<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Hazard Lab]]></title><description><![CDATA[HazardLab is a cybersecurity research group that specializes in the continuous assessment of digital security threats. focus on identifying and analyzing vulnerabilities and zero-day exploits across various industries. ]]></description><link>https://www.hazardlab.ninja</link><image><url>https://substackcdn.com/image/fetch/$s_!ljXg!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F302bf36e-56d2-4ba4-89fd-8ee20ec97218_500x500.png</url><title>Hazard Lab</title><link>https://www.hazardlab.ninja</link></image><generator>Substack</generator><lastBuildDate>Fri, 17 Apr 2026 05:29:46 GMT</lastBuildDate><atom:link href="https://www.hazardlab.ninja/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Reza]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[hazardlab@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[hazardlab@substack.com]]></itunes:email><itunes:name><![CDATA[Reza]]></itunes:name></itunes:owner><itunes:author><![CDATA[Reza]]></itunes:author><googleplay:owner><![CDATA[hazardlab@substack.com]]></googleplay:owner><googleplay:email><![CDATA[hazardlab@substack.com]]></googleplay:email><googleplay:author><![CDATA[Reza]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Python Sandbox Escape via Dunder Method Invocation]]></title><description><![CDATA[A Deep Analysis of CVE-2025-9959 - Python Sandbox Escape via Dunder Attribute Validation Bypass in Smolagents]]></description><link>https://www.hazardlab.ninja/p/python-sandbox-escape-via-dunder</link><guid isPermaLink="false">https://www.hazardlab.ninja/p/python-sandbox-escape-via-dunder</guid><dc:creator><![CDATA[Reza]]></dc:creator><pubDate>Tue, 23 Dec 2025 12:47:51 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!jPOb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ee7dbed-c5f6-49ef-8f96-07e0206c6b78_1414x2000.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jPOb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ee7dbed-c5f6-49ef-8f96-07e0206c6b78_1414x2000.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jPOb!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ee7dbed-c5f6-49ef-8f96-07e0206c6b78_1414x2000.png 424w, https://substackcdn.com/image/fetch/$s_!jPOb!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ee7dbed-c5f6-49ef-8f96-07e0206c6b78_1414x2000.png 848w, https://substackcdn.com/image/fetch/$s_!jPOb!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ee7dbed-c5f6-49ef-8f96-07e0206c6b78_1414x2000.png 1272w, https://substackcdn.com/image/fetch/$s_!jPOb!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ee7dbed-c5f6-49ef-8f96-07e0206c6b78_1414x2000.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jPOb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ee7dbed-c5f6-49ef-8f96-07e0206c6b78_1414x2000.png" width="1414" height="2000" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2ee7dbed-c5f6-49ef-8f96-07e0206c6b78_1414x2000.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2000,&quot;width&quot;:1414,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3190996,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://hazardlab.substack.com/i/182218484?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ee7dbed-c5f6-49ef-8f96-07e0206c6b78_1414x2000.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!jPOb!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ee7dbed-c5f6-49ef-8f96-07e0206c6b78_1414x2000.png 424w, https://substackcdn.com/image/fetch/$s_!jPOb!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ee7dbed-c5f6-49ef-8f96-07e0206c6b78_1414x2000.png 848w, https://substackcdn.com/image/fetch/$s_!jPOb!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ee7dbed-c5f6-49ef-8f96-07e0206c6b78_1414x2000.png 1272w, https://substackcdn.com/image/fetch/$s_!jPOb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ee7dbed-c5f6-49ef-8f96-07e0206c6b78_1414x2000.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1></h1><p>This security research document presents a comprehensive analysis of a sandbox escape vulnerability discovered in the HuggingFace smolagents library. The vulnerability, addressed in Pull Request #1551, allowed attackers to bypass Python interpreter sandboxing through dunder (double underscore) method invocation. This document provides an in-depth technical examination of the vulnerability, gadget chain construction methodology, exploitation techniques, and the implemented mitigation strategies.</p><h2>1. Introduction and Background</h2><h3>1.1 Research Context</h3><p>The smolagents library, developed by HuggingFace, provides a framework for building AI agents capable of executing Python code. A critical component of this framework is the <code>LocalPythonExecutor</code>, which implements a sandboxed Python interpreter designed to safely execute untrusted code generated by language models.</p><p>Sandbox implementations in Python face inherent challenges due to the language&#8217;s dynamic nature and extensive introspection capabilities. The vulnerability examined in this research demonstrates how subtle implementation gaps can lead to complete sandbox compromise.</p><h3>1.2 Vulnerability Overview</h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!GsSI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a16c648-21e0-403e-b7fc-ce22c9bb8bbd_1995x415.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GsSI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a16c648-21e0-403e-b7fc-ce22c9bb8bbd_1995x415.png 424w, https://substackcdn.com/image/fetch/$s_!GsSI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a16c648-21e0-403e-b7fc-ce22c9bb8bbd_1995x415.png 848w, https://substackcdn.com/image/fetch/$s_!GsSI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a16c648-21e0-403e-b7fc-ce22c9bb8bbd_1995x415.png 1272w, https://substackcdn.com/image/fetch/$s_!GsSI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a16c648-21e0-403e-b7fc-ce22c9bb8bbd_1995x415.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GsSI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a16c648-21e0-403e-b7fc-ce22c9bb8bbd_1995x415.png" width="1456" height="303" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6a16c648-21e0-403e-b7fc-ce22c9bb8bbd_1995x415.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:303,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:69098,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://hazardlab.substack.com/i/182218484?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a16c648-21e0-403e-b7fc-ce22c9bb8bbd_1995x415.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!GsSI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a16c648-21e0-403e-b7fc-ce22c9bb8bbd_1995x415.png 424w, https://substackcdn.com/image/fetch/$s_!GsSI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a16c648-21e0-403e-b7fc-ce22c9bb8bbd_1995x415.png 848w, https://substackcdn.com/image/fetch/$s_!GsSI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a16c648-21e0-403e-b7fc-ce22c9bb8bbd_1995x415.png 1272w, https://substackcdn.com/image/fetch/$s_!GsSI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a16c648-21e0-403e-b7fc-ce22c9bb8bbd_1995x415.png 1456w" sizes="100vw"></picture><div></div></div></a></figure></div><p></p><h3>1.3 Document Scope</h3><p>This research covers:</p><ul><li><p>Technical analysis of Python&#8217;s object model as it relates to sandbox escapes</p></li><li><p>Detailed vulnerability root cause analysis</p></li><li><p>Gadget chain identification and construction methodology</p></li><li><p>Working proof-of-concept exploitation</p></li><li><p>Mitigation effectiveness evaluation</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UM-n!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c2f466e-01c1-4187-93e0-5059c2c6aa90_563x906.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UM-n!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c2f466e-01c1-4187-93e0-5059c2c6aa90_563x906.png 424w, https://substackcdn.com/image/fetch/$s_!UM-n!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c2f466e-01c1-4187-93e0-5059c2c6aa90_563x906.png 848w, https://substackcdn.com/image/fetch/$s_!UM-n!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c2f466e-01c1-4187-93e0-5059c2c6aa90_563x906.png 1272w, https://substackcdn.com/image/fetch/$s_!UM-n!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c2f466e-01c1-4187-93e0-5059c2c6aa90_563x906.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UM-n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c2f466e-01c1-4187-93e0-5059c2c6aa90_563x906.png" width="563" height="906" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9c2f466e-01c1-4187-93e0-5059c2c6aa90_563x906.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:906,&quot;width&quot;:563,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!UM-n!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c2f466e-01c1-4187-93e0-5059c2c6aa90_563x906.png 424w, https://substackcdn.com/image/fetch/$s_!UM-n!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c2f466e-01c1-4187-93e0-5059c2c6aa90_563x906.png 848w, https://substackcdn.com/image/fetch/$s_!UM-n!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c2f466e-01c1-4187-93e0-5059c2c6aa90_563x906.png 1272w, https://substackcdn.com/image/fetch/$s_!UM-n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c2f466e-01c1-4187-93e0-5059c2c6aa90_563x906.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2>2. Python Object Model Fundamentals</h2><h3>2.1 Object Hierarchy in Python</h3><p>Understanding Python&#8217;s object model is essential for comprehending how sandbox escapes function. Every object in Python exists within a class hierarchy that ultimately derives from the base <code>object</code> class.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XyNb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa603ddf4-f83c-4274-87c0-df4fe7dbed57_300x107.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XyNb!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa603ddf4-f83c-4274-87c0-df4fe7dbed57_300x107.png 424w, https://substackcdn.com/image/fetch/$s_!XyNb!