Storm Watch (
)

2025-06-27: 10 news articles added 2025-06-27: 13 files added 2025-03-03: 1 voting poll added 2025-06-22 (1750550400) Apologies for the downtime this morning. We had a cute DDoS attack. Cute because it wasn't sophisticated and more annoying than anything. A few hostile countries performed some tests and then leveraged thousands of AWS hosts to perform excessive /HEAD requests. The timing of this attack is not lost on us. However, it's mitigated for now. Monitoring will continue in case they pivot. 2025-06-10 (1749513600) This morning's downtime was due to normal system updates, albeit out of band. Everything should be back online now. ... [ View Full Changelog ] |
Polls (
)

It's not uncommon for a large corporation to find out they have been infiltrated for years. However, corporations have a long history of sweeping issues under the rug instead of being forthright with their stakeholders. For those in the trenches, Packet Storm knows it is a more common occurance than anyone would like to admit and the damage is rarely contained properly.
What is the most likely reality if hackers have been in your network for years? | |
Answers | Results |
Your source repo likely has backdoors everywhere. | 0% |
You probably need to rebuild all of your servers. | 0% |
You have to do heavy forensics and find all indicators of compromise. | 0% |
You need to publicly acknowledge this to your consumers and shareholders. | 25% |
All of the above. | 62% |
You can embrace your inner arrogance and ignore it because revenue is all that matters. | 12% |
Grab Gear (
)

Files (
)

Skyvern 0.1.84 SSTI Remote Code Execution
Posted: 2025-06-27
Posted: 2025-06-27
Vite Arbitrary File Read
Posted: 2025-06-27
Posted: 2025-06-27
WordPress Social Welfare 3.5.2 Remote Code Execution
Posted: 2025-06-27
Posted: 2025-06-27
Ubuntu Security Notice USN-7599-2
Posted: 2025-06-27
Posted: 2025-06-27
Ubuntu Security Notice USN-7600-1
Posted: 2025-06-27
Posted: 2025-06-27
McAfee Agent 5.7.6 Insecure Storage
Posted: 2025-06-27
Posted: 2025-06-27
Mouselink 5.0.1 Authentication Bypass
Posted: 2025-06-27
Posted: 2025-06-27
Mouselink 5.0.1 Unauthenticated Remote Code Execution
Posted: 2025-06-27
Posted: 2025-06-27
Sitecore 10.4 Remote Code Execution
Posted: 2025-06-27
Posted: 2025-06-27
Red Hat Security Advisory 2025-9845-03
Posted: 2025-06-27
Posted: 2025-06-27
News (
)

Hawaiian Airlines Hit by Cybersecurity Incident
Posted: 2025-06-27
Posted: 2025-06-27
Chinese Hackers Target Chinese Users with RAT, Rootkit
Posted: 2025-06-27
Posted: 2025-06-27
Vulnerability Exposed All Open VSX Repositories to Takeover
Posted: 2025-06-27
Posted: 2025-06-27
Six Arrested at Protest of Palantir
Posted: 2025-06-27
Posted: 2025-06-27
Evidence Suggests Exploitation of CitrixBleed 2 Vulnerability
Posted: 2025-06-27
Posted: 2025-06-27
Storm Watch (
)

2025-06-27: 10 news articles added 2025-06-27: 13 files added 2025-03-03: 1 voting poll added 2025-06-22 (1750550400) Apologies for the downtime this morning. We had a cute DDoS attack. Cute because it wasn't sophisticated and more annoying than anything. A few hostile countries performed some tests and then leveraged thousands of AWS hosts to perform excessive /HEAD requests. The timing of this attack is not lost on us. However, it's mitigated for now. Monitoring will continue in case they pivot. 2025-06-10 (1749513600) This morning's downtime was due to normal system updates, albeit out of band. Everything should be back online now. ... [ View Full Changelog ] |
Polls (
)

It's not uncommon for a large corporation to find out they have been infiltrated for years. However, corporations have a long history of sweeping issues under the rug instead of being forthright with their stakeholders. For those in the trenches, Packet Storm knows it is a more common occurance than anyone would like to admit and the damage is rarely contained properly.
What is the most likely reality if hackers have been in your network for years? | |
Answers | Results |
Your source repo likely has backdoors everywhere. | 0% |
You probably need to rebuild all of your servers. | 0% |
You have to do heavy forensics and find all indicators of compromise. | 0% |
You need to publicly acknowledge this to your consumers and shareholders. | 25% |
All of the above. | 62% |
You can embrace your inner arrogance and ignore it because revenue is all that matters. | 12% |
Files (
)

Skyvern 0.1.84 SSTI Remote Code Execution
Posted: 2025-06-27
Posted: 2025-06-27
Vite Arbitrary File Read
Posted: 2025-06-27
Posted: 2025-06-27
WordPress Social Welfare 3.5.2 Remote Code Execution
Posted: 2025-06-27
Posted: 2025-06-27
Ubuntu Security Notice USN-7599-2
Posted: 2025-06-27
Posted: 2025-06-27
Ubuntu Security Notice USN-7600-1
Posted: 2025-06-27
Posted: 2025-06-27
McAfee Agent 5.7.6 Insecure Storage
Posted: 2025-06-27
Posted: 2025-06-27
Mouselink 5.0.1 Authentication Bypass
Posted: 2025-06-27
Posted: 2025-06-27
Mouselink 5.0.1 Unauthenticated Remote Code Execution
Posted: 2025-06-27
Posted: 2025-06-27
Sitecore 10.4 Remote Code Execution
Posted: 2025-06-27
Posted: 2025-06-27
Red Hat Security Advisory 2025-9845-03
Posted: 2025-06-27
Posted: 2025-06-27
News (
)

Hawaiian Airlines Hit by Cybersecurity Incident
Posted: 2025-06-27
Posted: 2025-06-27
Chinese Hackers Target Chinese Users with RAT, Rootkit
Posted: 2025-06-27
Posted: 2025-06-27
Vulnerability Exposed All Open VSX Repositories to Takeover
Posted: 2025-06-27
Posted: 2025-06-27
Six Arrested at Protest of Palantir
Posted: 2025-06-27
Posted: 2025-06-27
Evidence Suggests Exploitation of CitrixBleed 2 Vulnerability
Posted: 2025-06-27
Posted: 2025-06-27