8 Base Ransomware Victim: Mediplast AB
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NAME__________Google Android information disclosurePlatforms Affected:Google AndroidRisk Level:6.2Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Google Android could allow a local attacker to obtain sensitive information, caused...
NAME__________Microsoft Windows Composite Image File System (CimFS) privilege escalationPlatforms Affected:Risk Level:7.8Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION__________Microsoft Windows could allow a local authenticated attacker...
NAME__________Microsoft Windows Print Spooler privilege escalationPlatforms Affected:Risk Level:7Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION__________Microsoft Windows could allow a local authenticated attacker to gain elevated...
NAME__________Lenovo Desktop, Notebook and ThinkPad products security bypassPlatforms Affected:Lenovo ThinkPad Lenovo Desktop Lenovo NotebookRisk Level:6.1Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Lenovo Desktop, Notebook and...
NAME__________Microsoft Software for Open Networking in the Cloud (SONiC) privilege escalationPlatforms Affected:Risk Level:7.8Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION__________Microsoft Software for Open Networking in...
NAME__________Microsoft Windows Kernel privilege escalationPlatforms Affected:Risk Level:7.8Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION__________Microsoft Windows could allow a local authenticated attacker to gain elevated privileges...
NAME__________PHOENIX CONTACT CHARX SEC charge controllers file uploadPlatforms Affected:PHOENIX CONTACT CHARX SEC-3000 1.5.0 PHOENIX CONTACT CHARX SEC-3050 1.5.0 PHOENIX CONTACT...
NAME__________Microsoft Windows Telephony Server privilege escalationPlatforms Affected:Risk Level:7Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION__________Microsoft Windows could allow a local authenticated attacker to gain elevated...
NAME__________NI LabVIEW code executionPlatforms Affected:NI LabVIEW 2024 Q1Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________NI LabVIEW could allow a remote attacker to execute arbitrary...
NAME__________Microsoft Windows Compressed Folder tamperingPlatforms Affected:Risk Level:6.5Exploitability:UnprovenConsequences:Data Manipulation DESCRIPTION__________Microsoft Windows is vulnerable to data tampering, caused by a flaw in...
NAME__________Microsoft Windows Installer privilege escalationPlatforms Affected:Risk Level:7.4Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION__________Microsoft Windows could allow a local attacker to gain elevated privileges on...
NAME__________Microsoft Windows Kernel privilege escalationPlatforms Affected:Risk Level:7.8Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION__________Microsoft Windows could allow a local authenticated attacker to gain elevated privileges...
NAME__________PHOENIX CONTACT CHARX SEC charge controllers security bypassPlatforms Affected:PHOENIX CONTACT CHARX SEC-3000 1.5.0 PHOENIX CONTACT CHARX SEC-3050 1.5.0 PHOENIX CONTACT...
NAME__________Microsoft Windows SCSI Class System File privilege escalationPlatforms Affected:Risk Level:7.8Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION__________Microsoft Windows could allow a local authenticated attacker to...
NAME__________Microsoft SharePoint Server code executionPlatforms Affected:Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Microsoft SharePoint Server could allow a remote attacker to execute arbitrary code...
NAME__________NI LabVIEW code executionPlatforms Affected:NI LabVIEW 2024 Q1Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________NI LabVIEW could allow a remote attacker to execute arbitrary...
NAME__________Microsoft Defender security bypassPlatforms Affected:Microsoft Windows Defender Antimalware PlatformRisk Level:5.5Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Microsoft Defender could allow a local authenticated attacker to...
NAME__________Microsoft Windows NTFS privilege escalationPlatforms Affected:Risk Level:7.8Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION__________Microsoft Windows could allow a local authenticated attacker to gain elevated privileges...
NAME__________Microsoft Intune for Android Linux Agent privilege escalationPlatforms Affected:Risk Level:6.6Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION__________Microsoft Intune for Android could allow a remote authenticated...