From 677385f667a4cb74c5f3b294f7728c6afd1917c0 Mon Sep 17 00:00:00 2001 From: Andrew Rathbun <36825567+AndrewRathbun@users.noreply.github.com> Date: Thu, 16 May 2024 10:28:56 -0400 Subject: [PATCH] Update QlikSense.tkape fix spelling, remove trailing spaces --- Targets/Apps/QlikSense.tkape | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/Targets/Apps/QlikSense.tkape b/Targets/Apps/QlikSense.tkape index 62ff5de96..b233eb1be 100644 --- a/Targets/Apps/QlikSense.tkape +++ b/Targets/Apps/QlikSense.tkape @@ -37,10 +37,10 @@ Targets: # Documentation # Qlik Sense is a powerful business intelligence solution that enables users to visualize and analyze complex data. -# We have seen three vulnerabilites (CVE-2023-41266, CVE-2023-41265, and CVE-2023-48365) exploited on exposed qlik solution in recent Cactus Ransomware Campain : +# We have seen three vulnerabilities (CVE-2023-41266, CVE-2023-41265, and CVE-2023-48365) exploited on exposed Qlik solution in a recent Cactus Ransomware Campaign: # https://www.cybersecuritydive.com/news/cactus-ransomware-qlik-sense-cves/714578/ # https://arcticwolf.com/resources/blog/qlik-sense-exploited-in-cactus-ransomware-campaign/ # https://www.shadowserver.org/what-we-do/network-reporting/critical-vulnerable-compromised-qlik-sense-special-report/ -# You can find details on the full exploit here : +# You can find details on the full exploit here: # https://www.praetorian.com/blog/qlik-sense-technical-exploit/ # https://www.praetorian.com/blog/doubleqlik-bypassing-the-original-fix-for-cve-2023-41265/