We dedicate extensive time to research through activities such as zero-day vulnerability research and tool development. Our research collection is built upon the accomplishments of our dedicated Baldur team members careers
Baldur is devoted to responsible disclosure, to ensure the vulnerabilities are patched and customers are protected.
Showcasing why automated scanners might miss some very obvious bugs and how to deal with that.
How to solve the Doscember 1 and 2a challenges in the NC3 CTF.
Comprehensive guide on how to convert your RCE vulnerability into a fully functional metasploit module, that will spawn any payload. We use CVE-2023-32781 as our example.
How we could exploit a vulnerability in withsecure elements to shut down a company network through malicious isolation.
This post details the process of exploiting CVE-2023-32782 in PRTG to gain remote code execution.
Remote code execution in Dicom Query sensor as SYSTEM
Remote code execution in HL7 sensor as SYSTEM
CSRF allowing the leakage of cleartext windows credentials over the network.
Utilize regex feature for leaking sensitive configuration files
Path traversal in SQL sensor
Path traversal in WMI sensor
Path traversal vulnerability was discovered in the HL7 sensor of PRTG
Authentication bypass due to insecure timing comparison
Unauthed memory corruption in the fsicapd component leads to DoS
Unauthenticated arbitrary filewrite as SYSTEM
Multiple Cross-Site (XSS) Scripting vulnerabilities
XSS which leads to a leaked private key, allowing wallet control
Global CSRF bypass due to RFC incompliance in HTTP header
Heap Based buffer overflow leads to Remote Code Execution
Cerberus FTP login XSS leads to RCE
Remote Code Execution in F-secure Server Security
Fortinet IPC permission leads to local privilege escalation as SYSTEM
Research driven offensive security consultancy to ensure maximum security for your enterprise.
We thrive on technical challenges and breaking applications to help making them secure.
Copyright Baldur © 2023. All Rights Reserved.