Mastodon Social Network Patches Critical Flaws Allowing Server Takeover
Mastodon, a popular decentralized social network, has released a security update to fix critical vulnerabilities that could expose millions of...
Mastodon, a popular decentralized social network, has released a security update to fix critical vulnerabilities that could expose millions of...
Malicious actors exploited an unknown flaw in Revolut's payment systems to steal more than $20 million of the company's funds...
Brick-and-mortar retailers and e-commerce sellers may be locked in a fierce battle for market share, but one area both can...
CISOs, security leaders, and SOC teams often struggle with limited visibility into all connections made to their company-owned assets and...
The threat actors behind the RomCom RAT have been suspected of phishing attacks targeting the upcoming NATO Summit in Vilnius...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
NAME__________Ethyca Fides directory traversalPlatforms Affected:Ethyca Fides 2.15.0Risk Level:7.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Ethyca Fides could allow a remote attacker to traverse directories on...
NAME__________Statamic cross-site scriptingPlatforms Affected:Statamic Statamic 4.9.2Risk Level:5.5Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________Statamic is vulnerable to cross-site scripting, caused by improper validation of user-supplied...
NAME__________IBM Watson CP4D Data Stores denial of servicePlatforms Affected:IBM Watson CP4D Data Stores 4.6.0Risk Level:5.9Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________IBM Watson CP4D...
NAME__________Uptime Kuma directory traversalPlatforms Affected:Uptime Kuma Uptime Kuma 1.22.0Risk Level:6.5Exploitability:Proof of ConceptConsequences:Obtain Information DESCRIPTION__________Uptime Kuma could allow a remote authenticated...
NAME__________IBM Watson Knowledge Catalog CSV injectionPlatforms Affected:IBM Watson Knowledge Catalog on-prem 4.0Risk Level:7Exploitability:UnprovenConsequences:File Manipulation DESCRIPTION__________IBM Watson Knowledge Catalog on Cloud...
NAME__________AMI MegaRAC SPX header injectionPlatforms Affected:AMI MegaRAC SPX 12 AMI MegaRAC SPX 13Risk Level:5.7Exploitability:UnprovenConsequences:Data Manipulation DESCRIPTION__________AMI MegaRAC SPX is vulnerable...
NAME__________AMI MegaRAC SPX weak securityPlatforms Affected:AMI MegaRAC SPX 12 AMI MegaRAC SPX 13Risk Level:6.8Exploitability:UnprovenConsequences:Other DESCRIPTION__________AMI MegaRAC SPX could provide weaker...
NAME__________AMI MegaRAC SPX weak securityPlatforms Affected:AMI MegaRAC SPX 12 AMI MegaRAC SPX 13Risk Level:7.1Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________AMI MegaRAC SPX contains default...
NAME__________GLPI information disclosurePlatforms Affected:GLPI GLPI 9.5.0 GLPI GLPI 10.0.7Risk Level:7.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________GLPI could allow a remote attacker to obtain sensitive...
NAME__________GLPI information disclosurePlatforms Affected:GLPI GLPI 10.0.7 GLPI GLPI 9.2.0Risk Level:6.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________GLPI could allow a remote authenticated attacker to obtain...
NAME__________GPAC denial of servicePlatforms Affected:GPAC GPAC 2.2.1Risk Level:6.1Exploitability:Proof of ConceptConsequences:Denial of Service DESCRIPTION__________GPAC is vulnerable to a denial of service,...
NAME__________AMI MegaRAC SPX weak securityPlatforms Affected:AMI MegaRAC SPX 12 AMI MegaRAC SPX 13Risk Level:6.6Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________AMI MegaRAC SPX contains default...
NAME__________GLPI cross-site scriptingPlatforms Affected:GLPI GLPI 9.4.0 GLPI GLPI 10.0.7Risk Level:6.5Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________GLPI is vulnerable to cross-site scripting, caused by improper...
NAME__________Outline cross-site scriptingPlatforms Affected:outline outline 0.70.0Risk Level:6.3Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________Outlin is vulnerable to cross-site scripting, caused by improper validation of user-supplied...
NAME__________Tyan S5552 BMC man-in-the-middlePlatforms Affected:Tyan S5552 BMC 3.00Risk Level:6.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Tyan S5552 BMC is vulnerable to a man-in-the-middle attack, caused...
NAME__________GLPI information disclosurePlatforms Affected:GLPI GLPI 10.0.7 GLPI GLPI 0.68Risk Level:6.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________GLPI could allow a remote authenticated attacker to obtain...