<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>LeakIX blog</title><link>https://blog.leakix.net/</link><description>Recent content on LeakIX blog</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 23 Feb 2026 09:00:00 +0000</lastBuildDate><atom:link href="https://blog.leakix.net/index.xml" rel="self" type="application/rss+xml"/><item><title>12,000 Ollama Instances Exposed: When 'Local-First' Meets the Real World</title><link>https://blog.leakix.net/2026/02/ollama-exposed/</link><pubDate>Mon, 23 Feb 2026 09:00:00 +0000</pubDate><guid>https://blog.leakix.net/2026/02/ollama-exposed/</guid><description>&lt;p&gt;Ollama is one of the most popular tools for running large language models locally.
100,000+ stars on GitHub, millions of downloads, the default choice for anyone
who wants to self-host an LLM. There&amp;rsquo;s just one problem: it ships with no
authentication, and the maintainers have made it clear they don&amp;rsquo;t plan to add
any.&lt;/p&gt;
&lt;p&gt;We found &lt;strong&gt;12,269 Ollama instances&lt;/strong&gt; exposed on the public internet with zero
authentication. Anyone can list models, run inference, and in some cases
exfiltrate proprietary fine-tuned weights.&lt;/p&gt;</description></item><item><title>SeleniumGreed: The RCE That Was Always There</title><link>https://blog.leakix.net/2026/02/seleniumgreed-rce/</link><pubDate>Sat, 21 Feb 2026 14:00:00 +0000</pubDate><guid>https://blog.leakix.net/2026/02/seleniumgreed-rce/</guid><description>&lt;h2 id="tldr"&gt;TL;DR&lt;/h2&gt;
&lt;p&gt;Every Selenium Grid instance deployed with Firefox nodes is vulnerable to unauthenticated remote code execution. Not &amp;ldquo;was&amp;rdquo; - &lt;strong&gt;is&lt;/strong&gt;. The technique was reported to Selenium in May 2021. Their response: better documentation and an optional basic auth flag. The actual vulnerability was never patched and works on every Grid version through 4.40.0 (the latest release at the time of writing).&lt;/p&gt;
&lt;p&gt;Chrome had a similar issue via binary override, patched in Grid 4.11.0. Wiz Research focused their 2024 SeleniumGreed paper on Chrome. They missed Firefox entirely - and that&amp;rsquo;s the one that still works everywhere.&lt;/p&gt;
&lt;p&gt;We wrote a &lt;a href="https://github.com/rapid7/metasploit-framework/pull/21003"&gt;unified Metasploit module&lt;/a&gt; that auto-detects available browsers and picks the best attack vector. Firefox preferred, Chrome as fallback.&lt;/p&gt;</description></item><item><title>What We Found Scanning the Internet in 2026</title><link>https://blog.leakix.net/2026/02/appscan-coverage-2026/</link><pubDate>Mon, 09 Feb 2026 12:00:00 +0000</pubDate><guid>https://blog.leakix.net/2026/02/appscan-coverage-2026/</guid><description>&lt;p&gt;One of our scans recently picked up an open vector database. Inside: &lt;strong&gt;over a
hundred pages of internal documents related to uranium mining operations&lt;/strong&gt;. No
authentication, no access control - just a Qdrant instance sitting on the public
internet with indexed, searchable documents about one of the most sensitive
industries on the planet.&lt;/p&gt;
&lt;p&gt;That&amp;rsquo;s the kind of thing we find now. Here&amp;rsquo;s how we got here.&lt;/p&gt;</description></item><item><title>Using their own weapons for defense - A SharePoint story</title><link>https://blog.leakix.net/2025/07/using-their-own-weapons-for-defense-a-sharepoint-story/</link><pubDate>Wed, 23 Jul 2025 07:00:00 +0000</pubDate><guid>https://blog.leakix.net/2025/07/using-their-own-weapons-for-defense-a-sharepoint-story/</guid><description>&lt;p&gt;Exploring our adventure while building detection for SharePoint exploitation and
