Browsing the "remote" Tag

Oracle WebLogic Server 14.1.1.0 Remote Code Execution ≈ Packet Storm

January 23rd, 2021 📆 | 5900 Views ⚑

# Exploit Title: Oracle WebLogic Server 14.1.1.0 – RCE (Authenticated)# Date: 2021-01-21# Exploit Author: Photubias # Vendor Advisory: 1] https://www.oracle.com/security-alerts/cpujan2021.html#

Tagged with:




Backdoor.Win32.Hupigon.adef Remote Stack Buffer Overflow ≈ Packet Storm

January 22nd, 2021 📆 | 4016 Views ⚑

Discovery / credits: Malvuln – malvuln.com (c) 2021Original source: https://malvuln.com/advisory/c8f55ce7bbec784a97d7bfc6d7b1931f.txtContact: [email protected]: twitter.com/malvuln Threat: Backdoor.Win32.Hupigon.adefVulnerability: Remote Stack Buffer Overflow Description: Backdoor

Tagged with:




Selea Targa IP OCR-ANPR Camera Remote Code Execution ≈ Packet Storm

January 22nd, 2021 📆 | 2942 Views ⚑

#!/bin/bash## Selea Targa IP OCR-ANPR Camera Unauthenticated Remote Code Execution### Vendor: Selea s.r.l.# Product web page: https://www.selea.com# Affected version: Model:

Tagged with:




Selea CarPlateServer 4.0.1.6 Remote Program Execution ≈ Packet Storm

January 22nd, 2021 📆 | 7994 Views ⚑

Selea CarPlateServer (CPS) v4.0.1.6 Remote Program Execution Vendor: Selea s.r.l.Product web page: https://www.selea.comAffected version: 4.0.1.6(210120)4.013(201105)3.100(200225)3.005(191206)3.005(191112) Summary: Our CPS (Car Plate

Tagged with:




Backdoor.Win32.WinShell.30 Remote Stack Buffer Overflow / Missing Authentication ≈ Packet Storm

January 22nd, 2021 📆 | 4482 Views ⚑

Discovery / credits: Malvuln – malvuln.com (c) 2021Original source: https://malvuln.com/advisory/56a2b135c8d35561ea5b04694155eb77.txtContact: [email protected]: twitter.com/malvuln Threat: Backdoor.Win32.WinShell.30Vulnerability: Remote Stack Buffer Overflow / Missing

Tagged with:




Backdoor.Win32.Xel Remote Authentication Buffer Overflow ≈ Packet Storm

January 21st, 2021 📆 | 8234 Views ⚑

Discovery / credits: Malvuln – malvuln.com (c) 2021Original source: https://malvuln.com/advisory/3648c68bfe395fb9980ae547d881572c.txtContact: [email protected]: twitter.com/malvuln Threat: Backdoor.Win32.XelVulnerability: Remote Authentication Buffer OverflowDescription: Xel listens

Tagged with:




Email-Worm.Win32.Agent.gi Remote Stack Buffer Overflow ≈ Packet Storm

January 21st, 2021 📆 | 3899 Views ⚑

Discovery / credits: Malvuln – malvuln.com (c) 2021Original source: https://malvuln.com/advisory/74e65773735f977185f6a09f1472ea46.txtContact: [email protected]: twitter.com/malvuln Threat: Email-Worm.Win32.Agent.giVulnerability: Remote Stack Buffer Overflow – (UDP

Tagged with:




Backdoor.Win32.NetBull.11.a Remote Buffer Overflow ≈ Packet Storm

January 21st, 2021 📆 | 6715 Views ⚑

Discovery / credits: Malvuln – malvuln.com (c) 2021Original source: https://malvuln.com/advisory/80e98fdf726a3e727f3414bdbf2e86bb.txtContact: [email protected]: twitter.com/malvuln Threat: Backdoor.Win32.NetBull.11.aVulnerability: Remote Buffer OverflowDescription: Netbull listens on

Tagged with:




Backdoor.Win32.Zombam.geq Remote Buffer Overflow ≈ Packet Storm

January 20th, 2021 📆 | 4264 Views ⚑

Discovery / credits: Malvuln – malvuln.com (c) 2021Original source: https://malvuln.com/advisory/fd14cc7f025f49a3e08b4169d44a774e.txtContact: [email protected]: twitter.com/malvuln Threat: Backdoor.Win32.Zombam.geqVulnerability: Remote Buffer Overflow Description: Zombam.geq listens

Tagged with:




Backdoor.Win32.Whirlpool.10 Remote Stack Buffer Overflow ≈ Packet Storm

January 20th, 2021 📆 | 7826 Views ⚑

Discovery / credits: Malvuln – malvuln.com (c) 2021Original source: https://malvuln.com/advisory/bf0682b674ef23cf8ba0deeaf546f422.txtContact: [email protected]: twitter.com/malvuln Threat: Backdoor.Win32.Whirlpool.10Vulnerability: Remote Stack Buffer OverflowDescription: Whirlpool listens

Tagged with:




Backdoor.Win32.Whisper.b Remote Stack Corruption ≈ Packet Storm

January 20th, 2021 📆 | 7489 Views ⚑

Discovery / credits: Malvuln – malvuln.com (c) 2021Original source: https://malvuln.com/advisory/a0edb91f62c8c083ec35b32a922168d1.txtContact: [email protected]: twitter.com/malvuln Threat: Backdoor.Win32.Whisper.bVulnerability: Remote Stack Corruption Description: Whisper.b listens

Tagged with:




Backdoor.Win32.Latinus.b Remote Buffer Overflow ≈ Packet Storm

January 19th, 2021 📆 | 7146 Views ⚑

Discovery / credits: Malvuln – malvuln.com (c) 2021Original source: https://malvuln.com/advisory/9adffcc98cd658a7f9c5419480013f72.txtContact: [email protected]: twitter.com/malvuln Threat: Backdoor.Win32.Latinus.bVulnerability: Remote Buffer Overflow Description: Malware listens

Tagged with:




Backdoor.Win32.Whgrx Remote Stack Buffer Overflow ≈ Packet Storm

January 19th, 2021 📆 | 8487 Views ⚑

Discovery / credits: Malvuln – malvuln.com (c) 2021Original source: https://malvuln.com/advisory/eb6fd418cd3b52132ffb029b52839edf.txtContact: [email protected]: twitter.com/malvuln Threat: Backdoor.Win32.WhgrxVulnerability: Remote Host Header Stack Buffer OverflowDescription:

Tagged with:




Backdoor.Win32.Mnets Remote Stack Buffer Overflow ≈ Packet Storm

January 19th, 2021 📆 | 2160 Views ⚑

Discovery / credits: Malvuln – malvuln.com (c) 2021Original source: https://malvuln.com/advisory/1e42493dcef54a62bc28e0a1338c1142.txtContact: [email protected]: twitter.com/malvuln Threat: Backdoor.Win32.MnetsVulnerability: Remote Stack Buffer Overflow – (UDP

Tagged with:




Cisco UCS Manager 2.2(1d) Remote Command Execution ≈ Packet Storm

January 18th, 2021 📆 | 2465 Views ⚑

*]import sys, ssl, os, time*]import requests*]from requests.packages.urllib3.exceptions import InsecureRequestWarning requests.packages.urllib3.disable_warnings(InsecureRequestWarning) #*]# Exploit Title : Cisco UCS Manager – 2.2(1d) –

Tagged with: