Technical Rundown of WebExec (CVE-2018-15442) - Cisco Webex Meetings Desktop App for Windows RCE with SYSTEM privileges https://blog.skullsecurity.org/2018/technical-rundown-of-webexec … #WebExec #vulnerabilitypic.twitter.com/cqK0FFw5rY
You can add location information to your Tweets, such as your city or precise location, from the web and via third-party applications. You always have the option to delete your Tweet location history. Learn more
It allows remote code execution
How do you mean? I'm not being deliberately obtuse, I don't understand the vector. AFAICT, it requires local authenticated access. If that counts as RCE, then what is an "LPE" , because everything is remote over ssh or psexec/rdesktop.
You're right about that, it's a local vuln. My mistake :)
Regular Clickbait Example
true i don't this as RCE as well. If you look at the command for sc and cmd you need to run those command as certain user > not sure whether you can write a script that can be weaponised and pick up correct username of the system. Correct me if i am wrong here.
I dont know why the last few vulns people are saying are "remote" when effectly the so called remote method is psexec or sc from another computer with creds.
I dont think the latest vulns are being properly defined 
I just find it odd. If yiu read the technical writeup they claim its remote.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.