vulnerability.&lt;/p&gt;</description></item><item><title>Vinchin Backup &amp; Recovery: CVE-2024-22899 to CVE-2024-22903</title><link>https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/</link><pubDate>Thu, 25 Jan 2024 21:23:33 +0100</pubDate><guid>https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/</guid><description>&lt;h2 id="table-of-contents"&gt;Table of Contents:&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#default-ssh-root-credentials-cve-2024-22902"&gt;Default SSH Root Credentials (CVE-2024-22902)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#hardcoded-database-credentials-and-configuration-flaw-cve-2024-22901"&gt;Hardcoded Database Credentials and Configuration Flaw (CVE-2024-22901)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#post-authentication-remote-code-execution-rce"&gt;Post-Authentication Remote Code Execution (RCE)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#exploitation-methods"&gt;Exploitation Methods&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#a-webdriver-chrome-simulation"&gt;A. Webdriver Chrome Simulation:&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#b-curl-method-using-setnetworkcardinfo-as-example"&gt;B. &lt;code&gt;curl&lt;/code&gt; Method (using setNetworkCardInfo as example):&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="#deep-dive-into-the-setnetworkcardinfo-function-vulnerability-cve-2024-22900"&gt;Deep Dive into the &lt;code&gt;setNetworkCardInfo&lt;/code&gt; Function Vulnerability (CVE-2024-22900)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#deep-dive-into-the-syncntptime-function-vulnerability-cve-2024-22899"&gt;Deep Dive into the &lt;code&gt;syncNtpTime&lt;/code&gt; Function Vulnerability (CVE-2024-22899)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#deep-dive-into-the-deleteupdateapk-function-vulnerability-cve-2024-22903"&gt;Deep Dive into the &lt;code&gt;deleteUpdateAPK&lt;/code&gt; Function Vulnerability (CVE-2024-22903)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#deep-dive-into-the-getverifydiyresult-function-vulnerability-cve-2024-25228"&gt;Deep Dive into the &lt;code&gt;getVerifydiyResult&lt;/code&gt; Function Vulnerability (CVE-2024-25228)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#full-exploit-chain"&gt;Full Exploit Chain&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img src="https://blog.leakix.net/vinchin-backup-rce-chain-2024/vinchin_stable.png" alt=""&gt;&lt;/p&gt;
&lt;h3 id="introduction"&gt;Introduction:&lt;/h3&gt;
&lt;p&gt;Vinchin Backup and Recovery is a leading data protection solution employed by
large enterprises and is extensively utilized across diverse environments,
including virtual, physical, and cloud platforms. While its vast feature set
caters to the diverse needs of these big corporations, it is not immune to
security vulnerabilities. A meticulous analysis has recently exposed a series of
critical flaws that can present significant risks to its users. For more details
on their product and offerings, you can visit their official website at
&lt;a href="https://www.vinchin.com/"&gt;vinchin.com&lt;/a&gt;.&lt;/p&gt;</description></item><item><title>CVE-2023-20273: IOS XE root priv escalation</title><link>https://blog.leakix.net/2023/10/cisco-root-privesc/</link><pubDate>Tue, 31 Oct 2023 23:20:00 +0000</pubDate><guid>https://blog.leakix.net/2023/10/cisco-root-privesc/</guid><description>&lt;p&gt;On the 28th of October the exploit for &lt;code&gt;CVE-2023-20198&lt;/code&gt; was released by
&lt;a href="https://twitter.com/SI_FalconTeam/status/1718346358950711807"&gt;SECUINFRA&lt;/a&gt; after
being captured on one of their honeypots.&lt;/p&gt;
&lt;p&gt;While it enables full admin control of IOS, the question still remained about
the implantation of the backdoor.&lt;/p&gt;</description></item><item><title>CVE-2023-45498: RCE in VinChin Backup</title><link>https://blog.leakix.net/2023/10/vinchin-backup-rce-chain/</link><pubDate>Sun, 15 Oct 2023 20:20:00 +0000</pubDate><guid>https://blog.leakix.net/2023/10/vinchin-backup-rce-chain/</guid><description>&lt;p&gt;&lt;strong&gt;Update 2023-11-03:&lt;/strong&gt; The issue has been fixed in version 7.2.&lt;/p&gt;
&lt;h2 id="vulnerability-research"&gt;Vulnerability research&lt;/h2&gt;
&lt;p&gt;At LeakIX we analyse new vulnerabilities discovered by other researchers every
day.&lt;/p&gt;
&lt;p&gt;Our goal is to understand them, discover non-intrusive ways to detect them and
provide our customers with a
