Library Management System with QR code file upload file upload |
NAME Library Management System with QR code file upload file upload Platforms Affected:Sourcecodester Library Management System with QR code 1.0Risk...
NAME Library Management System with QR code file upload file upload Platforms Affected:Sourcecodester Library Management System with QR code 1.0Risk...
NAME Vim code execution Platforms Affected:Vim Vim 8.2Risk Level:7.8Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION Vim could allow a remote attacker to...
NAME Node.js en-conduit-electron-shared module code execution Platforms Affected:Node.js en-conduit-electron-sharedRisk Level:9.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Node.js en-conduit-electron-shared module could allow a remote attacker...
NAME Node.js en-thrift-internal module execution Platforms Affected:Node.js en-thrift-internalRisk Level:9.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Node.js en-thrift-internal module could allow a remote attacker to...
NAME Mozilla Firefox code execution Platforms Affected:Mozilla Firefox 101 Mozilla Firefox ESR 91.10 Mozilla Thunderbird 101 Mozilla Thunderbird 91.10Risk Level:8.8Exploitability:UnprovenConsequences:Gain...
Programme HackerOne TikTok TikTok Submitted by aidilarf_2000 aidilarf_2000 Report XSS Payload on TikTok Seller Center endpoint Full Report A considerable...
nimc2 is a very lightweight C2 written fully in nim (implant & server). If you want to give it a...
Daily Vulnerability Trends (sourced from VulnMon) CVE NAMECVE DescriptionCVE-2022-21445Vulnerability in the Oracle JDeveloper product of Oracle Fusion Middleware (component: ADF...
LockBit 2.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
This paper provides a taxonomic classification of non-state actors in the cyberspace, analyzing their role and impact on a state’s...
We analyzed cases of a Log4Shell vulnerability being exploited in certain versions of the software VMware Horizon. Many of these...
CISA Releases Guidance on Switching to Modern Auth in Exchange Online before October 1 CISA has released guidance on switching...
LockBit 2.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
2022 CWE Top 25 Most Dangerous Software Weaknesses The Homeland Security Systems Engineering and Development Institute, sponsored by CISA and...
The LockBit ransomware operators released LockBit 3.0 with important novelties, including a bug bounty program and Zcash payments. The Lockbit...