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa603ddf4-f83c-4274-87c0-df4fe7dbed57_300x107.png 848w, https://substackcdn.com/image/fetch/$s_!XyNb!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa603ddf4-f83c-4274-87c0-df4fe7dbed57_300x107.png 1272w, https://substackcdn.com/image/fetch/$s_!XyNb!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa603ddf4-f83c-4274-87c0-df4fe7dbed57_300x107.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XyNb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa603ddf4-f83c-4274-87c0-df4fe7dbed57_300x107.png" width="300" height="107" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a603ddf4-f83c-4274-87c0-df4fe7dbed57_300x107.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:107,&quot;width&quot;:300,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!XyNb!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa603ddf4-f83c-4274-87c0-df4fe7dbed57_300x107.png 424w, https://substackcdn.com/image/fetch/$s_!XyNb!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa603ddf4-f83c-4274-87c0-df4fe7dbed57_300x107.png 848w, https://substackcdn.com/image/fetch/$s_!XyNb!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa603ddf4-f83c-4274-87c0-df4fe7dbed57_300x107.png 1272w, https://substackcdn.com/image/fetch/$s_!XyNb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa603ddf4-f83c-4274-87c0-df4fe7dbed57_300x107.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>The following code demonstrates traversing this hierarchy:</p><pre><code><code>obj = ()
print(f'Object: {obj}')
print(f'Type: {type(obj)}')
print(f'Class: {obj.__class__}')
print(f'Bases: {obj.__class__.__bases__}')
print(f'Object base: {obj.__class__.__bases__[0]}')
print(f'Subclasses count: {len(object.__subclasses__())}')
</code></code></pre><p><strong>Execution Output:</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Ip19!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F226cebc5-ac38-449b-834f-28dc3d5eb849_900x438.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ip19!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F226cebc5-ac38-449b-834f-28dc3d5eb849_900x438.png 424w, https://substackcdn.com/image/fetch/$s_!Ip19!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F226cebc5-ac38-449b-834f-28dc3d5eb849_900x438.png 848w, https://substackcdn.com/image/fetch/$s_!Ip19!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F226cebc5-ac38-449b-834f-28dc3d5eb849_900x438.png 1272w, https://substackcdn.com/image/fetch/$s_!Ip19!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F226cebc5-ac38-449b-834f-28dc3d5eb849_900x438.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ip19!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F226cebc5-ac38-449b-834f-28dc3d5eb849_900x438.png" width="900" height="438" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/226cebc5-ac38-449b-834f-28dc3d5eb849_900x438.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:438,&quot;width&quot;:900,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Python Object Hierarchy&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Python Object Hierarchy" title="Python Object Hierarchy" srcset="https://substackcdn.com/image/fetch/$s_!Ip19!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F226cebc5-ac38-449b-834f-28dc3d5eb849_900x438.png 424w, https://substackcdn.com/image/fetch/$s_!Ip19!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F226cebc5-ac38-449b-834f-28dc3d5eb849_900x438.png 848w, https://substackcdn.com/image/fetch/$s_!Ip19!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F226cebc5-ac38-449b-834f-28dc3d5eb849_900x438.png 1272w, https://substackcdn.com/image/fetch/$s_!Ip19!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F226cebc5-ac38-449b-834f-28dc3d5eb849_900x438.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>2.2 Dunder Methods and Attributes</h3><p>Python uses double underscore (dunder) naming convention for special methods and attributes that control fundamental object behavior:</p>
      <p>
          <a href="https://www.hazardlab.ninja/p/python-sandbox-escape-via-dunder">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[PNETLab RCE - CVE-2025-40629]]></title><description><![CDATA[Product: PNETLab]]></description><link>https://www.hazardlab.ninja/p/pnetlab-rce-cve-2025-40629</link><guid isPermaLink="false">https://www.hazardlab.ninja/p/pnetlab-rce-cve-2025-40629</guid><dc:creator><![CDATA[Reza]]></dc:creator><pubDate>Sun, 21 Dec 2025 01:12:30 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!4JIE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6aff69c8-5cd7-4e83-b0f3-3003d0ab3fb9_1312x736.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4JIE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6aff69c8-5cd7-4e83-b0f3-3003d0ab3fb9_1312x736.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4JIE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6aff69c8-5cd7-4e83-b0f3-3003d0ab3fb9_1312x736.jpeg 424w, https://substackcdn.com/image/fetch/$s_!4JIE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6aff69c8-5cd7-4e83-b0f3-3003d0ab3fb9_1312x736.jpeg 848w, https://substackcdn.com/image/fetch/$s_!4JIE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6aff69c8-5cd7-4e83-b0f3-3003d0ab3fb9_1312x736.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!4JIE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6aff69c8-5cd7-4e83-b0f3-3003d0ab3fb9_1312x736.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4JIE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6aff69c8-5cd7-4e83-b0f3-3003d0ab3fb9_1312x736.jpeg" width="1312" height="736" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6aff69c8-5cd7-4e83-b0f3-3003d0ab3fb9_1312x736.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:736,&quot;width&quot;:1312,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:80523,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://hazardlab.substack.com/i/182207169?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6aff69c8-5cd7-4e83-b0f3-3003d0ab3fb9_1312x736.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4JIE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6aff69c8-5cd7-4e83-b0f3-3003d0ab3fb9_1312x736.jpeg 424w, https://substackcdn.com/image/fetch/$s_!4JIE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6aff69c8-5cd7-4e83-b0f3-3003d0ab3fb9_1312x736.jpeg 848w, https://substackcdn.com/image/fetch/$s_!4JIE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6aff69c8-5cd7-4e83-b0f3-3003d0ab3fb9_1312x736.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!4JIE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6aff69c8-5cd7-4e83-b0f3-3003d0ab3fb9_1312x736.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p><strong>Product:</strong> PNETLab</p><p><strong>Affected Version:</strong> 4.2.10</p><p><strong>Severity:</strong> High</p><p><strong>Vulnerability Details</strong> <strong>Description:</strong> A path traversal vulnerability has been identified in PNETLab version 4.2.10. The application fails to properly sanitize user input in its file access mechanisms. This allows an attacker to manipulate file paths in HTTP requests to access sensitive files outside of the intended directory.</p><p><strong>Impact:</strong> Exploitation of this vulnerability could allow an attacker to gain unauthorized access to sensitive files on the system, potentially leading to data breaches and system compromise.</p><p><strong>Steps to Reproduce:</strong></p><ol><li><p>Identify a vulnerable PNETLab instance.</p></li><li><p>Craft a malicious HTTP request with a manipulated file path.</p></li><li><p>Send the request to the server to access files outside the authorized directory.</p></li></ol><p><strong>Reference:</strong></p><ul><li><p><a href="https://www.incibe.es/en/incibe-cert/notices/aviso/path-traversal-vulnerability-pnetlab">Path Traversal vulnerability in PNETLab - INCIBE</a></p></li><li><p>CVE-2025-40629</p></li><li><p>INCIBE-2025-0246</p></li></ul>]]></content:encoded></item><item><title><![CDATA[MacOS NTFS Privilege Escalation - CVE-2025-2489]]></title><description><![CDATA[Product: NTFS Tool]]></description><link>https://www.hazardlab.ninja/p/macos-ntfs-privilege-escalation-cve</link><guid isPermaLink="false">https://www.hazardlab.ninja/p/macos-ntfs-privilege-escalation-cve</guid><dc:creator><![CDATA[Reza]]></dc:creator><pubDate>Sun, 21 Dec 2025 01:10:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Izk9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25ebfcf7-3e16-4441-a3c0-8bdd36b7a599_1312x736.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Izk9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25ebfcf7-3e16-4441-a3c0-8bdd36b7a599_1312x736.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Izk9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25ebfcf7-3e16-4441-a3c0-8bdd36b7a599_1312x736.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Izk9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25ebfcf7-3e16-4441-a3c0-8bdd36b7a599_1312x736.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Izk9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25ebfcf7-3e16-4441-a3c0-8bdd36b7a599_1312x736.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Izk9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25ebfcf7-3e16-4441-a3c0-8bdd36b7a599_1312x736.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Izk9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25ebfcf7-3e16-4441-a3c0-8bdd36b7a599_1312x736.jpeg" width="1312" height="736" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/25ebfcf7-3e16-4441-a3c0-8bdd36b7a599_1312x736.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:736,&quot;width&quot;:1312,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:101722,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://hazardlab.substack.com/i/182207120?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25ebfcf7-3e16-4441-a3c0-8bdd36b7a599_1312x736.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Izk9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25ebfcf7-3e16-4441-a3c0-8bdd36b7a599_1312x736.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Izk9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25ebfcf7-3e16-4441-a3c0-8bdd36b7a599_1312x736.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Izk9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25ebfcf7-3e16-4441-a3c0-8bdd36b7a599_1312x736.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Izk9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25ebfcf7-3e16-4441-a3c0-8bdd36b7a599_1312x736.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p><strong>Product:</strong> NTFS Tool</p><p><strong>Affected Version:</strong> 3.5.1</p><p><strong>Severity:</strong> Medium</p><p><strong>Vulnerability Details</strong> <strong>Description:</strong> A vulnerability has been identified in NTFS Tool version 3.5.1 due to the insecure storage of sensitive information (CWE-922). The application&#8217;s password is not securely stored, allowing an attacker to gain access to it.</p><p><strong>Impact:</strong> Exploiting this vulnerability could allow an attacker with access to the system to retrieve the application password, potentially leading to unauthorized access and actions.</p><p><strong>Steps to Reproduce:</strong></p><ol><li><p>Install NTFS Tool version 3.5.1.</p></li><li><p>Locate the configuration file at the specified path.</p></li><li><p>Access the file to retrieve the password.</p></li><li><p>Use the password to gain unauthorized access or control. <strong>Reference:</strong></p></li></ol><ul><li><p><a href="https://www.incibe.es/en/incibe-cert/notices/aviso/insecure-storage-sensitive-information-ntfs-tool">Insecure storage of sensitive information in ntfs-tool - INCIBE</a></p></li><li><p>CVE-2025-2489</p></li><li><p>INCIBE-2025-0143</p></li></ul>]]></content:encoded></item><item><title><![CDATA[Korenix JETIO 6550 – CVE-2024-2371]]></title><description><![CDATA[Product: Korenix JETIO 6550 switch]]></description><link>https://www.hazardlab.ninja/p/korenix-jetio-6550-cve-2024-2371</link><guid isPermaLink="false">https://www.hazardlab.ninja/p/korenix-jetio-6550-cve-2024-2371</guid><dc:creator><![CDATA[Reza]]></dc:creator><pubDate>Sun, 21 Dec 2025 01:09:28 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!6Sgc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb42ad4e9-846f-44f0-bd4f-7a16bd3a5a1e_1312x736.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6Sgc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb42ad4e9-846f-44f0-bd4f-7a16bd3a5a1e_1312x736.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6Sgc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb42ad4e9-846f-44f0-bd4f-7a16bd3a5a1e_1312x736.jpeg 424w, https://substackcdn.com/image/fetch/$s_!6Sgc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb42ad4e9-846f-44f0-bd4f-7a16bd3a5a1e_1312x736.jpeg 848w, https://substackcdn.com/image/fetch/$s_!6Sgc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb42ad4e9-846f-44f0-bd4f-7a16bd3a5a1e_1312x736.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!6Sgc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb42ad4e9-846f-44f0-bd4f-7a16bd3a5a1e_1312x736.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6Sgc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb42ad4e9-846f-44f0-bd4f-7a16bd3a5a1e_1312x736.jpeg" width="1312" height="736" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b42ad4e9-846f-44f0-bd4f-7a16bd3a5a1e_1312x736.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:736,&quot;width&quot;:1312,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:139845,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://hazardlab.substack.com/i/182207097?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb42ad4e9-846f-44f0-bd4f-7a16bd3a5a1e_1312x736.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6Sgc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb42ad4e9-846f-44f0-bd4f-7a16bd3a5a1e_1312x736.jpeg 424w, https://substackcdn.com/image/fetch/$s_!6Sgc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb42ad4e9-846f-44f0-bd4f-7a16bd3a5a1e_1312x736.jpeg 848w, https://substackcdn.com/image/fetch/$s_!6Sgc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb42ad4e9-846f-44f0-bd4f-7a16bd3a5a1e_1312x736.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!6Sgc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb42ad4e9-846f-44f0-bd4f-7a16bd3a5a1e_1312x736.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p><strong>Product:</strong> Korenix JETIO 6550 switch</p><p><strong>Affected Version:</strong> Not specified in the article, but the vulnerability is identified as CVE-2024-2371. <strong>Severity:</strong> Critical</p><p><strong>Vulnerability Details</strong> <strong>Description:</strong> The Korenix JETIO 6550 switch has a critical vulnerability, CVE-2024-2371, related to its Simple Network Management Protocol (SNMP) implementation. This flaw arises from insufficient access controls, which allows unauthorized users to exploit SNMP to gain access to sensitive data. <strong>Impact:</strong> Exploitation of this vulnerability poses significant risks to industrial control systems (ICS) and critical infrastructure. An attacker can bypass authentication to retrieve sensitive data, including configuration details and network topology information. This could be used to gather intelligence for targeted attacks, disrupt operations, or manipulate systems.</p><p><strong>Steps to Reproduce:</strong></p><ol><li><p>Identify a Korenix JETIO 6550 switch with the vulnerability.</p></li><li><p>Send crafted SNMP requests to bypass authentication.</p></li><li><p>Access and retrieve sensitive data from the system.</p></li></ol><p><strong>Reference:</strong></p><ul><li><p><a href="https://hadess.io/korenix-jetio-6550-cve-2024-2371/">Korenix JETIO 6550 - CVE-2024-2371</a></p></li><li><p>CVE-2024-2371</p></li></ul>]]></content:encoded></item><item><title><![CDATA[GL.iNet GL-AX1800 Critical Vulnerability CVE-2023-47464]]></title><description><![CDATA[Product: GL.iNet GL-AX1800 router]]></description><link>https://www.hazardlab.ninja/p/glinet-gl-ax1800-critical-vulnerability</link><guid isPermaLink="false">https://www.hazardlab.ninja/p/glinet-gl-ax1800-critical-vulnerability</guid><dc:creator><![CDATA[Reza]]></dc:creator><pubDate>Sun, 21 Dec 2025 01:09:01 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!-M6Y!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde7e6c88-fe33-48f7-a228-e42b295c879a_1312x736.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-M6Y!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde7e6c88-fe33-48f7-a228-e42b295c879a_1312x736.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-M6Y!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde7e6c88-fe33-48f7-a228-e42b295c879a_1312x736.jpeg 424w, https://substackcdn.com/image/fetch/$s_!-M6Y!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde7e6c88-fe33-48f7-a228-e42b295c879a_1312x736.jpeg 848w, https://substackcdn.com/image/fetch/$s_!-M6Y!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde7e6c88-fe33-48f7-a228-e42b295c879a_1312x736.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!-M6Y!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde7e6c88-fe33-48f7-a228-e42b295c879a_1312x736.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-M6Y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde7e6c88-fe33-48f7-a228-e42b295c879a_1312x736.jpeg" width="1312" height="736" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/de7e6c88-fe33-48f7-a228-e42b295c879a_1312x736.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:736,&quot;width&quot;:1312,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:144260,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://hazardlab.substack.com/i/182207072?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde7e6c88-fe33-48f7-a228-e42b295c879a_1312x736.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-M6Y!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde7e6c88-fe33-48f7-a228-e42b295c879a_1312x736.jpeg 424w, https://substackcdn.com/image/fetch/$s_!-M6Y!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde7e6c88-fe33-48f7-a228-e42b295c879a_1312x736.jpeg 848w, https://substackcdn.com/image/fetch/$s_!-M6Y!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde7e6c88-fe33-48f7-a228-e42b295c879a_1312x736.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!-M6Y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde7e6c88-fe33-48f7-a228-e42b295c879a_1312x736.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p><strong>Product:</strong> GL.iNet GL-AX1800 router</p><p><strong>Affected Version:</strong> Not specified in the article, but the vulnerability is identified as CVE-2023-47464. <strong>Severity:</strong> Critical</p><p><strong>Vulnerability Details</strong> <strong>Description:</strong> A critical vulnerability, CVE-2023-47464, has been discovered in the GL.iNet GL-AX1800 router. This vulnerability is a result of multiple security flaws, including Cross-Site Request Forgery (CSRF), insecure file uploads, path traversal, file overwrite, and unrestricted file access. The combination of these flaws allows for various attacks, including Remote Code Execution (RCE). <strong>Impact:</strong> Exploiting these vulnerabilities can lead to unauthorized control over the router, data breaches, network compromise, privacy violations, and the distribution of malware. Attackers can upload malicious files, access restricted directories, and download sensitive information.</p><p><strong>Steps to Reproduce:</strong></p><ol><li><p>Identify a vulnerable GL.iNet GL-AX1800 router.</p></li><li><p>Exploit vulnerabilities such as CSRF, insecure file uploads, or path traversal to gain unauthorized access.</p></li><li><p>Use the file overwrite and unrestricted file access flaws to achieve Remote Code Execution.</p></li></ol><p><strong>Reference:</strong></p><ul><li><p><a href="https://hadess.io/gl-inet-gl-ax1800-critical-vulnerability-cve-2023-47464/">GL.iNet GL-AX1800 Critical Vulnerability CVE-2023-47464</a></p></li><li><p>CVE-2023-47464</p></li></ul>]]></content:encoded></item><item><title><![CDATA[Moxa ioLogik E1212 - PWN]]></title><description><![CDATA[Product: Moxa ioLogik E1212]]></description><link>https://www.hazardlab.ninja/p/moxa-iologik-e1212-pwn</link><guid isPermaLink="false">https://www.hazardlab.ninja/p/moxa-iologik-e1212-pwn</guid><dc:creator><![CDATA[Reza]]></dc:creator><pubDate>Sun, 21 Dec 2025 01:08:31 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!g_Fk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf69f913-738c-4b7a-bc95-9c08c8da2bdd_1312x736.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!g_Fk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf69f913-738c-4b7a-bc95-9c08c8da2bdd_1312x736.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!g_Fk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf69f913-738c-4b7a-bc95-9c08c8da2bdd_1312x736.jpeg 424w, https://substackcdn.com/image/fetch/$s_!g_Fk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf69f913-738c-4b7a-bc95-9c08c8da2bdd_1312x736.jpeg 848w, https://substackcdn.com/image/fetch/$s_!g_Fk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf69f913-738c-4b7a-bc95-9c08c8da2bdd_1312x736.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!g_Fk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf69f913-738c-4b7a-bc95-9c08c8da2bdd_1312x736.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!g_Fk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf69f913-738c-4b7a-bc95-9c08c8da2bdd_1312x736.jpeg" width="1312" height="736" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/df69f913-738c-4b7a-bc95-9c08c8da2bdd_1312x736.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:736,&quot;width&quot;:1312,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:135527,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://hazardlab.substack.com/i/182207055?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf69f913-738c-4b7a-bc95-9c08c8da2bdd_1312x736.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!g_Fk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf69f913-738c-4b7a-bc95-9c08c8da2bdd_1312x736.jpeg 424w, https://substackcdn.com/image/fetch/$s_!g_Fk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf69f913-738c-4b7a-bc95-9c08c8da2bdd_1312x736.jpeg 848w, https://substackcdn.com/image/fetch/$s_!g_Fk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf69f913-738c-4b7a-bc95-9c08c8da2bdd_1312x736.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!g_Fk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf69f913-738c-4b7a-bc95-9c08c8da2bdd_1312x736.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p><strong>Product:</strong> Moxa ioLogik E1212</p><p><strong>Affected Version:</strong> Firmware versions prior to the security patches</p><p><strong>Severity:</strong> Critical</p><p><strong>Vulnerability Details</strong> <strong>Description:</strong> A series of critical security vulnerabilities have been identified in the Moxa ioLogik E1212 series. These vulnerabilities include Cross-Site Request Forgery (CSRF), Cross-Site Scripting (XSS), cryptographic failures, and broken access control mechanisms. A major concern is the lack of default authentication, which makes the devices susceptible to unauthorized access and potential remote code execution.</p><p><strong>Impact:</strong> These vulnerabilities pose a significant risk to industrial networks. Attackers can exploit them to bypass authentication, execute arbitrary commands, and manipulate device configurations. A successful exploit could lead to operational disruptions, data breaches, and safety risks in critical infrastructure.</p><p><strong>Steps to Reproduce:</strong></p><ol><li><p>Identify a Moxa ioLogik E1212 device that is not running the latest firmware with security patches.</p></li><li><p>Exploit the lack of default authentication or other vulnerabilities to gain unauthorized access.</p></li><li><p>Execute arbitrary commands or manipulate the device&#8217;s configuration.</p></li></ol><p><strong>Reference:</strong></p><ul><li><p><a href="https://hadess.io/moxa-iologik-e1212-vulnerabilities/">Moxa ioLogik E1212 Vulnerabilities</a></p></li><li><p>Moxa security advisories and firmware updates.</p></li></ul>]]></content:encoded></item><item><title><![CDATA[Hardcoded Password Vulnerability in ntfstool Version 3.5.1]]></title><description><![CDATA[Product: ntfstool]]></description><link>https://www.hazardlab.ninja/p/hardcoded-password-vulnerability</link><guid isPermaLink="false">https://www.hazardlab.ninja/p/hardcoded-password-vulnerability</guid><dc:creator><![CDATA[Reza]]></dc:creator><pubDate>Sun, 21 Dec 2025 00:54:45 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!AgqQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70fb403a-bae4-44d5-b89b-457dca91ffcc_1312x736.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!AgqQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70fb403a-bae4-44d5-b89b-457dca91ffcc_1312x736.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!AgqQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70fb403a-bae4-44d5-b89b-457dca91ffcc_1312x736.jpeg 424w, https://substackcdn.com/image/fetch/$s_!AgqQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70fb403a-bae4-44d5-b89b-457dca91ffcc_1312x736.jpeg 848w, https://substackcdn.com/image/fetch/$s_!AgqQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70fb403a-bae4-44d5-b89b-457dca91ffcc_1312x736.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!AgqQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70fb403a-bae4-44d5-b89b-457dca91ffcc_1312x736.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!AgqQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70fb403a-bae4-44d5-b89b-457dca91ffcc_1312x736.jpeg" width="1312" height="736" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/70fb403a-bae4-44d5-b89b-457dca91ffcc_1312x736.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:736,&quot;width&quot;:1312,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:240282,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://hazardlab.substack.com/i/182206507?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70fb403a-bae4-44d5-b89b-457dca91ffcc_1312x736.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!AgqQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70fb403a-bae4-44d5-b89b-457dca91ffcc_1312x736.jpeg 424w, https://substackcdn.com/image/fetch/$s_!AgqQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70fb403a-bae4-44d5-b89b-457dca91ffcc_1312x736.jpeg 848w, https://substackcdn.com/image/fetch/$s_!AgqQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70fb403a-bae4-44d5-b89b-457dca91ffcc_1312x736.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!AgqQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70fb403a-bae4-44d5-b89b-457dca91ffcc_1312x736.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p><strong>Product:</strong> ntfstool<br><strong>Affected Version:</strong> 3.5.1<br><strong>Severity:</strong> High</p><h3>Vulnerability Details</h3><p><strong>Description:</strong> A critical security vulnerability has been identified in ntfstool version 3.5.1. The vulnerability arises from the presence of a hardcoded password in the application&#8217;s configuration file. Specifically, the file <code>/Users/user/Library/Application Support/ntfs-tool/config.json</code> contains the field <code>"sudoPwd": "toor"</code>, which stores the sudo password in plaintext. This allows potential attackers with access to the configuration file to gain unauthorized elevated privileges.</p><p></p>
      <p>
          <a href="https://www.hazardlab.ninja/p/hardcoded-password-vulnerability">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Netbox - CVE-2024-23780 – Writeup]]></title><description><![CDATA[CVE-2024-23780 is a critical vulnerability identified in NetBox, a widely used open-source web application designed for managing and documenting computer networks.]]></description><link>https://www.hazardlab.ninja/p/netbox-cve-2024-23780-writeup</link><guid isPermaLink="false">https://www.hazardlab.ninja/p/netbox-cve-2024-23780-writeup</guid><dc:creator><![CDATA[Reza]]></dc:creator><pubDate>Sun, 21 Dec 2025 00:54:05 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!vCUP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F524d2318-4edd-42f7-bf90-23eeb336fc01_1312x736.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vCUP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F524d2318-4edd-42f7-bf90-23eeb336fc01_1312x736.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vCUP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F524d2318-4edd-42f7-bf90-23eeb336fc01_1312x736.jpeg 424w, https://substackcdn.com/image/fetch/$s_!vCUP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F524d2318-4edd-42f7-bf90-23eeb336fc01_1312x736.jpeg 848w, https://substackcdn.com/image/fetch/$s_!vCUP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F524d2318-4edd-42f7-bf90-23eeb336fc01_1312x736.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!vCUP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F524d2318-4edd-42f7-bf90-23eeb336fc01_1312x736.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vCUP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F524d2318-4edd-42f7-bf90-23eeb336fc01_1312x736.jpeg" width="1312" height="736" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/524d2318-4edd-42f7-bf90-23eeb336fc01_1312x736.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:736,&quot;width&quot;:1312,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:207429,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://hazardlab.substack.com/i/182206479?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F524d2318-4edd-42f7-bf90-23eeb336fc01_1312x736.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vCUP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F524d2318-4edd-42f7-bf90-23eeb336fc01_1312x736.jpeg 424w, https://substackcdn.com/image/fetch/$s_!vCUP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F524d2318-4edd-42f7-bf90-23eeb336fc01_1312x736.jpeg 848w, https://substackcdn.com/image/fetch/$s_!vCUP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F524d2318-4edd-42f7-bf90-23eeb336fc01_1312x736.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!vCUP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F524d2318-4edd-42f7-bf90-23eeb336fc01_1312x736.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>CVE-2024-23780 is a critical vulnerability identified in NetBox, a widely used open-source web application designed for managing and documenting computer networks. This vulnerability, if exploited, could lead to remote code execution, posing significant security risks to organizations utilizing NetBox for network automation and management.</p><p>Remote code execution vulnerabilities are particularly concerning as they allow attackers to execute arbitrary code on the target system, potentially compromising sensitive data, disrupting operations, or even gaining unauthorized access to the network infrastructure.</p><p></p>
      <p>
          <a href="https://www.hazardlab.ninja/p/netbox-cve-2024-23780-writeup">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[ManageEngine ADAudit Plus CVE-2023-50438 – Writeup]]></title><description><![CDATA[ADAudit Plus, a widely-used auditing and compliance tool developed by ManageEngine, is found to be vulnerable to an arbitrary directory traversal and file manipulation attack, assigned the CVE identifier CVE-2023-50438.]]></description><link>https://www.hazardlab.ninja/p/manageengine-adaudit-plus-cve-2023-2f9</link><guid isPermaLink="false">https://www.hazardlab.ninja/p/manageengine-adaudit-plus-cve-2023-2f9</guid><dc:creator><![CDATA[Reza]]></dc:creator><pubDate>Sun, 21 Dec 2025 00:53:31 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!5F-b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8defb37-32ee-4efd-8ed3-7744a753dc4d_1312x736.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5F-b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8defb37-32ee-4efd-8ed3-7744a753dc4d_1312x736.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5F-b!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8defb37-32ee-4efd-8ed3-7744a753dc4d_1312x736.jpeg 424w, https://substackcdn.com/image/fetch/$s_!5F-b!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8defb37-32ee-4efd-8ed3-7744a753dc4d_1312x736.jpeg 848w, https://substackcdn.com/image/fetch/$s_!5F-b!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8defb37-32ee-4efd-8ed3-7744a753dc4d_1312x736.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!5F-b!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8defb37-32ee-4efd-8ed3-7744a753dc4d_1312x736.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5F-b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8defb37-32ee-4efd-8ed3-7744a753dc4d_1312x736.jpeg" width="1312" height="736" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b8defb37-32ee-4efd-8ed3-7744a753dc4d_1312x736.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:736,&quot;width&quot;:1312,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:205889,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://hazardlab.substack.com/i/182206458?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8defb37-32ee-4efd-8ed3-7744a753dc4d_1312x736.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5F-b!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8defb37-32ee-4efd-8ed3-7744a753dc4d_1312x736.jpeg 424w, https://substackcdn.com/image/fetch/$s_!5F-b!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8defb37-32ee-4efd-8ed3-7744a753dc4d_1312x736.jpeg 848w, https://substackcdn.com/image/fetch/$s_!5F-b!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8defb37-32ee-4efd-8ed3-7744a753dc4d_1312x736.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!5F-b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8defb37-32ee-4efd-8ed3-7744a753dc4d_1312x736.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>ADAudit Plus, a widely-used auditing and compliance tool developed by ManageEngine, is found to be vulnerable to an arbitrary directory traversal and file manipulation attack, assigned the CVE identifier CVE-2023-50438. This vulnerability exposes organizations to significant risks, potentially allowing attackers to execute malicious actions such as unauthorized access to sensitive files, data leakage, and even compromise of the entire system.</p><p>The vulnerability arises from inadequate input validation and sanitization in the search-archived-events/update-arch-index-settings endpoint of ADAudit Plus. This flaw enables authenticated attackers to manipulate the file path parameter, leading to arbitrary directory traversal and subsequent file manipulation on the server.</p><p></p>
      <p>
          <a href="https://www.hazardlab.ninja/p/manageengine-adaudit-plus-cve-2023-2f9">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[NetGear DGND3700 v2 | CVE-2023-51137]]></title><description><![CDATA[A critical security vulnerability has been discovered in the NetGear DGND3700 v2 router, identified as CVE-2023-51137.]]></description><link>https://www.hazardlab.ninja/p/netgear-dgnd3700-v2-cve-2023-51137</link><guid isPermaLink="false">https://www.hazardlab.ninja/p/netgear-dgnd3700-v2-cve-2023-51137</guid><dc:creator><![CDATA[Reza]]></dc:creator><pubDate>Sun, 21 Dec 2025 00:52:51 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!XgPu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e78b40a-8b88-48b1-9e58-475dd982aff1_1312x736.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XgPu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e78b40a-8b88-48b1-9e58-475dd982aff1_1312x736.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XgPu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e78b40a-8b88-48b1-9e58-475dd982aff1_1312x736.jpeg 424w, https://substackcdn.com/image/fetch/$s_!XgPu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e78b40a-8b88-48b1-9e58-475dd982aff1_1312x736.jpeg 848w, https://substackcdn.com/image/fetch/$s_!XgPu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e78b40a-8b88-48b1-9e58-475dd982aff1_1312x736.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!XgPu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e78b40a-8b88-48b1-9e58-475dd982aff1_1312x736.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XgPu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e78b40a-8b88-48b1-9e58-475dd982aff1_1312x736.jpeg" width="1312" height="736" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2e78b40a-8b88-48b1-9e58-475dd982aff1_1312x736.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:736,&quot;width&quot;:1312,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:205889,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://hazardlab.substack.com/i/182206445?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e78b40a-8b88-48b1-9e58-475dd982aff1_1312x736.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!XgPu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e78b40a-8b88-48b1-9e58-475dd982aff1_1312x736.jpeg 424w, https://substackcdn.com/image/fetch/$s_!XgPu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e78b40a-8b88-48b1-9e58-475dd982aff1_1312x736.jpeg 848w, https://substackcdn.com/image/fetch/$s_!XgPu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e78b40a-8b88-48b1-9e58-475dd982aff1_1312x736.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!XgPu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e78b40a-8b88-48b1-9e58-475dd982aff1_1312x736.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>A critical security vulnerability has been discovered in the NetGear DGND3700 v2 router, identified as CVE-2023-51137. This vulnerability allows for remote code execution with directory traversal and authentication bypass, enabling attackers to read operating system files. By exploiting this flaw, attackers can circumvent authentication measures and traverse directories to execute arbitrary code remotely, potentially compromising the router&#8217;s security and integrity. This vulnerability poses a significant risk to affected devices as it allows attackers to gain unauthorized access and manipulate system files. NetGear DGND3700 v2 router users are strongly advised to apply patches provided by the vendor or implement mitigations to address this vulnerability promptly and protect their network infrastructure from exploitation.</p><p>Discovered by Hazard Lab.</p>]]></content:encoded></item><item><title><![CDATA[Netbox | CVE-2024-23780]]></title><description><![CDATA[A high-severity security vulnerability, CVE-2024-23780, has been identified in NetBox version 3.7.0, allowing an attacker to change a user&#8217;s password without requiring knowledge of the old password.]]></description><link>https://www.hazardlab.ninja/p/netbox-cve-2024-23780</link><guid isPermaLink="false">https://www.hazardlab.ninja/p/netbox-cve-2024-23780</guid><dc:creator><![CDATA[Reza]]></dc:creator><pubDate>Sun, 21 Dec 2025 00:52:31 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!CT5j!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd149d3d-6570-4254-883f-a83175f838f5_1312x736.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CT5j!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd149d3d-6570-4254-883f-a83175f838f5_1312x736.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CT5j!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd149d3d-6570-4254-883f-a83175f838f5_1312x736.jpeg 424w, https://substackcdn.com/image/fetch/$s_!CT5j!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd149d3d-6570-4254-883f-a83175f838f5_1312x736.jpeg 848w, https://substackcdn.com/image/fetch/$s_!CT5j!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd149d3d-6570-4254-883f-a83175f838f5_1312x736.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!CT5j!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd149d3d-6570-4254-883f-a83175f838f5_1312x736.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CT5j!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd149d3d-6570-4254-883f-a83175f838f5_1312x736.jpeg" width="1312" height="736" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dd149d3d-6570-4254-883f-a83175f838f5_1312x736.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:736,&quot;width&quot;:1312,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:79110,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://hazardlab.substack.com/i/182206425?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd149d3d-6570-4254-883f-a83175f838f5_1312x736.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!CT5j!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd149d3d-6570-4254-883f-a83175f838f5_1312x736.jpeg 424w, https://substackcdn.com/image/fetch/$s_!CT5j!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd149d3d-6570-4254-883f-a83175f838f5_1312x736.jpeg 848w, https://substackcdn.com/image/fetch/$s_!CT5j!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd149d3d-6570-4254-883f-a83175f838f5_1312x736.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!CT5j!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd149d3d-6570-4254-883f-a83175f838f5_1312x736.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>A high-severity security vulnerability, CVE-2024-23780, has been identified in NetBox version 3.7.0, allowing an attacker to change a user&#8217;s password without requiring knowledge of the old password. This authentication bypass poses a significant risk, potentially leading to unauthorized access, account takeover, and compromise of sensitive information. The vulnerability arises from a lack of validation checks during the password change process in NetBox version 3.7.0. An attacker can exploit this weakness to change a user&#8217;s password without providing the old password, undermining the authentication mechanism and allowing for unauthorized access. The steps to reproduce the vulnerability include logging in to NetBox as an attacker, navigating to the password change functionality, changing the password for a target user account without providing the old password, verifying the successful password change, and logging in to the target user account using the new password. This remote attack vector could be exploited with an active session or by escalating XSS to steal the CSRF token.</p><p>The vulnerability was discovered by Hazard Lab.</p>]]></content:encoded></item><item><title><![CDATA[Netbox | CVE-2024-23778]]></title><description><![CDATA[A critical security vulnerability, CVE-2024-23778, has been identified in NetBox version 3.7.0, enabling Remote Code Execution (RCE) through the execution of arbitrary commands within authentication customization scripts.]]></description><link>https://www.hazardlab.ninja/p/netbox-cve-2024-23778</link><guid isPermaLink="false">https://www.hazardlab.ninja/p/netbox-cve-2024-23778</guid><dc:creator><![CDATA[Reza]]></dc:creator><pubDate>Sun, 21 Dec 2025 00:52:05 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!o8H2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc4aad4e-a33b-43b3-b2a1-461272a4fcbf_1312x736.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!o8H2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc4aad4e-a33b-43b3-b2a1-461272a4fcbf_1312x736.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!o8H2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc4aad4e-a33b-43b3-b2a1-461272a4fcbf_1312x736.jpeg 424w, https://substackcdn.com/image/fetch/$s_!o8H2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc4aad4e-a33b-43b3-b2a1-461272a4fcbf_1312x736.jpeg 848w, https://substackcdn.com/image/fetch/$s_!o8H2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc4aad4e-a33b-43b3-b2a1-461272a4fcbf_1312x736.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!o8H2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc4aad4e-a33b-43b3-b2a1-461272a4fcbf_1312x736.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!o8H2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc4aad4e-a33b-43b3-b2a1-461272a4fcbf_1312x736.jpeg" width="1312" height="736" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cc4aad4e-a33b-43b3-b2a1-461272a4fcbf_1312x736.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:736,&quot;width&quot;:1312,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:65327,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://hazardlab.substack.com/i/182206411?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc4aad4e-a33b-43b3-b2a1-461272a4fcbf_1312x736.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!o8H2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc4aad4e-a33b-43b3-b2a1-461272a4fcbf_1312x736.jpeg 424w, https://substackcdn.com/image/fetch/$s_!o8H2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc4aad4e-a33b-43b3-b2a1-461272a4fcbf_1312x736.jpeg 848w, https://substackcdn.com/image/fetch/$s_!o8H2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc4aad4e-a33b-43b3-b2a1-461272a4fcbf_1312x736.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!o8H2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc4aad4e-a33b-43b3-b2a1-461272a4fcbf_1312x736.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>A critical security vulnerability, CVE-2024-23778, has been identified in NetBox version 3.7.0, enabling Remote Code Execution (RCE) through the execution of arbitrary commands within authentication customization scripts. This vulnerability poses a severe risk as attackers can manipulate the customization script to execute malicious commands, potentially compromising the security and integrity of the application. The vulnerability arises from inadequate validation of user-provided input in authentication customization scripts, allowing attackers to inject and execute arbitrary commands, leading to unauthorized access, data manipulation, and potential compromise of the underlying system. The steps to reproduce the vulnerability include accessing the authentication customization functionality, injecting a malicious command into the customization script, saving the changes, triggering the execution of the script, and observing the successful execution of the injected command and potential compromise of the system. This remote attack vector could be exploited with just a username and password, underscoring the urgency of addressing this vulnerability.</p>]]></content:encoded></item><item><title><![CDATA[Alt-N MDaemon | CVE-2024-23777]]></title><description><![CDATA[A high-severity security vulnerability, CVE-2024-23777, has been discovered in Alt-N MDaemon version 23.5.1, specifically in its handling of public and shared folder names within the application.]]></description><link>https://www.hazardlab.ninja/p/alt-n-mdaemon-cve-2024-23777</link><guid isPermaLink="false">https://www.hazardlab.ninja/p/alt-n-mdaemon-cve-2024-23777</guid><dc:creator><![CDATA[Reza]]></dc:creator><pubDate>Sun, 21 Dec 2025 00:51:43 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!sfTT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15f51cc8-d8e7-461b-9dfb-75349af2eac4_1312x736.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!sfTT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15f51cc8-d8e7-461b-9dfb-75349af2eac4_1312x736.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!sfTT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15f51cc8-d8e7-461b-9dfb-75349af2eac4_1312x736.jpeg 424w, https://substackcdn.com/image/fetch/$s_!sfTT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15f51cc8-d8e7-461b-9dfb-75349af2eac4_1312x736.jpeg 848w, https://substackcdn.com/image/fetch/$s_!sfTT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15f51cc8-d8e7-461b-9dfb-75349af2eac4_1312x736.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!sfTT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15f51cc8-d8e7-461b-9dfb-75349af2eac4_1312x736.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!sfTT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15f51cc8-d8e7-461b-9dfb-75349af2eac4_1312x736.jpeg" width="1312" height="736" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/15f51cc8-d8e7-461b-9dfb-75349af2eac4_1312x736.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:736,&quot;width&quot;:1312,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:55120,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://hazardlab.substack.com/i/182206267?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15f51cc8-d8e7-461b-9dfb-75349af2eac4_1312x736.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!sfTT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15f51cc8-d8e7-461b-9dfb-75349af2eac4_1312x736.jpeg 424w, https://substackcdn.com/image/fetch/$s_!sfTT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15f51cc8-d8e7-461b-9dfb-75349af2eac4_1312x736.jpeg 848w, https://substackcdn.com/image/fetch/$s_!sfTT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15f51cc8-d8e7-461b-9dfb-75349af2eac4_1312x736.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!sfTT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15f51cc8-d8e7-461b-9dfb-75349af2eac4_1312x736.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>A high-severity security vulnerability, CVE-2024-23777, has been discovered in Alt-N MDaemon version 23.5.1, specifically in its handling of public and shared folder names within the application. This vulnerability allows for Authentication Cross-Site Scripting (XSS) attacks through specially crafted folder names, potentially compromising the security of users interacting with these folders. The XSS vulnerability stems from a failure to properly sanitize user input when rendering folder names within the application. Attackers can exploit this weakness by injecting crafted HTML and JavaScript code into the folder names, leading to the execution of arbitrary scripts when users interact with these folders. The steps to reproduce the vulnerability include creating or renaming a public or shared folder, injecting the provided XSS payload into the folder name, and then accessing the folder through the application or sharing its link. This remote attack vector could be exploited to disclose sensitive information to unauthorized parties.</p>]]></content:encoded></item><item><title><![CDATA[Alt-N MDaemon | CVE-2024-23776]]></title><description><![CDATA[A high-severity security vulnerability, CVE-2024-23776, has been discovered in Alt-N MDaemon version 23.5.1, specifically in its handling of public and shared folder names within the application.]]></description><link>https://www.hazardlab.ninja/p/alt-n-mdaemon-cve-2024-23776</link><guid isPermaLink="false">https://www.hazardlab.ninja/p/alt-n-mdaemon-cve-2024-23776</guid><dc:creator><![CDATA[Reza]]></dc:creator><pubDate>Sun, 21 Dec 2025 00:49:04 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!2ODU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F839b80c7-20e7-4a52-9ac4-651116ff1f2f_1312x736.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2ODU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F839b80c7-20e7-4a52-9ac4-651116ff1f2f_1312x736.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2ODU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F839b80c7-20e7-4a52-9ac4-651116ff1f2f_1312x736.jpeg 424w, https://substackcdn.com/image/fetch/$s_!2ODU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F839b80c7-20e7-4a52-9ac4-651116ff1f2f_1312x736.jpeg 848w, https://substackcdn.com/image/fetch/$s_!2ODU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F839b80c7-20e7-4a52-9ac4-651116ff1f2f_1312x736.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!2ODU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F839b80c7-20e7-4a52-9ac4-651116ff1f2f_1312x736.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2ODU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F839b80c7-20e7-4a52-9ac4-651116ff1f2f_1312x736.jpeg" width="1312" height="736" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/839b80c7-20e7-4a52-9ac4-651116ff1f2f_1312x736.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:736,&quot;width&quot;:1312,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:107356,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://hazardlab.substack.com/i/182206249?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F839b80c7-20e7-4a52-9ac4-651116ff1f2f_1312x736.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2ODU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F839b80c7-20e7-4a52-9ac4-651116ff1f2f_1312x736.jpeg 424w, https://substackcdn.com/image/fetch/$s_!2ODU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F839b80c7-20e7-4a52-9ac4-651116ff1f2f_1312x736.jpeg 848w, https://substackcdn.com/image/fetch/$s_!2ODU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F839b80c7-20e7-4a52-9ac4-651116ff1f2f_1312x736.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!2ODU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F839b80c7-20e7-4a52-9ac4-651116ff1f2f_1312x736.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>A high-severity security vulnerability, CVE-2024-23776, has been discovered in Alt-N MDaemon version 23.5.1, specifically in its handling of public and shared folder names within the application. This vulnerability allows for Authentication Cross-Site Scripting (XSS) attacks through specially crafted folder names, posing a significant risk to the security of users interacting with these folders. The vulnerability arises from a failure to properly sanitize user input when rendering folder names, enabling attackers to inject malicious HTML and JavaScript code. Consequently, when users interact with these folders, arbitrary scripts may execute, potentially leading to information disclosure and other malicious activities. The steps to reproduce the vulnerability include creating or renaming a public or shared folder, injecting the provided XSS payload into the folder name, and then accessing the folder through the application or sharing its link. This remote attack vector could be exploited to compromise the security of affected systems. Alt-N MDaemon users are strongly advised to upgrade to a patched version or implement mitigations to address this vulnerability promptly.</p>]]></content:encoded></item><item><title><![CDATA[Netbox | CVE-2024-0948]]></title><description><![CDATA[The NetBox version 3.7.0 has been identified with a cross-site scripting (XSS) vulnerability, assigned CVE-2024-0948.]]></description><link>https://www.hazardlab.ninja/p/netbox-cve-2024-0948</link><guid isPermaLink="false">https://www.hazardlab.ninja/p/netbox-cve-2024-0948</guid><dc:creator><![CDATA[Reza]]></dc:creator><pubDate>Sun, 21 Dec 2025 00:48:35 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!74zn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a00ccb5-02aa-4acc-9c59-95d8e8c1fe79_1312x736.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!74zn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a00ccb5-02aa-4acc-9c59-95d8e8c1fe79_1312x736.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!74zn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a00ccb5-02aa-4acc-9c59-95d8e8c1fe79_1312x736.jpeg 424w, https://substackcdn.com/image/fetch/$s_!74zn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a00ccb5-02aa-4acc-9c59-95d8e8c1fe79_1312x736.jpeg 848w, https://substackcdn.com/image/fetch/$s_!74zn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a00ccb5-02aa-4acc-9c59-95d8e8c1fe79_1312x736.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!74zn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a00ccb5-02aa-4acc-9c59-95d8e8c1fe79_1312x736.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!74zn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a00ccb5-02aa-4acc-9c59-95d8e8c1fe79_1312x736.jpeg" width="1312" height="736" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2a00ccb5-02aa-4acc-9c59-95d8e8c1fe79_1312x736.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:736,&quot;width&quot;:1312,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:107356,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://hazardlab.substack.com/i/182206222?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a00ccb5-02aa-4acc-9c59-95d8e8c1fe79_1312x736.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!74zn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a00ccb5-02aa-4acc-9c59-95d8e8c1fe79_1312x736.jpeg 424w, https://substackcdn.com/image/fetch/$s_!74zn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a00ccb5-02aa-4acc-9c59-95d8e8c1fe79_1312x736.jpeg 848w, https://substackcdn.com/image/fetch/$s_!74zn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a00ccb5-02aa-4acc-9c59-95d8e8c1fe79_1312x736.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!74zn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a00ccb5-02aa-4acc-9c59-95d8e8c1fe79_1312x736.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>The NetBox version 3.7.0 has been identified with a cross-site scripting (XSS) vulnerability, assigned CVE-2024-0948. This vulnerability allows remote attackers to inject malicious scripts into web pages viewed by other users. Exploiting this flaw could lead to various attacks, including session hijacking, sensitive data theft, and website defacement. Users of NetBox version 3.7.0 are advised to upgrade to a patched version or apply mitigations to prevent exploitation of this vulnerability.</p><p>Discovered by Hazard Lab</p>]]></content:encoded></item><item><title><![CDATA[ManageEngine ADAudit Plus | CVE-2023-50785]]></title><description><![CDATA[The vulnerability discovered in ADAudit Plus allows an attacker to perform arbitrary directory traversal, enabling them to list files and folders from any path.]]></description><link>https://www.hazardlab.ninja/p/manageengine-adaudit-plus-cve-2023-99e</link><guid isPermaLink="false">https://www.hazardlab.ninja/p/manageengine-adaudit-plus-cve-2023-99e</guid><dc:creator><![CDATA[Reza]]></dc:creator><pubDate>Sun, 21 Dec 2025 00:35:34 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!StnB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa09044ae-c1f6-43bb-84be-c89b60b20bda_1312x736.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!StnB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa09044ae-c1f6-43bb-84be-c89b60b20bda_1312x736.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!StnB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa09044ae-c1f6-43bb-84be-c89b60b20bda_1312x736.jpeg 424w, https://substackcdn.com/image/fetch/$s_!StnB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa09044ae-c1f6-43bb-84be-c89b60b20bda_1312x736.jpeg 848w, https://substackcdn.com/image/fetch/$s_!StnB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa09044ae-c1f6-43bb-84be-c89b60b20bda_1312x736.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!StnB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa09044ae-c1f6-43bb-84be-c89b60b20bda_1312x736.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!StnB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa09044ae-c1f6-43bb-84be-c89b60b20bda_1312x736.jpeg" width="1312" height="736" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a09044ae-c1f6-43bb-84be-c89b60b20bda_1312x736.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:736,&quot;width&quot;:1312,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:114581,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://hazardlab.substack.com/i/182205735?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa09044ae-c1f6-43bb-84be-c89b60b20bda_1312x736.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!StnB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa09044ae-c1f6-43bb-84be-c89b60b20bda_1312x736.jpeg 424w, https://substackcdn.com/image/fetch/$s_!StnB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa09044ae-c1f6-43bb-84be-c89b60b20bda_1312x736.jpeg 848w, https://substackcdn.com/image/fetch/$s_!StnB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa09044ae-c1f6-43bb-84be-c89b60b20bda_1312x736.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!StnB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa09044ae-c1f6-43bb-84be-c89b60b20bda_1312x736.