patrowl_io (@patrowl_io) 's Twitter Profile
patrowl_io

@patrowl_io

Offensive security as a service 🛡️

#CTEM #blackbox #redteaming #EASM #automatedpentesting #CERT #CVE #rating #NIS2 #DORA

ID: 1617808600692301825

linkhttp://patrowl.io calendar_today24-01-2023 08:57:04

193 Tweet

145 Followers

15 Following

patrowl_io (@patrowl_io) 's Twitter Profile Photo

CVE-2013-7471 alert 🚨 D-Link: old Command Injection The vulnerability is actively exploited in the wild and has been integrated into Patrowl. Our customers assets are protected. 🦉 #CyberSecurity #InfoSec #DLink

CVE-2013-7471 alert 🚨
D-Link: old Command Injection
The vulnerability is actively exploited in the wild and has been integrated into Patrowl.
Our customers assets are protected. 🦉
#CyberSecurity #InfoSec #DLink
patrowl_io (@patrowl_io) 's Twitter Profile Photo

CVE-2016-20016 alert 🚨 MVPower Remote Code Injection The vulnerability is actively exploited in the wild and has been integrated into Patrowl. Our customers assets are protected. 🦉 #CyberSecurity #InfoSec #MVPower

CVE-2016-20016 alert 🚨
MVPower Remote Code Injection 
The vulnerability is actively exploited in the wild and has been integrated into Patrowl.
Our customers assets are protected. 🦉
#CyberSecurity #InfoSec #MVPower
patrowl_io (@patrowl_io) 's Twitter Profile Photo

CVE-2024-53704,CVE-2024-40762,CVE-2024-53705,CVE-2024-53706 alert 🚨 SonicWall improper authentication vulnerability in the SSLVPN The vulnerability is actively exploited in the wild and has been integrated into Patrowl. Our customers assets are protected. 🦉 #CyberSec #SonicWall

CVE-2024-53704,CVE-2024-40762,CVE-2024-53705,CVE-2024-53706 alert 🚨
SonicWall improper authentication vulnerability in the SSLVPN
The vulnerability is actively exploited in the wild and has been integrated into Patrowl.
Our customers assets are protected. 🦉
#CyberSec #SonicWall
patrowl_io (@patrowl_io) 's Twitter Profile Photo

CVE-2025-0282,CVE-2025-0283 alert 🚨 Ivanti Connect Secure, Policy Secure, and ZTA Gateways Stack-Based Buffer Overflow Vulnerability The vulnerability is actively exploited in the wild and has been integrated into Patrowl. Our customers assets are protected. 🦉 #Ivanti #Cybersec

CVE-2025-0282,CVE-2025-0283 alert 🚨
Ivanti Connect Secure, Policy Secure, and ZTA Gateways Stack-Based Buffer Overflow Vulnerability
The vulnerability is actively exploited in the wild and has been integrated into Patrowl.
Our customers assets are protected. 🦉
#Ivanti #Cybersec
patrowl_io (@patrowl_io) 's Twitter Profile Photo

CVE-2024-51919,CVE-2024-51818 alert 🚨 Wordpress Plugin Fancy Product Arbitrary File Upload and Unauthenticated SQL Injection The vulnerability is actively exploited in the wild and has been integrated into Patrowl. Our customers assets are protected. 🦉 #CyberSecurity #Wordpress

CVE-2024-51919,CVE-2024-51818 alert 🚨
Wordpress Plugin Fancy Product Arbitrary File Upload and Unauthenticated SQL Injection
The vulnerability is actively exploited in the wild and has been integrated into Patrowl.
Our customers assets are protected. 🦉
#CyberSecurity #Wordpress
patrowl_io (@patrowl_io) 's Twitter Profile Photo

🚨 A critical vulnerability in FortiManager & FortiManager Cloud (versions 7.6.0-7.6.1, 7.4.0-7.4.5, 7.2.0-7.2.8) has finally been assigned a CVE: CVE-2024-50566. It allows authenticated attackers to execute unauthorized code. Patch released on Nov 15 update now! 🔒 #Infosec

🚨  A critical vulnerability in FortiManager & FortiManager Cloud (versions 7.6.0-7.6.1, 7.4.0-7.4.5, 7.2.0-7.2.8) has finally been assigned a CVE: CVE-2024-50566. 

It allows authenticated attackers to execute unauthorized code. Patch released on Nov 15 update now! 🔒 #Infosec
patrowl_io (@patrowl_io) 's Twitter Profile Photo

CVE-2023-48365 alert 🚨(CVSS: 9.6/10) Qlik Sense Enterprise for Windows (pre-Aug 2023 Patch 2) allows unauthenticated RCE due to improper HTTP header validation (QB-21683). Fixed in Aug 2023 Patch 2 & earlier patches. Update now! 🔒 Our customers assets are protected. 🦉

CVE-2023-48365 alert 🚨(CVSS: 9.6/10)

Qlik Sense Enterprise for Windows (pre-Aug 2023 Patch 2) allows unauthenticated RCE due to improper HTTP header validation (QB-21683). Fixed in Aug 2023 Patch 2 & earlier patches. Update now! 🔒
 
Our customers assets are protected. 🦉
patrowl_io (@patrowl_io) 's Twitter Profile Photo

Multiples vulnerabilities in Siemens Products🚨: - CVE-2023-44317 - CVE-2023-44318 - CVE-2023-44319 - CVE-2023-44374 - CVE-2024-47100 - CVE-2024-53649 Our customers assets are protected. 🦉 #CyberSecurity #InfoSec

Multiples vulnerabilities in Siemens Products🚨: 
- CVE-2023-44317
- CVE-2023-44318
- CVE-2023-44319
- CVE-2023-44374
- CVE-2024-47100
- CVE-2024-53649 

Our customers assets are protected. 🦉
#CyberSecurity #InfoSec
patrowl_io (@patrowl_io) 's Twitter Profile Photo

🚨 Multiples critical security flaws in Ivanti Endpoint Manager: - CVE-2024-10811 - CVE-2024-13161 - CVE-2024-13160 - CVE-2024-13159 The vulnerability is actively exploited in the wild and has been integrated into Patrowl. Our customers assets are protected. 🦉 #InfoSec

🚨 Multiples critical security flaws in Ivanti Endpoint Manager:
- CVE-2024-10811
- CVE-2024-13161
- CVE-2024-13160
- CVE-2024-13159
The vulnerability is actively exploited in the wild and has been integrated into Patrowl.
Our customers assets are protected. 🦉
#InfoSec
patrowl_io (@patrowl_io) 's Twitter Profile Photo

CVE-2024-12747,CVE-2024-12088,CVE-2024-12087,CVE-2024-12085,CVE-2024-12084 alert 🚨 RSYNC: Multiples vulnerabilities leading to Remote Code Execution The vulnerabilities have been integrated into Patrowl. Our customers assets are protected. 🦉 #CyberSecurity #InfoSec #rsync

CVE-2024-12747,CVE-2024-12088,CVE-2024-12087,CVE-2024-12085,CVE-2024-12084 alert 🚨
RSYNC: Multiples vulnerabilities leading to Remote Code Execution
The vulnerabilities have been integrated into Patrowl.
Our customers assets are protected. 🦉
#CyberSecurity #InfoSec #rsync
patrowl_io (@patrowl_io) 's Twitter Profile Photo

CVE-2024-55591 alert 🚨 Fortinet: FortiOS Authorization Bypass Vulnerability The vulnerability has been integrated into Patrowl. Our customers assets are protected. 🦉 #CyberSecurity #InfoSec #Fortinet

CVE-2024-55591 alert 🚨
Fortinet:  FortiOS Authorization Bypass Vulnerability
The vulnerability has been integrated into Patrowl.
Our customers assets are protected. 🦉
#CyberSecurity #InfoSec #Fortinet
patrowl_io (@patrowl_io) 's Twitter Profile Photo

CVE-2025-21556 alert 🚨 Oracle: Critical vulnerability in Agile PLM Framework The vulnerability has been integrated into Patrowl. Our customers assets are protected. 🦉 #CyberSecurity #InfoSec #oracle

CVE-2025-21556 alert 🚨
Oracle: Critical vulnerability in Agile PLM Framework
The vulnerability has been integrated into Patrowl.
Our customers assets are protected. 🦉
#CyberSecurity #InfoSec #oracle
patrowl_io (@patrowl_io) 's Twitter Profile Photo

CVE-2025-21524 alert 🚨 JD Edwards: Critical vulnerability in EnterpriseOne Tools The vulnerability has been integrated into Patrowl. Our customers assets are protected. 🦉 #CyberSecurity #InfoSec #JDEdwards

