CISA: CISA Announces Launch of Logging Made Easy
CISA Announces Launch of Logging Made Easy Today, CISA announces the launch of a new version of Logging Made Easy (LME)(link...
CISA Announces Launch of Logging Made Easy Today, CISA announces the launch of a new version of Logging Made Easy (LME)(link...
CISA Releases Nine Industrial Control Systems Advisories CISA released nine Industrial Control Systems (ICS) advisories on October 26, 2023. These...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Info1e -- platformAffected 1E Platform versions have a Blind SQL Injection vulnerability...
Arsenal is just a quick inventory, reminder and launcher for pentest commands. This project written by pentesters for pentesters simplify...
" dir="auto"><script type="text/javascript" src="MailChecker/platform/javascript/MailChecker.js"></script><script type="text/javascript">if(!MailChecker.isValid('[email protected]')){ console.error('O RLY !');}if(!MailChecker.isValid('myemail.com')){ console.error('O RLY !');}</script> PHP include __DIR__."/MailChecker/platform/php/MailChecker.php";if(!MailChecker::isValid('[email protected]')){ die('O RLY !');}if(!MailChecker::isValid('myemail.com')){ die('O RLY !');}...
Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions. LooneyPwner is a proof-of-concept (PoC) exploit...
Company Name: b'Mozilla Core Services' Company HackerOne URL: https://hackerone.com/mozilla_core_services Submitted By:b'astrounder'Link to Submitters Profile:https://hackerone.com/b'astrounder' Report Title:b'Possibility of Deface through translation...
Company Name: b'Urban Dictionary' Company HackerOne URL: https://hackerone.com/urbandictionary Submitted By:b'flashdisk'Link to Submitters Profile:https://hackerone.com/b'flashdisk' Report Title:b'Race condition in up voting and...
Company Name: b'Internet Bug Bounty' Company HackerOne URL: https://hackerone.com/ibb Submitted By:b'happyhacking123'Link to Submitters Profile:https://hackerone.com/b'happyhacking123' Report Title:b'CVE-2023-40611: Apache Airflow Dag Runs...
Company Name: b'Glassdoor' Company HackerOne URL: https://hackerone.com/glassdoor Submitted By:b'frankcadillac'Link to Submitters Profile:https://hackerone.com/b'frankcadillac' Report Title:b'Unauthorized Access to Deleted Interviews on Glassdoor...
Google has announced that it's expanding its Vulnerability Rewards Program (VRP) to compensate researchers for finding attack scenarios tailored to...
The North Korea-aligned Lazarus Group has been attributed as behind a new campaign in which an unnamed software vendor was...
CISA Announces Launch of Logging Made Easy Today, CISA announces the launch of a new version of Logging Made Easy (LME)(link...
When organizations start incorporating cybersecurity regulations and cyber incident reporting requirements into their security protocols, it's essential for them to...
F5 has alerted customers of a critical security vulnerability impacting BIG-IP that could result in unauthenticated remote code execution. The...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
NAME__________TOTOLINK X2000R buffer overflowPlatforms Affected:TOTOLINK X2000R 1.0.0-B20230221.0948.webRisk Level:7.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________TOTOLINK X2000R is vulnerable to a stack-based buffer overflow, caused by...
NAME__________TOTOLINK X2000R buffer overflowPlatforms Affected:TOTOLINK X2000R 1.0.0-B20230221.0948.webRisk Level:7.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________TOTOLINK X2000R is vulnerable to a stack-based buffer overflow, caused by...
NAME__________TOTOLINK X2000R buffer overflowPlatforms Affected:TOTOLINK X2000R 1.0.0-B20230221.0948.webRisk Level:7.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________TOTOLINK X2000R is vulnerable to a stack-based buffer overflow, caused by...
NAME__________TOTOLINK X2000R buffer overflowPlatforms Affected:TOTOLINK X2000R 1.0.0-B20230221.0948.webRisk Level:7.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________TOTOLINK X2000R is vulnerable to a stack-based buffer overflow, caused by...