Browsing the "advisory" Tag

Oracle WebLogic Server 14.1.1.0 Remote Code Execution ≈ Packet Storm

January 23rd, 2021 📆 | 6964 Views ⚑

# Exploit Title: Oracle WebLogic Server 14.1.1.0 – RCE (Authenticated)# Date: 2021-01-21# Exploit Author: Photubias # Vendor Advisory: 1] https://www.oracle.com/security-alerts/cpujan2021.html#

Tagged with:




Selea Targa IP OCR-ANPR Camera Cross Site Scripting ≈ Packet Storm

January 23rd, 2021 📆 | 2630 Views ⚑

Selea Targa IP OCR-ANPR Camera Remote Stored XSS Vendor: Selea s.r.l.Product web page: https://www.selea.comAffected version: Model: iZeroTarga 512Targa 504Targa SempliceTarga

Tagged with:




Selea Targa IP OCR-ANPR Camera Developer Backdoor Config Overwrite ≈ Packet Storm

January 23rd, 2021 📆 | 5288 Views ⚑

Selea Targa IP OCR-ANPR Camera Developer Backdoor Config Overwrite Vendor: Selea s.r.l.Product web page: https://www.selea.comAffected version: Model: iZeroTarga 512Targa 504Targa

Tagged with:




CASAP Automated Enrollment System 1.0 Authentication Bypass ≈ Packet Storm

January 23rd, 2021 📆 | 2102 Views ⚑

# Exploit Title: CASAP Automated Enrollment System 1.0 – Authentication Bypass# Exploit Author: Himanshu Shukla# Date: 2021-01-21# Vendor Homepage: https://www.sourcecodester.com/php/12210/casap-automated-enrollment-system.html#

Tagged with:




Selea Targa IP OCR-ANPR Camera Directory Traversal ≈ Packet Storm

January 23rd, 2021 📆 | 4967 Views ⚑

Selea Targa IP OCR-ANPR Camera Unauthenticated Directory Traversal File Disclosure Vendor: Selea s.r.l.Product web page: https://www.selea.comAffected version: Model: iZeroTarga 512Targa

Tagged with:




Selea Targa IP OCR-ANPR Camera Server-Side Request Forgery ≈ Packet Storm

January 23rd, 2021 📆 | 6195 Views ⚑

Selea Targa IP OCR-ANPR Camera Unauthenticated SSRF Vendor: Selea s.r.l.Product web page: https://www.selea.comAffected version: Model: iZeroTarga 512Targa 504Targa SempliceTarga 704

Tagged with:




Selea Targa IP OCR-ANPR Camera Cross Site Request Forgery ≈ Packet Storm

January 23rd, 2021 📆 | 5212 Views ⚑

Selea Targa IP OCR-ANPR Camera CSRF Add Admin Exploit Vendor: Selea s.r.l.Product web page: https://www.selea.comAffected version: Model: iZeroTarga 512Targa 504Targa

Tagged with:




Selea Targa IP OCR-ANPR Camera Stream Disclosure ≈ Packet Storm

January 23rd, 2021 📆 | 3509 Views ⚑

Selea Targa IP OCR-ANPR Camera Unauthenticated RTP/RTSP/M-JPEG Stream Disclosure Vendor: Selea s.r.l.Product web page: https://www.selea.comAffected version: Model: iZeroTarga 512Targa 504Targa

Tagged with:




Backdoor.Win32.Hupigon.adef Remote Stack Buffer Overflow ≈ Packet Storm

January 22nd, 2021 📆 | 5264 Views ⚑

Discovery / credits: Malvuln – malvuln.com (c) 2021Original source: https://malvuln.com/advisory/c8f55ce7bbec784a97d7bfc6d7b1931f.txtContact: [email protected]: twitter.com/malvuln Threat: Backdoor.Win32.Hupigon.adefVulnerability: Remote Stack Buffer Overflow Description: Backdoor

Tagged with:




Selea Targa IP OCR-ANPR Camera Remote Code Execution ≈ Packet Storm

January 22nd, 2021 📆 | 8505 Views ⚑

#!/bin/bash## Selea Targa IP OCR-ANPR Camera Unauthenticated Remote Code Execution### Vendor: Selea s.r.l.# Product web page: https://www.selea.com# Affected version: Model:

Tagged with:




Atlassian Confluence 6.12.1 Template Injection ≈ Packet Storm

January 22nd, 2021 📆 | 5589 Views ⚑

# Exploit Title: Atlassian Confluence Widget Connector Macro – SSTI # Date: 21-Jan-2021# Exploit Author: 46o60# Vendor Homepage: https://www.atlassian.com/software/confluence# Software

Tagged with:




Selea CarPlateServer 4.0.1.6 Local Privilege Escalation ≈ Packet Storm

January 22nd, 2021 📆 | 2523 Views ⚑

Selea CarPlateServer (CPS) v4.0.1.6 Local Privilege Escalation Vendor: Selea s.r.l.Product web page: https://www.selea.comAffected version: 4.0.1.6(210120)4.013(201105)3.100(200225)3.005(191206)3.005(191112) Summary: Our CPS (Car Plate

Tagged with:




Selea CarPlateServer 4.0.1.6 Remote Program Execution ≈ Packet Storm

January 22nd, 2021 📆 | 4716 Views ⚑

Selea CarPlateServer (CPS) v4.0.1.6 Remote Program Execution Vendor: Selea s.r.l.Product web page: https://www.selea.comAffected version: 4.0.1.6(210120)4.013(201105)3.100(200225)3.005(191206)3.005(191112) Summary: Our CPS (Car Plate

Tagged with:




Backdoor.Win32.Zxman Missing Authentication ≈ Packet Storm

January 22nd, 2021 📆 | 4997 Views ⚑

Discovery / credits: Malvuln – malvuln.com (c) 2021Original source: https://malvuln.com/advisory/6b2a9304d1c7a63365db0f9fd12d39b0.txtContact: [email protected]: twitter.com/malvuln Threat: Backdoor.Win32.ZxmanVulnerability: Missing Authentication Description: Backdoor.Win32.Zxman by Zx-man

Tagged with:




Backdoor.Win32.Onalf Missing Authentication ≈ Packet Storm

January 22nd, 2021 📆 | 4179 Views ⚑

Discovery / credits: Malvuln – malvuln.com (c) 2021Original source: https://malvuln.com/advisory/ba815d409cd714c0eac010b5970f6408.txtContact: [email protected]: twitter.com/malvuln Threat: Backdoor.Win32.OnalfVulnerability: Missing AuthenticationDescription: WinRemoteShell (Onalf) listens for

Tagged with:




Apartment Visitors Management System 1.0 SQL Injection ≈ Packet Storm

January 22nd, 2021 📆 | 1635 Views ⚑

# Exploit Title: Apartment Visitors Management System 1.0 – ’email’ SQL Injection# Date: 20.01.2021# Exploit Author: CANKAT ÇAKMAK# Vendor Homepage:

Tagged with:




Backdoor.Win32.WinShell.30 Remote Stack Buffer Overflow / Missing Authentication ≈ Packet Storm

January 22nd, 2021 📆 | 3826 Views ⚑

Discovery / credits: Malvuln – malvuln.com (c) 2021Original source: https://malvuln.com/advisory/56a2b135c8d35561ea5b04694155eb77.txtContact: [email protected]: twitter.com/malvuln Threat: Backdoor.Win32.WinShell.30Vulnerability: Remote Stack Buffer Overflow / Missing

Tagged with: