Wed 12 March 2025
Exploitation of multiple vulnerabilities in GLPI to gain remote code execution from unauthenticated privileges.
Mon 04 November 2024
In this blog post, we describe new techniques to dump PHP files leveraging filters, and a tool that does it.
Mon 30 September 2024
In this blog post, we will explore how we can exploit CNEXT, but blind, covering the cases where we have a file read primitive, but cannot get the output.
Thu 26 September 2024
An authentication bypass vulnerability was found on Jupiter X Core Plugin <= 4.7.5 (CVE-2024-7781).
A pre-authentication remote code execution vulnerability was found on Jupiter X Core Plugin <= 4.6.5 (CVE-2024-7772).
Mon 17 June 2024
In this blog post, we will explore a new way of exploiting the vulnerability on PHP, using direct calls to iconv(), and illustrate the vulnerability by targeting Roundcube, a popular PHP webmail.
iconv()
Check our offensive & continuous web security assessment service