Cobalt Stike Beacon Detected – 123[.]56[.]83[.]204:7070
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
NAME__________MStore API plugin for WordPress cross-site request forgeryPlatforms Affected:WordPress MStore API Plugin for WordPress 3.9.6Risk Level:4.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________MStore API plugin...
NAME__________Zoom for Windows, Zoom Rooms, Zoom VDI Windows Meeting clients privilege escalationPlatforms Affected:Zoom Zoom for Windows clients 5.13.2 Zoom Zoom...
NAME__________MStore API plugin for WordPress cross-site request forgeryPlatforms Affected:WordPress MStore API Plugin for WordPress 3.9.6Risk Level:4.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________MStore API plugin...
NAME__________MStore API plugin for WordPress cross-site request forgeryPlatforms Affected:WordPress MStore API Plugin for WordPress 3.9.6Risk Level:4.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________MStore API plugin...
NAME__________MStore API plugin for WordPress cross-site request forgeryPlatforms Affected:WordPress MStore API Plugin for WordPress 3.9.6Risk Level:4.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________MStore API plugin...
NAME__________Grav code executionPlatforms Affected:Grav Grav 1.7.40Risk Level:7.2Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Grav could allow a remote authenticated attacker to execute arbitrary code on...
NAME__________Jenkins Digital.ai App Management Publisher Plugin cross-site request forgeryPlatforms Affected:Jenkins Digital.ai App Management Publisher Plugin 2.6Risk Level:4.2Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Jenkins Digital.ai...
NAME__________Jenkins Digital.ai App Management Publisher Plugin security bypassPlatforms Affected:Jenkins Digital.ai App Management Publisher Plugin 2.6Risk Level:4.2Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Jenkins Digital.ai App...
NAME__________Grav code executionPlatforms Affected:Grav Grav 1.7.40Risk Level:7.2Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Grav could allow a remote authenticated attacker to execute arbitrary code on...
NAME__________Jenkins Dimensions Plugin information disclosurePlatforms Affected:Jenkins Dimensions Plugin 0.9.3Risk Level:4.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Jenkins Dimensions Plugin could allow a remote authenticated attacker...
NAME__________Grav code executionPlatforms Affected:Grav Grav 1.7.40Risk Level:7.2Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Grav could allow a remote authenticated attacker to execute arbitrary code on...
NAME__________Office Hours module for Drupal cross-site scriptingPlatforms Affected:Drupal Office Hours module for Drupal 8.x-1.5Risk Level:6.4Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________Office Hours module for...
NAME__________Jenkins AWS CodeCommit Trigger Plugin information disclosurePlatforms Affected:Jenkins AWS CodeCommit Trigger Plugin 3.0.12Risk Level:6.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Jenkins AWS CodeCommit Trigger Plugin...
NAME__________Jenkins Team Concert Plugin information disclosurePlatforms Affected:Jenkins Team Concert Plugin 2.4.1Risk Level:4.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Jenkins Team Concert could allow a remote...
NAME__________Contiki-NG buffer overflowPlatforms Affected:Contiki-NG Contiki-NG 4.8Risk Level:7.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Contiki-NG is vulnerable to a stack-based buffer overflow, caused by improper bounds...
NAME__________SUBNET PowerSYSTEM Center cross-site scriptingPlatforms Affected:SUBNET PowerSYSTEM CenterRisk Level:6.5Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________SUBNET PowerSYSTEM Center is vulnerable to cross-site scripting, caused by...
NAME__________SUBNET PowerSYSTEM Center denial of servicePlatforms Affected:SUBNET PowerSYSTEM CenterRisk Level:6.1Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________SUBNET PowerSYSTEM Center is vulnerable to a denial...
NAME__________Parity Technologies ink! security bypassPlatforms Affected:Parity Technologies ink! 4.2.0Risk Level:5.3Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Parity Technologies ink! could allow a remote attacker to...
NAME__________Jenkins Dimensions Plugin information disclosurePlatforms Affected:Jenkins Dimensions Plugin 0.9.3Risk Level:4.2Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Jenkins Dimensions Plugin could allow a remote authenticated attacker...
NAME__________Palo Alto Networks GlobalProtect App for Windows privilege escalationPlatforms Affected:Palo Alto Networks GlobalProtect app for Windows 5.2 Palo Alto Networks...