to be very active in 2023, observed targeting government, military, and education organizations...
With cyber-attacks becoming more sophisticated, organizations are becoming increasingly aware of the importance of safeguarding their web applications against security...
Toyota Motor Corporation has discovered two additional misconfigured cloud services that leaked car owners' personal information for over seven years....
A researcher has published a working exploit for a remote code execution (RCE) flaw impacting ReportLab Toolkit, a popular Python...
A stealthy remote access trojan (RAT) named 'SeroXen' has recently gained popularity as cybercriminals begin using it for its low...
Kali Linux 2023.2, the second version of 2023, is now available with a pre-built Hyper-V image and thirteen new tools,...
A threat actor known as Spyboy is promoting a tool called "Terminator" on a Russian-speaking hacking forum that can allegedly...
Hackers are performing widespread exploitation of a critical-severity command injection flaw in Zyxel networking devices, tracked as CVE-2023-28771, to install...
HIBP In May 2023, a credential stuffing list of 6.3M Polish email address and password pairs appeared on a local...
HIBP In May 2023, 478k user records from the now defunct hacking forum known as "RaidForums" was posted to another...
CISA and Partners Release Cybersecurity Advisory Guidance detailing PRC state-sponsored actors evading detection by “Living off the Land” Today, CISA...
CISA Adds Three Known Exploited Vulnerabilities to Catalog CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...