LockBit 3.0 Ransomware Victim: phihydraulics[.]com
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
NAME__________Archery information disclosurePlatforms Affected:Archery Archery 1.10.0Risk Level:7.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Archery could allow a remote attacker to obtain sensitive information, caused by...
NAME__________openSIS Community Edition cross-site scriptingPlatforms Affected:OS4Ed openSIS Community Edition 9.0Risk Level:6.1Exploitability:UnprovenConsequences:Cross-Site Scripting DESCRIPTION__________openSIS Community Edition is vulnerable to cross-site scripting,...
NAME__________openSIS Community Edition information disclosurePlatforms Affected:OS4Ed openSIS Community Edition 9.0Risk Level:5.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________openSIS Community Edition could allow a remote attacker...
NAME__________openSIS Community Edition cross-site scriptingPlatforms Affected:OS4Ed openSIS Community Edition 9.0Risk Level:6.1Exploitability:UnprovenConsequences:Cross-Site Scripting DESCRIPTION__________openSIS Community Edition is vulnerable to cross-site scripting,...
NAME__________openSIS Community Edition directory traversalPlatforms Affected:OS4Ed openSIS Community Edition 9.0Risk Level:5.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________openSIS Community Edition could allow a remote attacker...
NAME__________SuperAGI information disclosurePlatforms Affected:SuperAGI SuperAGI 0.0.13Risk Level:5.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________SuperAGI could allow a remote attacker to obtain sensitive information, caused by...
NAME__________Tenable Nessus Agent denial of servicePlatforms Affected:Tenable Nessus Agent 10.4.3Risk Level:6.8Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Tenable Nessus Agent is vulnerable to a...
NAME__________openSIS Community Edition cross-site scriptingPlatforms Affected:OS4Ed openSIS Community Edition 9.0Risk Level:6.1Exploitability:UnprovenConsequences:Cross-Site Scripting DESCRIPTION__________openSIS Community Edition is vulnerable to cross-site scripting,...
NAME__________Tenable Nessus denial of servicePlatforms Affected:Tenable Nessus 10.5.6Risk Level:6.8Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Tenable Nessus is vulnerable to a denial of service,...
NAME__________openSIS Community Edition cross-site request forgeryPlatforms Affected:OS4Ed openSIS Community Edition 9.0Risk Level:5.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________openSIS Community Edition is vulnerable to cross-site...
NAME__________openSIS Community Edition information disclosurePlatforms Affected:OS4Ed openSIS Community Edition 9.0Risk Level:7.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________openSIS Community Edition could allow a remote attacker...
NAME__________localstack man-in-the-middlePlatforms Affected:localstack localstack 2.3.2Risk Level:5.9Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________localstack is vulnerable to a man-in-the-middle attack, caused by missing SSL certificate validation....
NAME__________OpenCRX HTML injectionPlatforms Affected:OpenCRX OpenCRX 5.2.0Risk Level:6.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________OpenCRX is vulnerable to HTML injection. A remote attacker could inject malicious...
NAME__________TerraMaster directory traversalPlatforms Affected:TerraMaster TerraMaster 2.295Risk Level:5.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________TerraMaster could allow a remote attacker to traverse directories on the system....
NAME__________PyPinkSign information disclosurePlatforms Affected:PyPinkSign PyPinkSign 0.5.1Risk Level:10Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________PyPinkSign could allow a remote attacker to obtain sensitive information, caused by...
NAME__________Node.js json-web-token module security bypassPlatforms Affected:Node.js json-web-token 3.0.1Risk Level:7.5Exploitability:Proof of ConceptConsequences:Bypass Security DESCRIPTION__________Node.js json-web-token module could allow a remote attacker...
NAME__________Audio Merchant Plugin for WordPress cross-site request forgeryPlatforms Affected:WordPress Audio Merchant Plugin for WordPress 5.0.4Risk Level:5.4Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Audio Merchant Plugin...
NAME__________NEC CLUSTERPRO X, NEC EXPRESSCLUSTER X, NEC CLUSTERPRO X SingleServerSafe, and NEC EXPRESSCLUSTER X SingleServerSafe command executionPlatforms Affected:NEC CLUSTERPRO X...
NAME__________NEC CLUSTERPRO X, NEC EXPRESSCLUSTER X, NEC CLUSTERPRO X SingleServerSafe, and NEC EXPRESSCLUSTER X SingleServerSafe command executionPlatforms Affected:NEC CLUSTERPRO X...