PinnedPublished inSystem WeaknessUnmasking CVE-2023–33246: The Sneaky RocketMQ RCE VulnerabilityA Tale of RocketMQ Misadventures: Finding Vulnerable Devices on ShodanJul 27, 2024Jul 27, 2024
PinnedPublished inSystem WeaknessExposing the Impact of CVE-2021–44529: Hunting Down Unpatched Devices Using ShodanDiscovering the Vulnerabilities and Their Real-World ImplicationsJul 25, 2024Jul 25, 2024
PinnedPublished inInfoSec Write-upsUncovering CVE-2021–42013: The Forgotten RCE VulnerabilityJul 23, 2024Jul 23, 2024
PinnedPublished inSystem WeaknessRevealing the Hidden Dangers of CVE-2022–1388: A Critical RCE VulnerabilityIdentifying and Exploiting Unpatched Devices Using ShodanJul 24, 2024Jul 24, 2024
PinnedPublished inSystem WeaknessUnveiling the Atlassian RCE Vulnerability: CVE-2022–26134IntroductionJul 22, 2024Jul 22, 2024
Published inInfoSec Write-upsCVE-2024–31982: When a Simple Wiki Search Turns into a RCE PartyXWiki’s Sneaky Database Search Vulnerability & How I Found Vulnerable Instances on ShodanAug 24, 2024Aug 24, 2024
Published inInfoSec Write-upsZyxel’s Achilles Heel: Uncovering CVE-2022–30525 — The Remote Code Execution That Will Make You…A Fun Dive into Command Injection Vulnerabilities, Shodan Hunts, and Why You Shouldn’t Underestimate Your Router’s SecurityAug 22, 2024Aug 22, 2024
Published inInfoSec Write-upsCVE-2018–7600: When Drupalgeddon StrikesAn Inside Look into CVE-2018–7600, aka Drupalgeddon 2: The Remote Code ExecutionAug 21, 2024Aug 21, 2024
Published inInfoSec Write-upsCracking the Cisco Code: Unmasking CVE-2021–1472 in RV Series DevicesA Shodan Adventure into Cisco’s Web-Based Management VulnerabilityAug 20, 2024Aug 20, 2024
Published inSystem WeaknessMongo-Express Mayhem: How CVE-2020–24391 Opens the Door to Remote Code ExecutionBreaking the Sandbox: Tracking Down Vulnerable Mongo-Express Instances on ShodanAug 13, 2024Aug 13, 2024