EQST

261 posts

EQST banner
EQST

EQST

@EQSTLab

#SKshieldus: Korea's leading cybersecurity firm with 20+ yrs of tech expertise & a vast customer base. #1 in full-cycle services. Contact : 1800-6400

경기도 성남시 분당구 판교로227번길 23 (삼평동) Katılım Nisan 2023
11 Takip Edilen207 Takipçiler
Sabitlenmiş Tweet
EQST
EQST@EQSTLab·
📢 Big News! #Pwn2Own #P2OAuto Taejin Kim (@tae3), Junsu Yeo (@junactually), Sunmin Park (@sunminpark4503), Sungmin Son (@_ssm98), and Hoseok Lee of SKShieldus (@EQSTLab) of 299 exploited a hardcoded credential (CWE-798) to achieve code execution via CWE-494 on the Grizzl-E Smart 40A, earning $40,000 USD and 4 Master of Pwn points.
EQST tweet media
English
0
5
10
830
EQST
EQST@EQSTLab·
⚠️CVE-2026-30951 (CVSS 7.5)⚠️ SQL Injection in Sequelize via unsafe JSON path cast handling. In Sequelize v6 before 6.37.8, JSON/JSONB path keys containing `::` may be parsed as SQL cast expressions and inserted into generated queries without proper validation. If attackers can control JSON query keys passed to Sequelize, they may inject arbitrary SQL expressions, bypass intended query logic, and potentially exfiltrate sensitive data from unrelated database tables. 🔥PoC + Vulnerable environment: github.com/EQSTLab/CVE-20… #Sequelize #SQLInjection #ORM #ORMInjection #CyberSecurity #CVE #PoC #Exploit #CVE_2026_30951
English
0
2
6
211
EQST
EQST@EQSTLab·
⚠️CVE-2026-33937 (CVSS 9.8)⚠️ Critical RCE in Handlebars.js via AST Injection. Attackers can supply a crafted AST object to Handlebars.compile(), causing the code generator to emit and execute arbitrary JavaScript without sanitization, resulting in Remote Code Execution on the server. 🔥PoC + Handlebars.js setup: github.com/EQSTLab/CVE-20…
English
0
1
6
208
EQST
EQST@EQSTLab·
⚠️CVE-2026-34220 (CVSS 9.8)⚠️ SQL Injection in MikroORM via Custom Type __raw property. Attackers can inject arbitrary SQL expressions by supplying a __raw property in user-controlled input, enabling unauthorized exfiltration of sensitive data from unrelated database tables. 🔥PoC + Vulnerable environment: github.com/EQSTLab/CVE-20…
English
0
1
3
405
EQST
EQST@EQSTLab·
⚠️CVE-2026-0603 (CVSS 8.3)⚠️ Second-Order SQL Injection in Hibernate ORM. Attackers can register with a malicious SQL payload as the primary key, triggering mass deletion or modification of all database records with a single delete or update request. 🔥PoC + Vulnerable environment: github.com/EQSTLab/CVE-20…
English
0
0
2
168
EQST
EQST@EQSTLab·
⚠️CVE-2026-5027 (CVSS 8.8)⚠️ Critical Path Traversal / Arbitrary File Write vulnerability in Langflow’s `POST /api/v2/files` endpoint. By abusing the unsanitized multipart filename parameter, attackers can write files to arbitrary filesystem paths outside the intended upload directory, potentially leading to RCE in unsafe deployments. 🔥PoC + Langflow setup: github.com/EQSTLab/CVE-20… #Langflow #PathTraversal #ArbitraryFileWrite #RCE #CyberSecurity #CVE #PoC #Exploit #CVE_2026_5027
English
0
4
28
2.4K
EQST
EQST@EQSTLab·
⚠️CVE-2026-33017 (CVSS 9.8)⚠️ Critical Unauthenticated RCE in Langflow. Attackers can exploit the public flow build endpoint to inject malicious flow data containing a custom Python component, resulting in unauthenticated Remote Code Execution. 🔥PoC + Langflow setup: github.com/EQSTLab/CVE-20…
English
0
1
8
683
EQST
EQST@EQSTLab·
⚠️CVE-2026-25253 (CVSS 8.8)⚠️ Critical Auth Token Exposure in OpenClaw Gateway. Attackers can leverage the exposed token to perform Cross-site WebSocket Hijacking (CSWSH), leading to 1-Click RCE. 🔥PoC + OpenClaw setup: github.com/EQSTLab/CVE-20…
English
0
4
14
1.3K
EQST
EQST@EQSTLab·