&lt;a href="https://leakix.net/plugins"&gt;list of vulnerable assets&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;While researching what others have already found is always an exciting challenge
and provides valuable experience, it was time for us to go through the research
and disclosure process first hand and get our first CVE on the board.&lt;/p&gt;</description></item><item><title>Cybersecurity and Social Media</title><link>https://blog.leakix.net/2023/07/cybersecurity-and-social-media/</link><pubDate>Mon, 17 Jul 2023 20:20:00 +0000</pubDate><guid>https://blog.leakix.net/2023/07/cybersecurity-and-social-media/</guid><description>&lt;h1 id="ethical-practices-in-cybersecurity-the-impact-of-authentic-social-media-engagement"&gt;Ethical Practices in Cybersecurity: The Impact of Authentic Social Media Engagement&lt;/h1&gt;
&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;In the world of cybersecurity, we combat threats and unethical practices that
extend beyond malware or phishing attacks. Our battlegrounds include social
media platforms, where integrity, authenticity, and honesty are just as critical
as they are in the coding and development of our products. Today, we want to
shine a light on a pressing issue threatening our digital ethics: the trend of
buying likes and retweets.&lt;/p&gt;</description></item><item><title>What we know about the China Leak</title><link>https://blog.leakix.net/2022/07/what-we-know-about-the-china-leak/</link><pubDate>Thu, 07 Jul 2022 11:00:00 +0000</pubDate><guid>https://blog.leakix.net/2022/07/what-we-know-about-the-china-leak/</guid><description>&lt;p&gt;In this quick blog post we&amp;rsquo;ll see what LeakIX has indexed over this incident.&lt;/p&gt;</description></item><item><title>D-LINK DIR-842 Rev-B privilege escalation</title><link>https://blog.leakix.net/2022/06/d-link-dir-842-rev-b-privilege-escalation/</link><pubDate>Mon, 06 Jun 2022 17:00:00 +0000</pubDate><guid>https://blog.leakix.net/2022/06/d-link-dir-842-rev-b-privilege-escalation/</guid><description>&lt;p&gt;In this quick blog post we&amp;rsquo;ll see how to enable Telnet on your DIR-842 rev-b&lt;/p&gt;</description></item><item><title>Bypassing NTLM auth over HTTP</title><link>https://blog.leakix.net/2022/03/bypassing-ntlm-auth-over-http/</link><pubDate>Sun, 06 Mar 2022 17:00:00 +0000</pubDate><guid>https://blog.leakix.net/2022/03/bypassing-ntlm-auth-over-http/</guid><description>&lt;p&gt;Exploring the so-called NTLM ANONYMOUS_LOGON user through HTTP endpoints.&lt;/p&gt;</description></item><item><title>How we remotely identify Cisco's RV34X versions</title><link>https://blog.leakix.net/2022/02/how-we-remotely-identify-ciscos-rv34x-versions/</link><pubDate>Tue, 15 Feb 2022 17:00:00 +0000</pubDate><guid>https://blog.leakix.net/2022/02/how-we-remotely-identify-ciscos-rv34x-versions/</guid><description>&lt;p&gt;A quick research into remotely identifying Cisco&amp;rsquo;s RV43Xs&lt;/p&gt;</description></item><item><title>Introducing LeakIX Graph</title><link>https://blog.leakix.net/2022/01/introducing-leakix-graph/</link><pubDate>Fri, 21 Jan 2022 06:30:00 +0000</pubDate><guid>https://blog.leakix.net/2022/01/introducing-leakix-graph/</guid><description>&lt;p&gt;Take a look at our new mapping feature, visualize and make sense of Internet
resources in a blink !&lt;/p&gt;</description></item><item><title>LeakIX tutorial</title><link>https://blog.leakix.net/2021/11/leakix-tutorial/</link><pubDate>Thu, 25 Nov 2021 14:30:00 +0000</pubDate><guid>https://blog.leakix.net/2021/11/leakix-tutorial/</guid><description>&lt;p&gt;&lt;a href="https://twitter.com/cristiVlad25"&gt;Cristi&lt;/a&gt; made us a tutorial video!&lt;/p&gt;
&lt;p&gt;Go check it out and learn about filters and reports !&lt;/p&gt;
&lt;div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"&gt;
 &lt;iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen" loading="eager" referrerpolicy="strict-origin-when-cross-origin" src="https://www.youtube.com/embed/kf6dkODZNrM?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" title="YouTube video"&gt;&lt;/iframe&gt;