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>The vulnerability discovered in ADAudit Plus allows an attacker to perform arbitrary directory traversal, enabling them to list files and folders from any path. This exploit involves manipulating the request parameters in the &#8220;folderTree&#8221; endpoint. By sending a crafted POST request with a modified &#8220;id&#8221; parameter, an attacker can bypass path restrictions using URL encoding, such as &#8216;\..\..\..&#8217;. This vulnerability poses a significant risk as it allows authenticated attackers to obtain a file list from any directory. It could potentially lead to unauthorized access and information disclosure.</p><p>Discovered by Hazard Lab.</p>]]></content:encoded></item><item><title><![CDATA[Open Policy Agent (OPA) v0.60.0 - Local File Inclusion Vulnerability]]></title><description><![CDATA[Severity: High]]></description><link>https://www.hazardlab.ninja/p/open-policy-agent-opa-v0600-local</link><guid isPermaLink="false">https://www.hazardlab.ninja/p/open-policy-agent-opa-v0600-local</guid><dc:creator><![CDATA[Reza]]></dc:creator><pubDate>Sun, 21 Dec 2025 00:28:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!c1O1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee526d4c-5432-46ff-9ec5-4e3ff297e8da_1312x736.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!c1O1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee526d4c-5432-46ff-9ec5-4e3ff297e8da_1312x736.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!c1O1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee526d4c-5432-46ff-9ec5-4e3ff297e8da_1312x736.jpeg 424w, https://substackcdn.com/image/fetch/$s_!c1O1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee526d4c-5432-46ff-9ec5-4e3ff297e8da_1312x736.jpeg 848w, https://substackcdn.com/image/fetch/$s_!c1O1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee526d4c-5432-46ff-9ec5-4e3ff297e8da_1312x736.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!c1O1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee526d4c-5432-46ff-9ec5-4e3ff297e8da_1312x736.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!c1O1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee526d4c-5432-46ff-9ec5-4e3ff297e8da_1312x736.jpeg" width="1312" height="736" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ee526d4c-5432-46ff-9ec5-4e3ff297e8da_1312x736.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:736,&quot;width&quot;:1312,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:74312,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://hazardlab.substack.com/i/182205427?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee526d4c-5432-46ff-9ec5-4e3ff297e8da_1312x736.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!c1O1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee526d4c-5432-46ff-9ec5-4e3ff297e8da_1312x736.jpeg 424w, https://substackcdn.com/image/fetch/$s_!c1O1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee526d4c-5432-46ff-9ec5-4e3ff297e8da_1312x736.jpeg 848w, https://substackcdn.com/image/fetch/$s_!c1O1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee526d4c-5432-46ff-9ec5-4e3ff297e8da_1312x736.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!c1O1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee526d4c-5432-46ff-9ec5-4e3ff297e8da_1312x736.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p><strong>Severity:</strong> High</p><p><strong>Vulnerability Type:</strong> Local File Inclusion (LFI)</p><p><strong>Affected System:</strong> Open Policy Agent (OPA) v0.60.0</p><p>Open Policy Agent (OPA) is an open-source, general-purpose policy engine that enables fine-grained, context-aware policy enforcement across the entire stack. A critical security vulnerability has been identified in OPA version 0.60.0, allowing an attacker to perform Local File Inclusion (LFI) attacks through the <code>opa parse</code> command, leading to unauthorized access to sensitive files on the host system.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Tf7Z!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee51963a-76af-4db3-8cac-81cd3b57fc42_200x200.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Tf7Z!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee51963a-76af-4db3-8cac-81cd3b57fc42_200x200.gif 424w, https://substackcdn.com/image/fetch/$s_!Tf7Z!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee51963a-76af-4db3-8cac-81cd3b57fc42_200x200.gif 848w, https://substackcdn.com/image/fetch/$s_!Tf7Z!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee51963a-76af-4db3-8cac-81cd3b57fc42_200x200.gif 1272w, https://substackcdn.com/image/fetch/$s_!Tf7Z!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee51963a-76af-4db3-8cac-81cd3b57fc42_200x200.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Tf7Z!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee51963a-76af-4db3-8cac-81cd3b57fc42_200x200.gif" width="320" height="320" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ee51963a-76af-4db3-8cac-81cd3b57fc42_200x200.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:200,&quot;width&quot;:200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:819614,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/gif&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://hazardlab.substack.com/i/182205427?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee51963a-76af-4db3-8cac-81cd3b57fc42_200x200.gif&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!Tf7Z!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee51963a-76af-4db3-8cac-81cd3b57fc42_200x200.gif 424w, https://substackcdn.com/image/fetch/$s_!Tf7Z!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee51963a-76af-4db3-8cac-81cd3b57fc42_200x200.gif 848w, https://substackcdn.com/image/fetch/$s_!Tf7Z!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee51963a-76af-4db3-8cac-81cd3b57fc42_200x200.gif 1272w, https://substackcdn.com/image/fetch/$s_!Tf7Z!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee51963a-76af-4db3-8cac-81cd3b57fc42_200x200.gif 1456w" sizes="100vw"></picture><div></div></div></a></figure></div>
      <p>
          <a href="https://www.hazardlab.ninja/p/open-policy-agent-opa-v0600-local">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[ManageEngine ADAudit Plus | CVE-2023-50438]]></title><description><![CDATA[The vulnerability discovered in ADAudit Plus allows an attacker to execute arbitrary directory traversal and create files or folders.]]></description><link>https://www.hazardlab.ninja/p/manageengine-adaudit-plus-cve-2023</link><guid isPermaLink="false">https://www.hazardlab.ninja/p/manageengine-adaudit-plus-cve-2023</guid><dc:creator><![CDATA[Reza]]></dc:creator><pubDate>Sun, 21 Dec 2025 00:25:01 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Zimi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea7d0f3b-ae0b-4259-a6b1-c7fdb2e37c90_1312x736.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Zimi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea7d0f3b-ae0b-4259-a6b1-c7fdb2e37c90_1312x736.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Zimi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea7d0f3b-ae0b-4259-a6b1-c7fdb2e37c90_1312x736.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Zimi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea7d0f3b-ae0b-4259-a6b1-c7fdb2e37c90_1312x736.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Zimi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea7d0f3b-ae0b-4259-a6b1-c7fdb2e37c90_1312x736.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Zimi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea7d0f3b-ae0b-4259-a6b1-c7fdb2e37c90_1312x736.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Zimi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea7d0f3b-ae0b-4259-a6b1-c7fdb2e37c90_1312x736.jpeg" width="1312" height="736" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ea7d0f3b-ae0b-4259-a6b1-c7fdb2e37c90_1312x736.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:736,&quot;width&quot;:1312,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:76656,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://hazardlab.substack.com/i/182205314?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea7d0f3b-ae0b-4259-a6b1-c7fdb2e37c90_1312x736.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Zimi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea7d0f3b-ae0b-4259-a6b1-c7fdb2e37c90_1312x736.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Zimi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea7d0f3b-ae0b-4259-a6b1-c7fdb2e37c90_1312x736.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Zimi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea7d0f3b-ae0b-4259-a6b1-c7fdb2e37c90_1312x736.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Zimi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea7d0f3b-ae0b-4259-a6b1-c7fdb2e37c90_1312x736.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>The vulnerability discovered in ADAudit Plus allows an attacker to execute arbitrary directory traversal and create files or folders. This exploit involves manipulating the indexing path within the &#8220;search-archived-events&#8221; section. By sending a crafted POST request with modified settings, an attacker can traverse directories and create files or folders at arbitrary locations. This poses a significant risk as it could be exploited by authenticated users to execute unauthorized actions.</p><p>Discovered by Hazard Lab.</p>]]></content:encoded></item><item><title><![CDATA[Coming soon]]></title><description><![CDATA[This is Hazard Lab.]]></description><link>https://www.hazardlab.ninja/p/coming-soon</link><guid isPermaLink="false">https://www.hazardlab.ninja/p/coming-soon</guid><dc:creator><![CDATA[Reza]]></dc:creator><pubDate>Wed, 26 Nov 2025 02:27:45 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ljXg!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F302bf36e-56d2-4ba4-89fd-8ee20ec97218_500x500.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This is Hazard Lab.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.hazardlab.ninja/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.hazardlab.ninja/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item></channel></rss>