Three significant vulnerabilities published in multiple versions of Splunk Enterprise and Splunk Cloud. The vulnerabilities allow for remote code execution, path traversal, and command injection. Splunk has released patches and urges users to update their installations immediately. CVE-2023-40595 – CVSSv3.1 Score 8.8 Attackers can execute a specially crafted query thatContinue Reading

Threat actor FromHell advertised a private modification of an exploit for the CVE-2023-27997 (FortiOS) vulnerability in CVE-2023-27997 is an unspecified vulnerability exists in the SSL/VPN component in Fortinet FortiOS 7.2.4 and earlier that, when exploited, allows an unauthenticated, remote attacker to execute arbitrary code. Several PoCs for the vulnerabilityContinue Reading

Solar farms, equipped with Internet-exposed monitoring devices manufactured by Contec, face significant cybersecurity challenges. The failure to address a critical vulnerability has left hundreds of these devices vulnerable to remote attacks, potentially leading to operational disruptions and unauthorized access. This article highlights the severity of the issue, the risks involved,Continue Reading

In the ever-evolving world of cybersecurity, companies need to stay ahead of emerging threats and continuously adapt to the changing landscape. Invicti Security, a leading provider of application security solutions, has recently announced a corporate rebrand, emphasizing its commitment to delivering AppSec (Application Security) with zero noise. This rebranding initiativeContinue Reading

In this article, I want to show you how to embed payload in PDF with EvilPDF tool. By the end of the article, you will be able to embed payload in PDF, and get a reverse shell from the victim, hopefully 🙂 EvilPDF is a Linux tool made in pythonContinue Reading

Citrix released builds to fix CVE-2022-27518, which affects the following Citrix ADC (formerly NetScaler) and Citrix Gateway versions: 12.1 (including FIPS and NDcPP) and 13.0 before 13.0-58.32 of Citrix ADC and Citrix Gateway, both of which must be configured with an SAML SP or IdP configuration to be affected. The vulnerability has very highContinue Reading

In recent years, it is very common to share PoC exploits for known vulnerabilities. It is very common to easily find several PoCs for vulnerabilitirs in GitHub. A researcher team from Leiden Institute of Advanced Computer Science announced that they discovered thousands of repositories on GitHub that offer fake PoCContinue Reading

Django is a free and open source Python web framework and maintained by the independent Django Software Foundation. An issue was discovered (CVE-2022-34265) in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. Trunc() and Extract() database functions were subject to SQL injection if untrusted data was used as a kind/lookup_nameContinue Reading