ABB Cylon Aspect 3.08.03 – Guest2Root Privilege Escalation

#!/usr/bin/env python # # # Exploit Title: ABB Cylon Aspect 3.08.03 – Guest2Root Privilege Escalation # # # Vendor: ABB Ltd. # Product web page: https://www.global.abb # Affected version: NEXUS Series, MATRIX-2 Series, ASPECT-Enterprise, ASPECT-Studio # Firmware: <=3.08.03 # # Summary: ASPECT is an award-winning scalable building energy management # and control solution designed to…

Read More

Java-springboot-codebase 1.1 – Arbitrary File Read

# Exploit Title: Java-springboot-codebase 1.1 – Arbitrary File Read # Google Dork: # Date: 23/May/2025 # Exploit Author: d3sca # Vendor Homepage: https://github.com/OsamaTaher/Java-springboot-codebase # Software Link: https://github.com/OsamaTaher/Java-springboot-codebase # Version: [app version] 1.1 # Tested on: Debian Linux # CVE : CVE-2025-46822 #usage: python3 cve-2025-46822.py http://victim.com /etc/passwd import argparse import requests from urllib.parse…

Read More

Grandstream GSD3710 1.0.11.13 – Stack Buffer Overflow

#!/usr/bin/env python3 # Exploit Title: Grandstream GSD3710 1.0.11.13 – Stack Buffer Overflow # Google Dork: [if applicable] # Date: 2025-05-23 # Exploit Author: Pepelux (user in ExploitDB) # Vendor Homepage: https://www.grandstream.com/ # Software Link: [download link if available] # Version: Grandstream GSD3710 – firmware:1.0.11.13 and lower # Tested on: Linux and MacOS # CVE:…

Read More

Microsoft Windows Server 2016 – Win32k Elevation of Privilege

# Exploit Title: Microsoft Windows Server 2016 – Win32k Elevation of Privilege # Date: 2025-05-19 # Exploit Author: Milad Karimi (Ex3ptionaL) # Contact: miladgrayhat@gmail.com # Zone-H: www.zone-h.org/archive/notifier=Ex3ptionaL # Country: United Kingdom # CVE : CVE-2023-29336 #include #include #include #define IDM_MYMENU 101 #define IDM_EXIT 102 #define IDM_DISABLE 0xf120 …

Read More

Waiting Thread Hijacking: A Stealthier Version of Thread Execution Hijacking

Research by: hasherezade Process Injection is one of the important techniques in the attackers’ toolkit. In the constant cat-and-mouse game, attackers try to invent its new implementations that bypass defenses, using creative methods and lesser-known APIs. Combining common building blocks in an atypical way, Check Point Research was able to create a much stealthier version…

Read More

Renewed APT29 Phishing Campaign Against European Diplomats

Highlights Check Point Research has been tracking an advanced phishing campaign conducted by APT29, a Russia linked threat group, which is targeting diplomatic entities across Europe. The campaign, which appears to be a continuation of a previous one that utilized a backdoor known as WINELOADER, impersonates a major European foreign affairs ministry to distribute fake invitations to diplomatic…

Read More

CVE-2025-24054, NTLM Exploit in the Wild

Key Points CVE-2025-24054 is a vulnerability related to NTLM hash disclosure via spoofing, which can be exploited using a maliciously crafted .library-ms file. Active exploitation in the wild has been observed since March 19, 2025, potentially allowing attackers to leak NTLM hashes or user passwords and compromise systems. Although Microsoft released a patch on March…

Read More

21st April – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 21st April, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Retail giant Ahold Delhaize has suffered a cyber-attack resulting in data theft of customer information from its US business systems. The attack, claimed by ransomware group INC Ransom, impacted Ahold Delhaize USA…

Read More

WordPress User Registration & Membership Plugin 4.1.2 – Authentication Bypass

#!/usr/bin/env python3 # Exploit Title: WordPress User Registration & Membership Plugin 4.1.2 – Authentication Bypass # Date: 2025-05-22 # Exploit Author: Mohammed Idrees Banyamer # Vendor Homepage: https://wordpress.org/plugins/user-registration/ # Software Link: https://downloads.wordpress.org/plugin/user-registration.4.1.2.zip # Version: <= 4.1.2 # Tested on: WordPress 6.x, Apache on Linux # CVE: CVE-2025-2594 import requests import sys import argparse from…

Read More