We are EQST Lab, a pioneering force dedicated to advancing the field of Cyber Security! Our mission is to provide you with the most rapid and up-to-date insights into vulnerabilities, Common Vulnerabilities and Exposures (CVEs), and the latest security news. By staying informed with our cutting-edge updates, you can significantly enhance your digital safety and protect your valuable data from potential threats. Our team continuously monitors and analyzes the cyber landscape to ensure you have access to the most relevant and timely information. Join us, stay ahead of cyber threats, and fortify your security posture. Follow us to stay informed and improve your online safety!
English
0
0
1
282
EQST
EQST@EQSTLab·
🏆 Got 2nd place at LLMail-Inject competition! Top 2 out of 371 teams worldwide! 🎉 Team EQST(registered as Team 299) got 2nd place at Microsoft’s LLMail-Inject: Adaptive Prompt Injection Challenge Phase 2! This competition was a high‑level prompt‑injection hacking contest aimed at deceiving an LLM‑agent‑based email system, triggering unintended behaviors, and bypassing multiple layers of security. 👉 Learn more: llmailinject.azurewebsites.net 📄 Technical paper: arxiv.org/abs/2506.09956 Our team has strengthened its real‑world security skills by studying LLM attacks and planning defenses, investigating AI security vulnerabilities, and writing guides to diagnose LLM weaknesses. We will continue to strengthen our AI security capabilities and respond to the evolving threats in AI security. #EQST #Microsoft #AI #LLM #Agent #PromptInjection #AISecurity
EQST tweet mediaEQST tweet media
English
0
1
4
562
EQST
EQST@EQSTLab·
Welcome to the world of Chrome hacking at #BHUSA @BlackHatEvents Explore the inner workings of the V8 engine and gain hands-on experience with bug analysis and exploitation techniques! ✅ Understanding the architecture and mechanics of the V8 engine ✅ Convenient hands-on practice with pre-configured challenge environments ✅ Step-by-step analysis techniques for debugging and exploitation through hands-on labs ✅ In-depth case studies of real-world vulnerabilities ✅ Introduction to the latest sandbox escape techniques 🔖 Kickoff to V8 Exploit: Every Step of the Way 📅 Aug 4-5, 2025 (Online) 📍 Anywhere! 🔗 bit.ly/4jyCQx2 If you're interested in Chrome hacking, register by July 18 before prices go up!
English
1
1
2
3.6K
EQST
EQST@EQSTLab·
** Early bird ends May 23!!! ** After a great reception in Luxembourg, we're back at #BHUSA @BlackHatEvents. Don’t miss this chance to dive deep — from Chrome V8 bug analysis to full exploit development, step by step. 🔖 Kickoff to V8 Exploit: Every Step of the Way 📅 August 4–5 🔗 bit.ly/4jyCQx2
EQST tweet mediaEQST tweet mediaEQST tweet mediaEQST tweet media
English
1
1
3
444
EQST
EQST@EQSTLab·
Are you ready to hack Chrome? 🔥 Don't miss this opportunity to learn step by step from Chrome V8 bug analysis all the way to full exploit. Join us at @BlackHatEvents #BHUSA. More here👉bit.ly/4jyCQx2
EQST tweet media
English
0
1
0
589
EQST
EQST@EQSTLab·
🚨 2025 #BHUSA Training at @BlackHatEvents "Kickoff to V8 Exploit: Every step of the way" — August 4-5. Interested in diving into V8 exploitation? 🔥 Join this hands-on course and build real-world V8 exploits, step by step — from bug analysis to full exploit. Don't wait! This is your chance to learn through hands-on labs and a variety of challenges. 👉 Sign up for the training now: #kickoff-to-v-exploit-every-step-of-the-way-44362" target="_blank" rel="nofollow noopener">blackhat.com/us-25/training… We hope to see you there!😉
English
0
1
0
505
EQST
EQST@EQSTLab·
Hello! We are SK shieldus 👋😊 See you at Black Hat Asia 2025 - Booth 301 #BHASIA ✅ What we've got for you: • Service showcase(AI-specific, Offensive services ㅡ and more!) 🤓 • Company & solution demo videos 📹 • AI minigame: Hack the chatbot! 🤖🧠 • Giveaways 🎁 📍April 3-4 | Booth 301 | Business Hall #SKshieldus #SecuLayer #AI #AISecurity #Offensive #SIEM #SOAR #BlackHat
English
2
1
0
2.7K