BlackCat/ALPHV Ransomware Victim: LeClair Group
BlackCat / ALPHV Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the...
BlackCat / ALPHV Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the...
BlackCat / ALPHV Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the...
BlackCat / ALPHV Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the...
Multiple security vulnerabilities have been disclosed in the runC command line tool that could be exploited by threat actors to...
Company Name: b'curl' Company HackerOne URL: https://hackerone.com/curl Submitted By:b'kurohiro'Link to Submitters Profile:https://hackerone.com/b'kurohiro' Report Title:b'CVE-2024-0853: OCSP verification bypass with TLS session...
Company Name: b'Publitas' Company HackerOne URL: https://hackerone.com/publitas Submitted By:b'2k_hacker'Link to Submitters Profile:https://hackerone.com/b'2k_hacker' Report Title:b'CORS Misconfiguration on 'Report Link:https://hackerone.com/reports/2332728Date Submitted:31 January...
CISA and FBI Release Secure by Design Alert Urging Manufacturers to Eliminate Defects in SOHO Routers Today, CISA and the...
Ivanti is alerting of two new high-severity flaws in its Connect Secure and Policy Secure products, one of which is...
A pair of recently disclosed zero-day flaws in Ivanti Connect Secure (ICS) virtual private network (VPN) devices have been exploited...
Cybersecurity researchers are calling attention to the "democratization" of the phishing ecosystem owing to the emergence of Telegram as an...
The SEC isn't giving SaaS a free pass. Applicable public companies, known as "registrants," are now subject to cyber incident...
A financially motivated threat actor known as UNC4990 is leveraging weaponized USB devices as an initial infection vector to target...
NAME__________Exclusive Addons for Elementor Plugin for WordPress cross-site scriptingPlatforms Affected:WordPress Exclusive Addons for Elementor Plugin for WordPress 2.6.8Risk Level:6.4Exploitability:HighConsequences:Cross-Site Scripting...
NAME__________Meks Smart Social Widget Plugin for WordPress cross-site scriptingPlatforms Affected: WordPress Meks Smart Social Widget plugin for WordPress 1.6.3Risk Level:4.4Exploitability:HighConsequences:Cross-Site...
NAME__________Backuply Plugin for WordPress directory traversalPlatforms Affected:WordPress Backuply Plugin for WordPress 1.2.3Risk Level:6.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Backuply Plugin for WordPress could allow...
NAME__________TOTOLINK N200RE buffer overflowPlatforms Affected:TOTOLINK N200RE 9.3.5u.6139_B20201216Risk Level:7.2Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION__________TOTOLINK N200RE is vulnerable to a stack-based buffer overflow,...
NAME__________NODERP information disclosurePlatforms Affected:Shanxi Diankeyun Technology NODERP 6.0.2 Shanxi Diankeyun Technology NODERP 6.0.1Risk Level:5.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________NODERP could allow a remote...
NAME__________TOTOLINK N200RE buffer overflowPlatforms Affected:TOTOLINK N200RE 9.3.5u.6139_B20201216Risk Level:7.2Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION__________TOTOLINK N200RE is vulnerable to a stack-based buffer overflow,...
NAME__________TOTOLINK N200RE buffer overflowPlatforms Affected:TOTOLINK N200RE 9.3.5u.6139_B20201216Risk Level:7.2Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION__________TOTOLINK N200RE is vulnerable to a stack-based buffer overflow,...
NAME__________TOTOLINK N200RE buffer overflowPlatforms Affected:TOTOLINK N200RE 9.3.5u.6139_B20201216Risk Level:7.2Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION__________TOTOLINK N200RE is vulnerable to a stack-based buffer overflow,...
NAME__________Tenda i6 buffer overflowPlatforms Affected:Tenda i6 1.0.0.9(3857)Risk Level:7.2Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION__________Tenda i6 is vulnerable to a stack-based buffer overflow,...
NAME__________Tenda W6 buffer overflowPlatforms Affected:Tenda W6 1.0.0.9(4122)Risk Level:7.2Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION__________Tenda W6 is vulnerable to a stack-based buffer overflow,...
NAME__________TOTOLINK N200RE buffer overflowPlatforms Affected:TOTOLINK N200RE 9.3.5u.6139_B20201216Risk Level:7.2Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION__________TOTOLINK N200RE is vulnerable to a stack-based buffer overflow,...
NAME__________TOTOLINK N200RE buffer overflowPlatforms Affected:TOTOLINK N200RE 9.3.5u.6139_B20201216Risk Level:7.2Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION__________TOTOLINK N200RE is vulnerable to a stack-based buffer overflow,...