Exploit released for Juniper firewall bugs allowing #RCE attacks #cybersecurity #infosec https://www.bleepingcomputer.com/news/security/exploit-released-for-juniper-firewall-bugs-allowing-rce-attacks/ @BleepingComputer @serghei
15 vulnerabilities in total that could allow remote code execution and denial of service attacks. #cybersecurity #infosec #DDoS
Industrial PLCs worldwide impacted by CODESYS V3 #RCE flaws https://www.bleepingcomputer.com/news/security/industrial-plcs-worldwide-impacted-by-codesys-v3-rce-flaws/ @BleepingComputer @billtoulas
#RCE #ddos #infosec #cybersecurity
#PaperCut flaw in print management software exposes servers to #RCE attacks #cybersecurity #infosec https://securityaffairs.com/149191/security/papercut-rce-cve-2023-39143.html @securityaffairs
#infosec #cybersecurity #RCE #papercut
Referenced link: https://0day.today/exploit/description/38770
Originally posted by 0day Exploit Database 🌴 / @inj3ct0r@twitter.com: https://twitter.com/inj3ct0r/status/1666884354826461216#m
#0day #RenderDoc 1.26 Local Privilege Escalation / Remote Code Execution #Vulnerabilities #RCE #LPE #Exploit https://0day.today/exploit/description/38770
#0day #RenderDoc #vulnerabilities #RCE #LPE #exploit
Referenced link: https://0day.today/exploit/description/38772
Originally posted by 0day Exploit Database 🌴 / @inj3ct0r@twitter.com: https://twitter.com/inj3ct0r/status/1666884776693751820#m
#0day #Microsoft #Windows #PowerShell Remote Command Execution #Exploit #RCE https://0day.today/exploit/description/38772
#0day #microsoft #windows #Powershell #exploit #RCE
Referenced link: https://0day.today/exploit/description/38763
Originally posted by 0day Exploit Database 🌴 / @inj3ct0r@twitter.com: https://twitter.com/inj3ct0r/status/1666495206072410117#m
#0day #FileManager Advanced Shortcode 2.3.2 - Unauthenticated Remote Code Execution #Exploit #RCE https://0day.today/exploit/description/38763
#0day #FileManager #exploit #RCE
Referenced link: https://0day.today/exploit/description/38758
Originally posted by 0day Exploit Database 🌴 / @inj3ct0r@twitter.com: https://twitter.com/inj3ct0r/status/1666494645067476992#m
#0day #TotalCMS 1.7.4 - Remote Code Execution #Vulnerability #RCE https://0day.today/exploit/description/38758
#0day #TotalCMS #Vulnerability #RCE
Referenced link: https://0day.today/exploit/description/38730
Originally posted by 0day Exploit Database 🌴 / @inj3ct0r@twitter.com: https://twitter.com/inj3ct0r/status/1663261393523490822#m
#0day #RoxyWI v6.1.0.0 - Unauthenticated Remote Code Execution #Vulnerability #RCE https://0day.today/exploit/description/38730
#0day #RoxyWI #Vulnerability #RCE
Referenced link: https://0day.today/exploit/description/38727
Originally posted by 0day Exploit Database 🌴 / @inj3ct0r@twitter.com: https://twitter.com/inj3ct0r/status/1661078677147271175#m
#0day #GetSimple CMS v3.3.16 - Remote Code Execution #Exploit #GetSimpleCMS #RCE https://0day.today/exploit/description/38727
#0day #GetSimple #exploit #GetSimpleCMS #RCE
Referenced link: https://0day.today/exploit/description/38714
Originally posted by 0day Exploit Database 🌴 / @inj3ct0r@twitter.com: https://twitter.com/inj3ct0r/status/1661076921470402560#m
#0day #BestPOSManagement System v1.0 - Unauthenticated Remote Code Execution #Exploit #RCE https://0day.today/exploit/description/38714
#0day #BestPOSManagement #exploit #RCE
Referenced link: https://0day.today/exploit/description/38704
Originally posted by 0day Exploit Database 🌴 / @inj3ct0r@twitter.com: https://twitter.com/inj3ct0r/status/1661076562286919688#m
#0day #PaperCut NG/MG 22.0.4 - Remote Code Execution #Exploit #RCE https://0day.today/exploit/description/38704
Referenced link: https://0day.today/exploit/description/38716
Originally posted by 0day Exploit Database 🌴 / @inj3ct0r@twitter.com: https://twitter.com/inj3ct0r/status/1661077116924903448#m
#0day #SitemagicCMS 4.4.3 - Remote Code Execution #Vulnerability #RCE https://0day.today/exploit/description/38716
#0day #SitemagicCMS #Vulnerability #RCE
Referenced link: https://0day.today/exploit/description/38703
Originally posted by 0day Exploit Database 🌴 / @inj3ct0r@twitter.com: https://twitter.com/inj3ct0r/status/1661076478283464706#m
#0day #MillhouseProject 1.414 #thrsrossi - Remote Code Execution #Exploit #RCE https://0day.today/exploit/description/38703
#0day #MillhouseProject #thrsrossi #exploit #RCE
Referenced link: https://attackerkb.com/assessments/6a410f31-83c5-416b-92fd-986f2b9b2c61
Originally posted by Metasploit Project / @metasploit@twitter.com: https://twitter.com/catc0n/status/1659295907014144004#m
RT by @metasploit: An *extremely* detailed root cause analysis of Oracle WebLogic #RCE CVE-2023-21839 and its various PoCs (including a @Metasploit module) from Grant Willcox. Been a while since we saw a solid spate of WebLogic exploitation...wonder if it's time. https://attackerkb.com/assessments/6a410f31-83c5-416b-92fd-986f2b9b2c61
Referenced link: https://0day.today/exploit/description/38640
Originally posted by 0day Exploit Database 🌴 / @inj3ct0r@twitter.com: https://twitter.com/inj3ct0r/status/1653508918256062466#m
#0day #Serendipity 2.4.0 - File Inclusion Remote Code Execution #Exploit #RCE https://0day.today/exploit/description/38640
#0day #serendipity #exploit #RCE
Referenced link: https://0day.today/exploit/description/38633
Originally posted by 0day Exploit Database 🌴 / @inj3ct0r@twitter.com: https://twitter.com/inj3ct0r/status/1652029963447443462#m
#0day #Aigital #Wireless-N Repeater Mini_Router.0.131229 Remote Command Execution #Vulnerability #RCE https://0day.today/exploit/description/38633
#0day #Aigital #Wireless #Vulnerability #RCE
Referenced link: https://0day.today/exploit/description/38634
Originally posted by 0day Exploit Database 🌴 / @inj3ct0r@twitter.com: https://twitter.com/inj3ct0r/status/1653158916778229763#m
#0day #Adobe #ColdFusion Unauthenticated Remote Code Execution #Exploit #RCE #AdobeColdFusion https://0day.today/exploit/description/38634
#0day #Adobe #coldfusion #exploit #RCE #AdobeColdFusion
Thousands of publicly-exposed Apache Superset installs exposed to #RCE attacks #cybersecurity #opensource https://securityaffairs.com/145317/hacking/superset-flaw.html @securityaffairs
#opensource #cybersecurity #RCE
Referenced link: https://0day.today/exploit/description/38626
Originally posted by 0day Exploit Database 🌴 / @inj3ct0r@twitter.com: https://twitter.com/inj3ct0r/status/1650912804059201549#m
#0day #MultiVendor Online Groceries Management System 1.0 - Remote Code Execution #Exploit #RCE https://0day.today/exploit/description/38626
#0day #MultiVendor #exploit #RCE
Referenced link: https://0day.today/exploit/description/38599
Originally posted by 0day Exploit Database 🌴 / @inj3ct0r@twitter.com: https://twitter.com/inj3ct0r/status/1648406476254244868#m
#0day #SPIP Remote Command Execution #Exploit #RCE https://0day.today/exploit/description/38599