Browsing the "packet" Tag

Oracle WebLogic Server 14.1.1.0 Remote Code Execution ≈ Packet Storm

January 23rd, 2021 📆 | 1937 Views ⚑

# Exploit Title: Oracle WebLogic Server 14.1.1.0 – RCE (Authenticated)# Date: 2021-01-21# Exploit Author: Photubias # Vendor Advisory: 1] https://www.oracle.com/security-alerts/cpujan2021.html#

Tagged with:




Selea Targa IP OCR-ANPR Camera Cross Site Scripting ≈ Packet Storm

January 23rd, 2021 📆 | 7179 Views ⚑

Selea Targa IP OCR-ANPR Camera Remote Stored XSS Vendor: Selea s.r.l.Product web page: https://www.selea.comAffected version: Model: iZeroTarga 512Targa 504Targa SempliceTarga

Tagged with:




Selea Targa IP OCR-ANPR Camera Developer Backdoor Config Overwrite ≈ Packet Storm

January 23rd, 2021 📆 | 2372 Views ⚑

Selea Targa IP OCR-ANPR Camera Developer Backdoor Config Overwrite Vendor: Selea s.r.l.Product web page: https://www.selea.comAffected version: Model: iZeroTarga 512Targa 504Targa

Tagged with:




CASAP Automated Enrollment System 1.0 Authentication Bypass ≈ Packet Storm

January 23rd, 2021 📆 | 6638 Views ⚑

# Exploit Title: CASAP Automated Enrollment System 1.0 – Authentication Bypass# Exploit Author: Himanshu Shukla# Date: 2021-01-21# Vendor Homepage: https://www.sourcecodester.com/php/12210/casap-automated-enrollment-system.html#

Tagged with:




Selea Targa IP OCR-ANPR Camera Directory Traversal ≈ Packet Storm

January 23rd, 2021 📆 | 7797 Views ⚑

Selea Targa IP OCR-ANPR Camera Unauthenticated Directory Traversal File Disclosure Vendor: Selea s.r.l.Product web page: https://www.selea.comAffected version: Model: iZeroTarga 512Targa

Tagged with:




Selea Targa IP OCR-ANPR Camera Server-Side Request Forgery ≈ Packet Storm

January 23rd, 2021 📆 | 6396 Views ⚑

Selea Targa IP OCR-ANPR Camera Unauthenticated SSRF Vendor: Selea s.r.l.Product web page: https://www.selea.comAffected version: Model: iZeroTarga 512Targa 504Targa SempliceTarga 704

Tagged with:




Selea Targa IP OCR-ANPR Camera Cross Site Request Forgery ≈ Packet Storm

January 23rd, 2021 📆 | 5699 Views ⚑

Selea Targa IP OCR-ANPR Camera CSRF Add Admin Exploit Vendor: Selea s.r.l.Product web page: https://www.selea.comAffected version: Model: iZeroTarga 512Targa 504Targa

Tagged with:




Selea Targa IP OCR-ANPR Camera Stream Disclosure ≈ Packet Storm

January 23rd, 2021 📆 | 8552 Views ⚑

Selea Targa IP OCR-ANPR Camera Unauthenticated RTP/RTSP/M-JPEG Stream Disclosure Vendor: Selea s.r.l.Product web page: https://www.selea.comAffected version: Model: iZeroTarga 512Targa 504Targa

Tagged with:




Backdoor.Win32.Hupigon.adef Remote Stack Buffer Overflow ≈ Packet Storm

January 22nd, 2021 📆 | 6812 Views ⚑

Discovery / credits: Malvuln – malvuln.com (c) 2021Original source: https://malvuln.com/advisory/c8f55ce7bbec784a97d7bfc6d7b1931f.txtContact: [email protected]: twitter.com/malvuln Threat: Backdoor.Win32.Hupigon.adefVulnerability: Remote Stack Buffer Overflow Description: Backdoor

Tagged with:




Selea Targa IP OCR-ANPR Camera Remote Code Execution ≈ Packet Storm

January 22nd, 2021 📆 | 4701 Views ⚑

#!/bin/bash## Selea Targa IP OCR-ANPR Camera Unauthenticated Remote Code Execution### Vendor: Selea s.r.l.# Product web page: https://www.selea.com# Affected version: Model:

Tagged with:




Atlassian Confluence 6.12.1 Template Injection ≈ Packet Storm

January 22nd, 2021 📆 | 2405 Views ⚑

# Exploit Title: Atlassian Confluence Widget Connector Macro – SSTI # Date: 21-Jan-2021# Exploit Author: 46o60# Vendor Homepage: https://www.atlassian.com/software/confluence# Software

Tagged with:




Selea CarPlateServer 4.0.1.6 Local Privilege Escalation ≈ Packet Storm

January 22nd, 2021 📆 | 2155 Views ⚑

Selea CarPlateServer (CPS) v4.0.1.6 Local Privilege Escalation Vendor: Selea s.r.l.Product web page: https://www.selea.comAffected version: 4.0.1.6(210120)4.013(201105)3.100(200225)3.005(191206)3.005(191112) Summary: Our CPS (Car Plate

Tagged with:




Selea CarPlateServer 4.0.1.6 Remote Program Execution ≈ Packet Storm

January 22nd, 2021 📆 | 7968 Views ⚑

Selea CarPlateServer (CPS) v4.0.1.6 Remote Program Execution Vendor: Selea s.r.l.Product web page: https://www.selea.comAffected version: 4.0.1.6(210120)4.013(201105)3.100(200225)3.005(191206)3.005(191112) Summary: Our CPS (Car Plate

Tagged with:




Backdoor.Win32.Zxman Missing Authentication ≈ Packet Storm

January 22nd, 2021 📆 | 6175 Views ⚑

Discovery / credits: Malvuln – malvuln.com (c) 2021Original source: https://malvuln.com/advisory/6b2a9304d1c7a63365db0f9fd12d39b0.txtContact: [email protected]: twitter.com/malvuln Threat: Backdoor.Win32.ZxmanVulnerability: Missing Authentication Description: Backdoor.Win32.Zxman by Zx-man

Tagged with:




Backdoor.Win32.Onalf Missing Authentication ≈ Packet Storm

January 22nd, 2021 📆 | 6862 Views ⚑

Discovery / credits: Malvuln – malvuln.com (c) 2021Original source: https://malvuln.com/advisory/ba815d409cd714c0eac010b5970f6408.txtContact: [email protected]: twitter.com/malvuln Threat: Backdoor.Win32.OnalfVulnerability: Missing AuthenticationDescription: WinRemoteShell (Onalf) listens for

Tagged with:




Apartment Visitors Management System 1.0 SQL Injection ≈ Packet Storm

January 22nd, 2021 📆 | 8044 Views ⚑

# Exploit Title: Apartment Visitors Management System 1.0 – ’email’ SQL Injection# Date: 20.01.2021# Exploit Author: CANKAT ÇAKMAK# Vendor Homepage:

Tagged with:




Backdoor.Win32.WinShell.30 Remote Stack Buffer Overflow / Missing Authentication ≈ Packet Storm

January 22nd, 2021 📆 | 3422 Views ⚑

Discovery / credits: Malvuln – malvuln.com (c) 2021Original source: https://malvuln.com/advisory/56a2b135c8d35561ea5b04694155eb77.txtContact: [email protected]: twitter.com/malvuln Threat: Backdoor.Win32.WinShell.30Vulnerability: Remote Stack Buffer Overflow / Missing

Tagged with: