wvuuuuuuuuuuuuu Profile Banner
wvu Profile
wvu

@wvuuuuuuuuuuuuu

Followers
6K
Following
67K
Statuses
11K

Sentient one-liner grepping the Internet for signs of intelligence. VulnCheck. Previously Atredis, Rapid7 vuln research, and Metasploit.

Joined November 2013
Don't wanna be here? Send us removal request.
@wvuuuuuuuuuuuuu
wvu
2 years
@wvu@infosec.exchange
5
1
19
@wvuuuuuuuuuuuuu
wvu
2 months
RT @VulnCheckAI: VulnCheck’s latest research shows exploitation of Four-Faith industrial routers in the wild. VulnCheck assigned this issue…
0
7
0
@wvuuuuuuuuuuuuu
wvu
2 months
RT @Junior_Baines: And a video demonstrating exploitation:
0
5
0
@wvuuuuuuuuuuuuu
wvu
2 months
RT @_josehelps: This is your yearly reminder that this repo exists if you ever needed a environment for that CVE po…
0
49
0
@wvuuuuuuuuuuuuu
wvu
2 months
RT @watchtowrcyber: You knew it was coming… Cleo Harmony, VLTrader, and LexiCom - RCE via Arbitrary File Write (CVE-2024-50623) https://t.…
0
43
0
@wvuuuuuuuuuuuuu
wvu
2 months
RT @catc0n: New whitepaper from @stephenfewer on a five-bug chain he used to get unauthenticated RCE on the Lorex 2K Indoor Wi-Fi Security…
0
31
0
@wvuuuuuuuuuuuuu
wvu
2 months
RT @stephenfewer: Today @rapid7 is disclosing the vulnerabilities from our exploit chain targeting the Lorex 2K Indoor Wi-Fi Security Camer…
0
61
0
@wvuuuuuuuuuuuuu
wvu
2 months
RT @noperator: The first in a three-part series detailing my team's work in decrypting and analyzing SonicWall firewall firmware 🔥🧱 https:/…
0
17
0
@wvuuuuuuuuuuuuu
wvu
3 months
@0xrayman Thanks!
0
0
0
@wvuuuuuuuuuuuuu
wvu
3 months
RT @0xrayman: @wvuuuuuuuuuuuuu Sure you can read about all the details below
0
2
0
@wvuuuuuuuuuuuuu
wvu
3 months
RT @VulnCheckAI: Today, @VulnCheckAI released new research revealing that 99% of ProjectSend instances are still vulnerable to a critical v…
0
11
0
@wvuuuuuuuuuuuuu
wvu
3 months
RT @infosec_au: Earlier this year, @assetnote's Security Research team discovered a vulnerability in Sitecore XP (CVE-2024-46938) that can…
0
69
0
@wvuuuuuuuuuuuuu
wvu
3 months
RT @endingwithali: if you cant handle me at my 10 comments on your PR you dont deserve me at my LGTM
0
10
0
@wvuuuuuuuuuuuuu
wvu
3 months
RT @RandomDhiraj: Here is a quick NMAP script to check for CVE-2024-0012. #infosec
Tweet media one
0
9
0
@wvuuuuuuuuuuuuu
wvu
3 months
RT @SinSinology: RCE Yes :)
0
2
0
@wvuuuuuuuuuuuuu
wvu
3 months
RT @stephenfewer: We now have a @metasploit exploit module in the pull queue for the PAN-OS management interface unauthenticated RCE exploi…
0
115
0
@wvuuuuuuuuuuuuu
wvu
3 months
RT @watchtowrcyber: in today's 'no way, is it real?' we found out that Palo Alto's PAN-OS CVE-2024-0012 and CVE-2024-9474 were the equivale…
0
171
0
@wvuuuuuuuuuuuuu
wvu
3 months
RT @BleepinComputer: Palo Alto Networks patches two firewall zero-days used in attacks - @serghei
0
59
0
@wvuuuuuuuuuuuuu
wvu
3 months
RT @stephenfewer: ...and we now have a @metasploit exploit module in the pull queue for the FortiManager vuln (CVE-2024-47575): https://t.c…
0
75
0
@wvuuuuuuuuuuuuu
wvu
3 months
RT @chudyPB: Patch your Ivanti EPM asap. My pre-auth RCE got fixed and exploitation is straightforward.
0
16
0