Skip to content
Praetorian Logo
  • Platform

    Platform

    • Chariot Overview
    • Continuous Threat Exposure Management
    • Attack Surface Management
    • Vulnerability Management
    • Cyber Threat Intelligence
    • Continuous Penetration Testing
    • Adversarial Exposure Validation
    • Chariot Overview
    • Continuous Threat Exposure Management
    • Attack Surface Management
    • Vulnerability Management
    • Cyber Threat Intelligence
    • Continuous Penetration Testing
    • Adversarial Exposure Validation
  • Services

    Penetration Testing Services

    • AI/ML Penetration Testing
    • Application Penetration Testing
    • Attack Path Mapping
    • Automotive Penetration Testing
    • Cloud Penetration Testing
    • IoT Penetration Testing
    • Network Penetration Testing
    • AI/ML Penetration Testing
    • Application Penetration Testing
    • Attack Path Mapping
    • Automotive Penetration Testing
    • Cloud Penetration Testing
    • IoT Penetration Testing
    • Network Penetration Testing

    Advanced Offensive Security

    • Assumed Breached
    • CI/CD Attack Chains
    • NIST CSF Benchmark
    • Purple Team
    • Red Team
    • Assumed Breached
    • CI/CD Attack Chains
    • NIST CSF Benchmark
    • Purple Team
    • Red Team

    Managed Services

    • Chariot Overview
    • Continuous Threat Exposure Management
    • Attack Surface Management
    • Vulnerability Management
    • Cyber Threat Intelligence
    • Continuous Penetration Testing
    • Adversarial Exposure Validation
    • Chariot Overview
    • Continuous Threat Exposure Management
    • Attack Surface Management
    • Vulnerability Management
    • Cyber Threat Intelligence
    • Continuous Penetration Testing
    • Adversarial Exposure Validation
  • Why Praetorian

    Customer Case Studies

    • 21st Century Fox
    • 2U
    • Bookings Holdings
    • Nielsen
    • OpenTable
    • Priceline
    • Samsung
    • X
    • Zoom
    • See All Customers
    • 21st Century Fox
    • 2U
    • Bookings Holdings
    • Nielsen
    • OpenTable
    • Priceline
    • Samsung
    • X
    • Zoom
    • See All Customers

    Resources

    • Security Blog
    • Resource Library
    • Labs
    • GitHub
    • MITRE ATT&CK
    • Speaking and Events
    • Warlocks
    • Security Blog
    • Resource Library
    • Labs
    • GitHub
    • MITRE ATT&CK
    • Speaking and Events
    • Warlocks

    Use Cases

    • ASM for Healthcare
    • Bug Bounty Cost Reduction
    • FDA Testing and Monitoring
    • Mergers and Acquisitions
    • Ransomware Prevention
    • Rogue IT Identification
    • Tool and Vendor Consolidation
    • Vendor Risk Management
    • ASM for Healthcare
    • Bug Bounty Cost Reduction
    • FDA Testing and Monitoring
    • Mergers and Acquisitions
    • Ransomware Prevention
    • Rogue IT Identification
    • Tool and Vendor Consolidation
    • Vendor Risk Management
  • About

    About Praetorian

    • Overview
    • Leadership
    • In the News
    • Press Releases
    • Contact Us
    • Overview
    • Leadership
    • In the News
    • Press Releases
    • Contact Us

    Join Praetorian

    • Culture
    • Careers
    • People Ops Blog
    • Tech Challenges​
    • New Hire Survival Guide
    • Culture
    • Careers
    • People Ops Blog
    • Tech Challenges​
    • New Hire Survival Guide
  • Start with Freemium
  • Contact Us

Day: August 31, 2023

ZeroQlik: Achieving Unauthenticated Remote Code Execution via HTTP Request Tunneling and Path Traversal

Overview In an effort to safeguard our customers, we perform proactive vulnerability research with the goal of identifying zero-day vulnerabilities that are likely to impact the security of leading organizations.  Recently, we decided to take a look at Qlik Sense Enterprise, a data analytics solution similar to Tableau. The recent exploitation of vulnerabilities in the […]

Praetorian Logo
Continuous Threat Exposure Management
  • Chariot
  • Attack Surface Management
  • Vulnerability Management
  • Cyber Threat Intelligence
  • Continuous Penetration Testing
  • Breach and Attack Simulation
Professional Services
  • AI/ML Penetration Testing
  • Application Penetration Testing
  • Assumed Breached Exercise
  • Attack Path Mapping
  • Automotive Penetration Testing
  • CI/CD Security Engagement
  • Cloud Penetration Testing
  • IoT Penetration Testing
  • Network Penetration Testing
  • NIST CSF Benchmark
  • Purple Team
  • Red Team
Use Cases
  • Bug Bounty Cost Reduction
  • FDA Testing and Monitoring
  • Mergers and Acquisitions
  • Ransomware Prevention
  • Rogue IT Identification
  • Tool and Vendor Consolidation
  • Vendor Risk Management
Company
  • About Us
  • Leadership Team
  • Press Releases
  • In the News
  • Contact Us
  • Resource Library
  • Security Blog
  • People Ops Blog
  • Careers
  • Culture
  • Tech Challenges
  • Survival Kit

Subscribe to our Newsletter

Catch our latest exploits, news, articles, and events.

Privacy Policy | Responsible Disclosure Policy | Terms of Service | Terms and Conditions

Copyright © 2025. All Rights Reserved.

Linkedin-in X-twitter Facebook-f Github Youtube