 &lt;/div&gt;</description></item><item><title>LeakIX Firefox Addon</title><link>https://blog.leakix.net/2021/11/leakix-firefox-addon/</link><pubDate>Thu, 25 Nov 2021 13:30:00 +0000</pubDate><guid>https://blog.leakix.net/2021/11/leakix-firefox-addon/</guid><description>&lt;p&gt;An experimental Firefox extension for LeakIX has landed !&lt;/p&gt;</description></item><item><title>Releasing LeakIX v2</title><link>https://blog.leakix.net/2021/10/releasing-leakix-v2/</link><pubDate>Wed, 06 Oct 2021 13:30:00 +0000</pubDate><guid>https://blog.leakix.net/2021/10/releasing-leakix-v2/</guid><description>&lt;p&gt;After weeks of developement and testing we&amp;rsquo;re proud to announce the release of
LeakIX v2 !&lt;/p&gt;</description></item><item><title>LeakIX goes open source</title><link>https://blog.leakix.net/2020/12/leakix-goes-open-source/</link><pubDate>Thu, 17 Dec 2020 13:30:00 +0000</pubDate><guid>https://blog.leakix.net/2020/12/leakix-goes-open-source/</guid><description>&lt;p&gt;We&amp;rsquo;re releasing a good part of the toolset we use for our indexing service to
the community !&lt;/p&gt;
&lt;p&gt;Learn more about how to use them in this post.&lt;/p&gt;</description></item><item><title>Managing resources and alerts</title><link>https://blog.leakix.net/2020/10/managing-resources-and-alerts/</link><pubDate>Wed, 28 Oct 2020 20:57:00 +0000</pubDate><guid>https://blog.leakix.net/2020/10/managing-resources-and-alerts/</guid><description>&lt;p&gt;You can now add real-time monitoring on your resources and get notified by
email!&lt;/p&gt;</description></item><item><title>New search and host details page</title><link>https://blog.leakix.net/2020/10/new-search-and-host-details-page/</link><pubDate>Sun, 25 Oct 2020 15:00:00 +0000</pubDate><guid>https://blog.leakix.net/2020/10/new-search-and-host-details-page/</guid><description>&lt;p&gt;The old ugly host details page was sure useful, but let&amp;rsquo;s face it, it was
unreadable&lt;/p&gt;</description></item><item><title>LeakIX user account</title><link>https://blog.leakix.net/2020/10/leakix-user-account/</link><pubDate>Sun, 25 Oct 2020 14:30:00 +0000</pubDate><guid>https://blog.leakix.net/2020/10/leakix-user-account/</guid><description>&lt;p&gt;The index is now limited to the public, we&amp;rsquo;ll explore the limitations and how
you can lift them !&lt;/p&gt;</description></item><item><title>Exploring Grafana dashboards</title><link>https://blog.leakix.net/2020/10/exploring-grafana-dashboards/</link><pubDate>Thu, 15 Oct 2020 23:20:00 +0000</pubDate><guid>https://blog.leakix.net/2020/10/exploring-grafana-dashboards/</guid><description>&lt;p&gt;This new plugin looks for open Grafana dashboards and provides a summary.&lt;/p&gt;</description></item><item><title>BanqueAtlantique.net, what your config reveals</title><link>https://blog.leakix.net/2020/10/banqueatlantique.net-what-your-config-reveals/</link><pubDate>Sat, 10 Oct 2020 16:21:00 +0000</pubDate><guid>https://blog.leakix.net/2020/10/banqueatlantique.net-what-your-config-reveals/</guid><description>&lt;h3 id="when-you-ask-for-config-files-nicely-"&gt;When you ask for config files nicely &amp;hellip;&lt;/h3&gt;
&lt;p&gt;&amp;hellip; you might as well &lt;a href="https://leakix.net/host/154.68.41.73"&gt;get some&lt;/a&gt;!&lt;/p&gt;</description></item><item><title>Introduction: the "dataset" field</title><link>https://blog.leakix.net/2020/10/introduction-the-dataset-field/</link><pubDate>Thu, 08 Oct 2020 14:30:00 +0000</pubDate><guid>https://blog.leakix.net/2020/10/introduction-the-dataset-field/</guid><description>&lt;p&gt;Searching datasets based on size and row count is now as easy as it sounds !&lt;/p&gt;</description></item><item><title>Hello !</title><link>https://blog.leakix.net/2020/10/hello/</link><pubDate>Thu, 08 Oct 2020 11:00:00 +0000</pubDate><guid>https://blog.leakix.net/2020/10/hello/</guid><description>&lt;h3 id="introducing--the-blog"&gt;Introducing &amp;hellip; the blog&lt;/h3&gt;</description></item><item><title>Search</title><link>https://blog.leakix.net/search/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://blog.leakix.net/search/</guid><description/></item></channel></rss>