Aida Akl · @AAKL
404 followers · 692 posts · Server noc.social
Aida Akl · @AAKL
384 followers · 651 posts · Server noc.social

15 vulnerabilities in total that could allow remote code execution and denial of service attacks.

Industrial PLCs worldwide impacted by CODESYS V3 flaws bleepingcomputer.com/news/secu @BleepingComputer @billtoulas

#RCE #ddos #infosec #cybersecurity

Last updated 1 year ago

Aida Akl · @AAKL
375 followers · 714 posts · Server noc.social
· @twitter
1 followers · 58429 posts · Server mstdn.skullb0x.io

Referenced link: 0day.today/exploit/description
Originally posted by 0day Exploit Database 🌴 / @inj3ct0r@twitter.com: twitter.com/inj3ct0r/status/16

1.26 Local Privilege Escalation / Remote Code Execution 0day.today/exploit/description

#0day #RenderDoc #vulnerabilities #RCE #LPE #exploit

Last updated 1 year ago

· @twitter
1 followers · 58429 posts · Server mstdn.skullb0x.io
· @twitter
1 followers · 58192 posts · Server mstdn.skullb0x.io

Referenced link: 0day.today/exploit/description
Originally posted by 0day Exploit Database 🌴 / @inj3ct0r@twitter.com: twitter.com/inj3ct0r/status/16

Advanced Shortcode 2.3.2 - Unauthenticated Remote Code Execution 0day.today/exploit/description

#0day #FileManager #exploit #RCE

Last updated 1 year ago

· @twitter
1 followers · 58192 posts · Server mstdn.skullb0x.io

Referenced link: 0day.today/exploit/description
Originally posted by 0day Exploit Database 🌴 / @inj3ct0r@twitter.com: twitter.com/inj3ct0r/status/16

1.7.4 - Remote Code Execution 0day.today/exploit/description

#0day #TotalCMS #Vulnerability #RCE

Last updated 1 year ago

· @twitter
1 followers · 56246 posts · Server mstdn.skullb0x.io

Referenced link: 0day.today/exploit/description
Originally posted by 0day Exploit Database 🌴 / @inj3ct0r@twitter.com: twitter.com/inj3ct0r/status/16

v6.1.0.0 - Unauthenticated Remote Code Execution 0day.today/exploit/description

#0day #RoxyWI #Vulnerability #RCE

Last updated 1 year ago

· @twitter
1 followers · 55030 posts · Server mstdn.skullb0x.io

Referenced link: 0day.today/exploit/description
Originally posted by 0day Exploit Database 🌴 / @inj3ct0r@twitter.com: twitter.com/inj3ct0r/status/16

CMS v3.3.16 - Remote Code Execution 0day.today/exploit/description

#0day #GetSimple #exploit #GetSimpleCMS #RCE

Last updated 1 year ago

· @twitter
1 followers · 55022 posts · Server mstdn.skullb0x.io

Referenced link: 0day.today/exploit/description
Originally posted by 0day Exploit Database 🌴 / @inj3ct0r@twitter.com: twitter.com/inj3ct0r/status/16

System v1.0 - Unauthenticated Remote Code Execution 0day.today/exploit/description

#0day #BestPOSManagement #exploit #RCE

Last updated 1 year ago

· @twitter
1 followers · 55030 posts · Server mstdn.skullb0x.io

Referenced link: 0day.today/exploit/description
Originally posted by 0day Exploit Database 🌴 / @inj3ct0r@twitter.com: twitter.com/inj3ct0r/status/16

NG/MG 22.0.4 - Remote Code Execution 0day.today/exploit/description

#0day #PaperCut #exploit #RCE

Last updated 1 year ago

· @twitter
1 followers · 55030 posts · Server mstdn.skullb0x.io

Referenced link: 0day.today/exploit/description
Originally posted by 0day Exploit Database 🌴 / @inj3ct0r@twitter.com: twitter.com/inj3ct0r/status/16

4.4.3 - Remote Code Execution 0day.today/exploit/description

#0day #SitemagicCMS #Vulnerability #RCE

Last updated 1 year ago

· @twitter
1 followers · 55030 posts · Server mstdn.skullb0x.io
· @twitter
1 followers · 54808 posts · Server mstdn.skullb0x.io

Referenced link: attackerkb.com/assessments/6a4
Originally posted by Metasploit Project / @metasploit@twitter.com: twitter.com/catc0n/status/1659

RT by @metasploit: An *extremely* detailed root cause analysis of Oracle WebLogic CVE-2023-21839 and its various PoCs (including a @Metasploit module) from Grant Willcox. Been a while since we saw a solid spate of WebLogic exploitation...wonder if it's time. attackerkb.com/assessments/6a4

#RCE

Last updated 1 year ago

· @twitter
1 followers · 51619 posts · Server mstdn.skullb0x.io

Referenced link: 0day.today/exploit/description
Originally posted by 0day Exploit Database 🌴 / @inj3ct0r@twitter.com: twitter.com/inj3ct0r/status/16

2.4.0 - File Inclusion Remote Code Execution 0day.today/exploit/description

#0day #serendipity #exploit #RCE

Last updated 1 year ago

· @twitter
1 followers · 51363 posts · Server mstdn.skullb0x.io

Referenced link: 0day.today/exploit/description
Originally posted by 0day Exploit Database 🌴 / @inj3ct0r@twitter.com: twitter.com/inj3ct0r/status/16

-N Repeater Mini_Router.0.131229 Remote Command Execution 0day.today/exploit/description

#0day #Aigital #Wireless #Vulnerability #RCE

Last updated 1 year ago

· @twitter
1 followers · 51363 posts · Server mstdn.skullb0x.io
Aida Akl · @AAKL
269 followers · 693 posts · Server noc.social

Thousands of publicly-exposed Apache Superset installs exposed to attacks securityaffairs.com/145317/hac @securityaffairs

#opensource #cybersecurity #RCE

Last updated 2 years ago

· @twitter
1 followers · 51000 posts · Server mstdn.skullb0x.io

Referenced link: 0day.today/exploit/description
Originally posted by 0day Exploit Database 🌴 / @inj3ct0r@twitter.com: twitter.com/inj3ct0r/status/16

Online Groceries Management System 1.0 - Remote Code Execution 0day.today/exploit/description

#0day #MultiVendor #exploit #RCE

Last updated 2 years ago

· @twitter
1 followers · 49405 posts · Server mstdn.skullb0x.io

Referenced link: 0day.today/exploit/description
Originally posted by 0day Exploit Database 🌴 / @inj3ct0r@twitter.com: twitter.com/inj3ct0r/status/16

Remote Command Execution 0day.today/exploit/description

#0day #SPIP #exploit #RCE

Last updated 2 years ago