Raj Samani
@Raj_Samani
Followers
14K
Following
8K
Media
1K
Statuses
10K
Chief Scientist @Rapid7 | @cloudsa | Co-author of @CyberGridBook & CSA Guide to Cloud | Advisor @EC3Europol https://t.co/YpisLrWlVR
Joined January 2010
Our latest @metasploit weekly wrap up details a new module for an unauthenticated remote code execution bug in NetAlertX (CVE-2024-46506 plus more... https://t.co/yAdr37ONSp
#infosec #cybersecurity
rapid7.com
Metasploit Weekly Wrap-Up: 02/14/2025 | Rapid7 Blog
2
3
9
Our latest @rapid7 analysis details the discovery of a high-severity SQL injection vulnerability, CVE-2025-1094, affecting the PostgreSQL interactive tool psql. More details available in our write-up here: https://t.co/o79UJIkCRM
#infosec #cybersecurity H/T @stephenfewer
rapid7.com
CVE-2025-1094: PostgreSQL psql SQL injection (FIXED) | Rapid7 Blog
0
0
5
Today @rapid7 has disclosed CVE-2025-1094, a new PostgreSQL SQLi vuln we discovered while researching CVE-2024-12356 in BeyondTrust Remote Support. Untrusted inputs that have been safely character escaped could still generate SQLi under certain conditions:
rapid7.com
CVE-2025-1094: PostgreSQL psql SQL injection (FIXED) | Rapid7 Blog
3
41
90
Our weekly @metasploit wrap-up details a module which exploits CVE-2018-15745, an unauthenticated directory traversal leading to file disclosure in Argus Surveillance DVR 4.0.0.0. https://t.co/bGM1DRhJ5A
#infosec #cybersecurity
rapid7.com
Metasploit Weekly Wrap-Up: 02/07/2025 | Rapid7 Blog
0
3
1
Our latest @metasploit weekly wrap up details a new exploit module for Craft CMS, when the attacker can use malicious FTP server to gain remote code execution https://t.co/Ts2ThXvvFy
#infosec #cybersecurity
rapid7.com
Metasploit Weekly Wrap-Up: 01/31/25 | Rapid7 Blog
0
6
8
Our latest @Rapid7 analysis details the 2024 #ransomware landscape. Included are the 10 most prolific ransomware groups in 2024, ranked by the number of posts on leak sites. https://t.co/W3wWKHHr35
#infosec #cybersecurity H/T @ChristiaanBeek
rapid7.com
The 2024 Ransomware Landscape: Looking back on another painful year | Rapid7 Blog
1
1
7
Our latest @metasploit weekly wrap-up includes a new module for exploiting CVE-2024-51092, an authenticated command injection in LibreNMS. It allows the attacker to run system commands and gain remote code execution (RCE) https://t.co/8v3SWJjMgx
#infosec #cybersecurity
rapid7.com
Metasploit Weekly Wrap-Up: 01/24/2025 | Rapid7 Blog
0
2
6
Our latest @metasploit weekly wrap-up includes an exploit module for CVE-2024-55956, an unauthenticated file write vulnerability affecting Cleo LexiCom, VLTrader, and Harmony versions 5.8.0.23 and below. https://t.co/3uF4gu3EhW
#infosec #cybersecurity
rapid7.com
Metasploit Wrap Up: 01/17/2025 | Rapid7 Blog
0
2
2
Our latest @rapid7 analysis details CVE-2024-55591, an authentication bypass vulnerability in FortiOS and FortiProxy https://t.co/zHRVNGeqaP
#infosec #0day
rapid7.com
Fortinet Firewalls Hit with New Zero-Day Attack, Older Data Leak | Rapid7 Blog
0
1
0
Our latest @metasploit weekly wrap up includes multiple new modules including an exploit module for an unauthenticated arbitrary file read vulnerability, tracked as CVE-2024-45309, which affects OneDev versions <= 11.0.8. https://t.co/1LoeFg7HJN
#infosec #cybersecurity
rapid7.com
Metasploit Wrap-Up: 1/10/2025 | Rapid7 Blog
0
2
3
Our latest @rapid7 advisory details CVE-2025-0282: Ivanti Connect Secure zero-day which has been exploited in the wild. More details here: https://t.co/iPzl9523TS
#infosec #cybersecurity
rapid7.com
CVE-2025-0282: Ivanti Connect Secure Zero-Day Exploited in the Wild | Rapid7 Blog
0
3
3
Our @metasploit 2024 wrap-up details the most notable improvements and modules including expanded support for Active Directory Certificate Services AD CS attacks. More details here: https://t.co/GQaxb3Wr98
#infosec
rapid7.com
Metasploit 2024 Annual Wrap-Up | Rapid7 Blog
0
2
5
My latest article is now published on @SCmagazineUK detailing the challenges in dealing with a #ransomware attack, and technical and ethical challenges this poses: https://t.co/nZefqTFiOW
#malware #cybersecurity
insight.scmagazineuk.com
0
2
5
I enjoyed taking part in this webinar with @Raj_Samani and Sabeen Malik from @rapid7 to discuss our #cybersecurity predictions for 2025. What trends you see happening next year in #cybersecurity ? https://t.co/rxEns7qrqq
0
3
6
Our technical analysis now available @AttackerKb on CVE-2024-53677, a flawed upload logic vuln in Apache Struts 2 which permits an attacker to override internal file upload variables in apps using Apache Struts 2 File Upload Interceptor. https://t.co/ReJPPd3uNV H/T @the_emmons
attackerkb.com
File upload logic in Apache Struts is flawed. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lea…
0
2
6
Now available on @AttackerKb is our @Rapid7 technical analysis of#Cleo CVE-2024-55956 - H/T @stephenfewer this is a new vuln, not a patch bypass of CVE-2024-50623. IoCs included here: https://t.co/Oh9MIin6b9
#infosec
attackerkb.com
On December 9, 2024, multiple security firms began privately reporting exploitation in the wild targeting the Cleo file transfer products LexiCom, VLTrader, an…
0
2
5
Our latest @metasploit weekly wrap-up details RCEs for Moodle e-Learning platform, Primefaces, WordPress Really Simple SSL and CyberPanel along with two modules to change password through LDAP and SMB. https://t.co/R8K2VZuWIM
#infosec
rapid7.com
Metasploit Weekly Wrap-Up: 12/13/2024 | Rapid7 Blog
0
4
3
Our latest @rapid7 analysis into a payload from the recent Cleo file transfer vuln reveals an encoded Java Archive payload. Note that this isn’t necessarily the only payload that has or will be deployed https://t.co/z5HfRRQ1b6 H/T @ChristiaanBeek #cybersecurity
0
3
4
Our latest Rapid7 analysis details Widespread exploitation of Cleo file transfer software (CVE-2024-50623) - with links to detection/mitigation guidance included: https://t.co/cIv7axjCNU
#infosec #cybersecurity
rapid7.com
Widespread Exploitation of Cleo File Transfer Software | Rapid7 Blog
1
3
8