Vulnerability research

Filter by Category...
Caught in the FortiNet: How Attackers Can Exploit FortiClient to Compromise Organizations (2/3)
Blog

Caught in the FortiNet: How Attackers Can Exploit FortiClient to Compromise Organizations (2/3)

We recently discovered critical vulnerabilities in Fortinet’s endpoint protection solution that enable attackers to fully compromise organizations with minimal user interaction. In this second article, we will cover how attackers can use the compromised endpoint to achieve lateral movement within an organization.

Read article >

Caught in the FortiNet: How Attackers Can Exploit FortiClient to Compromise Organizations (1/3)
Blog

Caught in the FortiNet: How Attackers Can Exploit FortiClient to Compromise Organizations (1/3)

We recently discovered critical vulnerabilities in Fortinet’s endpoint protection solution that enable attackers to fully compromise organizations with minimal user interaction. In the first post of the series, we will see how attackers can get the first foothold within an organization.

Read article >

Double Dash, Double Trouble: A Subtle SQL Injection Flaw
Blog

Double Dash, Double Trouble: A Subtle SQL Injection Flaw

Can a simple dash character introduce a security risk? Discover how SQL line comments can open the door to unexpected injection vulnerabilities in several PostgreSQL client libraries!

Read article >

Scripting Outside the Box: API Client Security Risks (2/2)
Blog

Scripting Outside the Box: API Client Security Risks (2/2)

Continuing on API client security, we cover more sandbox bypasses, this time in Bruno and Hoppscotch, as well as JavaScript sandboxing best practices.

Read article >

Scripting Outside the Box: API Client Security Risks (1/2)
Blog

Scripting Outside the Box: API Client Security Risks (1/2)

Discover hidden risks in API testing tools like Postman and Insomnia. We dive into scripting vulnerabilities and explore JavaScript sandbox security pitfalls.

Read article >

Data in Danger: Detecting Cross-Site Scripting in Grafana
Blog

Data in Danger: Detecting Cross-Site Scripting in Grafana

Learn how SonarQube detected a Cross-Site Scripting (XSS) vulnerability in Grafana, a popular open-source data observability platform.

Read article >