Daily Archives: January 22, 2021

Backdoor.Win32.Hupigon.adef Remote Stack Buffer Overflow ≈ Packet Storm

January 22nd, 2021 📆 | 3425 Views ⚑

Discovery / credits: Malvuln – malvuln.com (c) 2021Original source: https://malvuln.com/advisory/c8f55ce7bbec784a97d7bfc6d7b1931f.txtContact: [email protected]: twitter.com/malvuln Threat: Backdoor.Win32.Hupigon.adefVulnerability: Remote Stack Buffer Overflow Description: Backdoor

Tagged with:




Selea Targa IP OCR-ANPR Camera Remote Code Execution ≈ Packet Storm

January 22nd, 2021 📆 | 5286 Views ⚑

#!/bin/bash## Selea Targa IP OCR-ANPR Camera Unauthenticated Remote Code Execution### Vendor: Selea s.r.l.# Product web page: https://www.selea.com# Affected version: Model:

Tagged with:




Atlassian Confluence 6.12.1 Template Injection ≈ Packet Storm

January 22nd, 2021 📆 | 7475 Views ⚑

# Exploit Title: Atlassian Confluence Widget Connector Macro – SSTI # Date: 21-Jan-2021# Exploit Author: 46o60# Vendor Homepage: https://www.atlassian.com/software/confluence# Software

Tagged with:




Selea CarPlateServer 4.0.1.6 Local Privilege Escalation ≈ Packet Storm

January 22nd, 2021 📆 | 2078 Views ⚑

Selea CarPlateServer (CPS) v4.0.1.6 Local Privilege Escalation Vendor: Selea s.r.l.Product web page: https://www.selea.comAffected version: 4.0.1.6(210120)4.013(201105)3.100(200225)3.005(191206)3.005(191112) Summary: Our CPS (Car Plate

Tagged with:




Selea CarPlateServer 4.0.1.6 Remote Program Execution ≈ Packet Storm

January 22nd, 2021 📆 | 7770 Views ⚑

Selea CarPlateServer (CPS) v4.0.1.6 Remote Program Execution Vendor: Selea s.r.l.Product web page: https://www.selea.comAffected version: 4.0.1.6(210120)4.013(201105)3.100(200225)3.005(191206)3.005(191112) Summary: Our CPS (Car Plate

Tagged with: