WPAxFuzz – A Full-Featured Open-Source Wi-Fi Fuzzer
This tool is capable of fuzzing either any management, control or data frame of the 802.11 protocol or the SAE...
This tool is capable of fuzzing either any management, control or data frame of the 802.11 protocol or the SAE...
Businesses operating in the Latin American (LATAM) region are the target of a new Windows-based banking trojan called TOITOIN since...
The threat actors behind the RomCom RAT have been suspected of phishing attacks targeting the upcoming NATO Summit in Vilnius...
Brick-and-mortar retailers and e-commerce sellers may be locked in a fierce battle for market share, but one area both can...
Mozilla has announced that some add-ons may be blocked from running on certain sites as part of a new feature...
Mastodon, a popular decentralized social network, has released a security update to fix critical vulnerabilities that could expose millions of...
Malicious actors exploited an unknown flaw in Revolut's payment systems to steal more than $20 million of the company's funds...
Brick-and-mortar retailers and e-commerce sellers may be locked in a fierce battle for market share, but one area both can...
CISOs, security leaders, and SOC teams often struggle with limited visibility into all connections made to their company-owned assets and...
The threat actors behind the RomCom RAT have been suspected of phishing attacks targeting the upcoming NATO Summit in Vilnius...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
NAME__________Ethyca Fides directory traversalPlatforms Affected:Ethyca Fides 2.15.0Risk Level:7.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Ethyca Fides could allow a remote attacker to traverse directories on...
NAME__________Statamic cross-site scriptingPlatforms Affected:Statamic Statamic 4.9.2Risk Level:5.5Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________Statamic is vulnerable to cross-site scripting, caused by improper validation of user-supplied...
NAME__________IBM Watson CP4D Data Stores denial of servicePlatforms Affected:IBM Watson CP4D Data Stores 4.6.0Risk Level:5.9Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________IBM Watson CP4D...
NAME__________Uptime Kuma directory traversalPlatforms Affected:Uptime Kuma Uptime Kuma 1.22.0Risk Level:6.5Exploitability:Proof of ConceptConsequences:Obtain Information DESCRIPTION__________Uptime Kuma could allow a remote authenticated...
NAME__________IBM Watson Knowledge Catalog CSV injectionPlatforms Affected:IBM Watson Knowledge Catalog on-prem 4.0Risk Level:7Exploitability:UnprovenConsequences:File Manipulation DESCRIPTION__________IBM Watson Knowledge Catalog on Cloud...
NAME__________AMI MegaRAC SPX header injectionPlatforms Affected:AMI MegaRAC SPX 12 AMI MegaRAC SPX 13Risk Level:5.7Exploitability:UnprovenConsequences:Data Manipulation DESCRIPTION__________AMI MegaRAC SPX is vulnerable...
NAME__________AMI MegaRAC SPX weak securityPlatforms Affected:AMI MegaRAC SPX 12 AMI MegaRAC SPX 13Risk Level:6.8Exploitability:UnprovenConsequences:Other DESCRIPTION__________AMI MegaRAC SPX could provide weaker...
NAME__________AMI MegaRAC SPX weak securityPlatforms Affected:AMI MegaRAC SPX 12 AMI MegaRAC SPX 13Risk Level:7.1Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________AMI MegaRAC SPX contains default...
NAME__________GLPI information disclosurePlatforms Affected:GLPI GLPI 9.5.0 GLPI GLPI 10.0.7Risk Level:7.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________GLPI could allow a remote attacker to obtain sensitive...
NAME__________GLPI information disclosurePlatforms Affected:GLPI GLPI 10.0.7 GLPI GLPI 9.2.0Risk Level:6.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________GLPI could allow a remote authenticated attacker to obtain...
NAME__________GPAC denial of servicePlatforms Affected:GPAC GPAC 2.2.1Risk Level:6.1Exploitability:Proof of ConceptConsequences:Denial of Service DESCRIPTION__________GPAC is vulnerable to a denial of service,...