LockBit 3.0 Ransomware Victim: eemotors[.]com
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
NAME__________Ministry of Health, Labour and Welfare FD Application XML external entity injectionPlatforms Affected:Ministry of Health Labour and Welfare FD Application...
NAME__________Emlog Pro file uploadPlatforms Affected:Emlog Emlog 2.2.0 ProRisk Level:7.2Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Emlog Pro could allow a remote authenticated attacker to upload...
NAME__________Dolibarr ERP/CRM cross-site scriptingPlatforms Affected:Dolibarr Dolibarr ERP/CRM 18.0.0Risk Level:5.4Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________Dolibarr ERP/CRM is vulnerable to cross-site scripting, caused by improper...
NAME__________emlog file uploadPlatforms Affected:Emlog Emlog 2.2.0 ProRisk Level:7.2Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________emlog could allow a remote authenticated attacker to upload arbitrary files,...
NAME__________SuiteCRM SQL injectionPlatforms Affected:ssalesagility suitecrm 7.12.12 ssalesagility suitecrm 7.13.4 ssalesagility suitecrm 8.3.1Risk Level:6.4Exploitability:HighConsequences:Data Manipulation DESCRIPTION__________SuiteCRM is vulnerable to SQL injection....
NAME__________Blog Filter Plugin for WordPress cross-site scriptingPlatforms Affected:WordPress Blog Filter Plugin for WordPress 1.5.3Risk Level:6.4Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________Blog Filter Plugin for...
NAME__________Swifty Bar, sticky bar by WPGens plugin for WordPress cross-site scriptingPlatforms Affected:WordPress Swifty Bar sticky bar by WPGens Plugin for...
NAME__________Instagram Plugin for WordPress cross-site scriptingPlatforms Affected:WordPress Instagram Plugin for WordPress 2.1.6Risk Level:6.4Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________Instagram Plugin for WordPress is vulnerable...
NAME__________D-Link DIR-1260 and DIR-2150 routers code executionPlatforms Affected:D-Link DIR-2150 D-Link DIR-1260Risk Level:6.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________D-Link DIR-1260 and DIR-2150 routers could allow...
NAME__________ImageMagick denial of servicePlatforms Affected:ImageMagick ImageMagick 7.1.0Risk Level:5.5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________ImageMagick is vulnerable to a denial of service, caused by...
NAME__________Qualcomm privilege escalationPlatforms Affected:Qualcomm Adreno GPURisk Level:7.8Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION__________Qualcomm could allow a local attacker to gain elevated privileges on the...
NAME__________Acronis Agent privilege escalationPlatforms Affected:Acronis Acronis Agent 29050 Acronis Acronis Agent 29049Risk Level:5.6Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION__________Acronis Agent could allow a local...
NAME__________Qualcomm privilege escalationPlatforms Affected:Qualcomm Compute DSPRisk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Qualcomm could allow a local attacker to gain elevated privileges on the...
NAME__________D-Link DAP-2622 Access Point code executionPlatforms Affected:D-Link DAP-2622Risk Level:6.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________D-Link DAP-2622 Access Point could allow a remote authenticated attacker...
NAME__________A10 Thunder ADC directory traversalPlatforms Affected:A10 Thunder ADCRisk Level:6.5Exploitability:UnprovenConsequences:File Manipulation DESCRIPTION__________A10 Thunder ADC could allow a remote authenticated attacker to...
NAME__________Qualcomm privilege escalationPlatforms Affected:Qualcomm WLANRisk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Qualcomm could allow a local attacker to gain elevated privileges on the system,...
NAME__________Acronis Cyber Protect Home Office for Windows information disclosurePlatforms Affected:Acronis Cyber Protect Home Office for Windows 40712 Acronis Cyber Protect...
NAME__________Acronis Agent information disclosurePlatforms Affected:Acronis Acronis Agent 29257 Acronis Acronis Agent 29256Risk Level:7.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Acronis Agent could allow a local...
NAME__________HP Enterprise LaserJet, LaserJet Managed printers cross-site scriptingPlatforms Affected:HP Color LaserJet Enterprise MFP M577 HP Color LaserJet Enterprise Flow MFP...
NAME__________D-Link D-View denial of servicePlatforms Affected:D-Link D-ViewRisk Level:5.9Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________D-Link D-View is vulnerable to a denial of service, caused...