CVE-2025-21524 alert 🚨
JD Edwards: Critical vulnerability in EnterpriseOne Tools
The vulnerability has been integrated into Patrowl.
Our customers assets are protected. 🦉
#CyberSecurity #InfoSec #JDEdwards
patrowl_io (@patrowl_io) 's Twitter Profile Photo

CVE-2024-32555 alert 🚨 WordPress: Unauthenticated privilege escalation in Easy Real Estate Our customers assets are protected. 🦉 #CyberSecurity #InfoSec #wordpress

CVE-2024-32555 alert 🚨
WordPress: Unauthenticated privilege escalation in Easy Real Estate
Our customers assets are protected. 🦉
#CyberSecurity #InfoSec #wordpress
patrowl_io (@patrowl_io) 's Twitter Profile Photo

CVE-2025-20156 alert 🚨 Cisco: Privilege escalation in Meeting Management The vulnerability has been integrated into Patrowl. Our customers assets are protected. 🦉 #CyberSecurity #InfoSec #cisco

CVE-2025-20156 alert 🚨
Cisco: Privilege escalation in Meeting Management
The vulnerability has been integrated into Patrowl.
Our customers assets are protected. 🦉
#CyberSecurity #InfoSec #cisco
patrowl_io (@patrowl_io) 's Twitter Profile Photo

CVE-2018-19410 alert 🚨 Local File Inclusion in PRTG Network Monitor (Known Exploited Vulnerabilities) The vulnerability has been integrated into Patrowl. Our customers assets are protected. 🦉 #CyberSecurity #InfoSec #PRTG

CVE-2018-19410 alert 🚨
Local File Inclusion in PRTG Network Monitor (Known Exploited Vulnerabilities)
The vulnerability has been integrated into Patrowl.
Our customers assets are protected. 🦉
#CyberSecurity #InfoSec #PRTG
patrowl_io (@patrowl_io) 's Twitter Profile Photo

CVE-2025-29927 alert 🚨 Next.js framework: bypass authorization checks (CVSS: 9.1/10) More informations: 👉 patrowl.io/en/actualites/… #CyberSecurity #InfoSec #Vulnerability

CVE-2025-29927 alert 🚨
Next.js framework: bypass authorization checks (CVSS: 9.1/10)
More informations:
👉 patrowl.io/en/actualites/…
#CyberSecurity #InfoSec #Vulnerability
Forum InCyber (FIC) - EUROPE (@fic_eu) 's Twitter Profile Photo

🏆 En direct de la Remise des Prix de la Startup #INCYBER au Grand Théâtre 🏆 Un immense bravo aux lauréats ! 🏅 Cybi - Prix coup de ♥ du jury 🏅 Iliadata - Prix de la recherche 🏅Enclaive.io | Confidential Cloud Compute Community - Prix de la croissance 🏅 Keyless - Prix de l'impact opérationnel Et

🏆 En direct de la Remise des Prix de la Startup #INCYBER au Grand Théâtre 🏆

Un immense bravo aux lauréats !

🏅 <a href="/CYBI_CYBER/">Cybi</a> - Prix coup de ♥ du jury
🏅 Iliadata - Prix de la recherche
🏅<a href="/enclaive_io/">Enclaive.io | Confidential Cloud Compute Community</a> - Prix de la croissance
🏅 <a href="/KeylessTech/">Keyless</a> - Prix de l'impact opérationnel

Et
NoLimitSecu (@nolimitsecu) 's Twitter Profile Photo

#Podcast #Cybersécurité Épisode #498 consacré à la société patrowl_io, lauréate du Grand Prix de la Startup au FIC 2025. Avec Vladimir Kolla, Florent Montel, et Nicolas Mattiocco nolimitsecu.fr/patrowl-prix-d…

V (@mynameisv_) 's Twitter Profile Photo

🚨 Jeu concours 🚨 Deux tickets à gagner pour BotConf 2025, du 21 au 23 mai 2025 à Angers. Pour participer : envoie moi par DM le mot de passe du fichier virus.zip Fin du concours : 15 mai à 18h #Botconf2025 #BoufConf #BouffeConf😉 #Patrowl

🚨 Jeu concours 🚨

Deux tickets à gagner pour BotConf 2025, du 21 au 23 mai 2025 à Angers.

Pour participer : envoie moi par DM le mot de passe du fichier virus.zip 

Fin du concours : 15 mai à 18h

#Botconf2025 #BoufConf #BouffeConf😉 #Patrowl