January 23rd, 2021 📆 | 5900 Views ⚑
# Exploit Title: Oracle WebLogic Server 14.1.1.0 – RCE (Authenticated)# Date: 2021-01-21# Exploit Author: Photubias # Vendor Advisory: 1] https://www.oracle.com/security-alerts/cpujan2021.html#
January 22nd, 2021 📆 | 4016 Views ⚑
Discovery / credits: Malvuln – malvuln.com (c) 2021Original source: https://malvuln.com/advisory/c8f55ce7bbec784a97d7bfc6d7b1931f.txtContact: [email protected]: twitter.com/malvuln Threat: Backdoor.Win32.Hupigon.adefVulnerability: Remote Stack Buffer Overflow Description: Backdoor
January 22nd, 2021 📆 | 2942 Views ⚑
#!/bin/bash## Selea Targa IP OCR-ANPR Camera Unauthenticated Remote Code Execution### Vendor: Selea s.r.l.# Product web page: https://www.selea.com# Affected version: Model:
January 22nd, 2021 📆 | 7994 Views ⚑
Selea CarPlateServer (CPS) v4.0.1.6 Remote Program Execution Vendor: Selea s.r.l.Product web page: https://www.selea.comAffected version: 4.0.1.6(210120)4.013(201105)3.100(200225)3.005(191206)3.005(191112) Summary: Our CPS (Car Plate
January 22nd, 2021 📆 | 8276 Views ⚑
# Exploit Title: Selea Targa IP OCR-ANPR Camera - 'addr' Remote Code Execution (Unauthenticated) # Date: 07.11.2020 # Exploit Author:
January 22nd, 2021 📆 | 4878 Views ⚑
# Exploit Title: Selea Targa IP OCR-ANPR Camera - 'files_list' Remote Stored XSS # Date: 07.11.2020 # Exploit Author: LiquidWorm
January 22nd, 2021 📆 | 6435 Views ⚑
# Exploit Title: Selea CarPlateServer (CPS) 4.0.1.6 - Remote Program Execution # Date: 08.11.2020 # Exploit Author: LiquidWorm # Vendor
January 22nd, 2021 📆 | 4482 Views ⚑
Discovery / credits: Malvuln – malvuln.com (c) 2021Original source: https://malvuln.com/advisory/56a2b135c8d35561ea5b04694155eb77.txtContact: [email protected]: twitter.com/malvuln Threat: Backdoor.Win32.WinShell.30Vulnerability: Remote Stack Buffer Overflow / Missing
January 21st, 2021 📆 | 8234 Views ⚑
Discovery / credits: Malvuln – malvuln.com (c) 2021Original source: https://malvuln.com/advisory/3648c68bfe395fb9980ae547d881572c.txtContact: [email protected]: twitter.com/malvuln Threat: Backdoor.Win32.XelVulnerability: Remote Authentication Buffer OverflowDescription: Xel listens
January 21st, 2021 📆 | 4295 Views ⚑
# Exploit Title: Voting System 1.0 - File Upload RCE (Authenticated Remote Code Execution) # Date: 19/01/2021 # Exploit Author:
January 21st, 2021 📆 | 4994 Views ⚑
While 80pc of companies surveyed believe large-scale remote working has created data protection risks, only 55pc have implemented new procedures.
January 21st, 2021 📆 | 3899 Views ⚑
Discovery / credits: Malvuln – malvuln.com (c) 2021Original source: https://malvuln.com/advisory/74e65773735f977185f6a09f1472ea46.txtContact: [email protected]: twitter.com/malvuln Threat: Email-Worm.Win32.Agent.giVulnerability: Remote Stack Buffer Overflow – (UDP
January 21st, 2021 📆 | 6715 Views ⚑
Discovery / credits: Malvuln – malvuln.com (c) 2021Original source: https://malvuln.com/advisory/80e98fdf726a3e727f3414bdbf2e86bb.txtContact: [email protected]: twitter.com/malvuln Threat: Backdoor.Win32.NetBull.11.aVulnerability: Remote Buffer OverflowDescription: Netbull listens on
January 20th, 2021 📆 | 4264 Views ⚑
Discovery / credits: Malvuln – malvuln.com (c) 2021Original source: https://malvuln.com/advisory/fd14cc7f025f49a3e08b4169d44a774e.txtContact: [email protected]: twitter.com/malvuln Threat: Backdoor.Win32.Zombam.geqVulnerability: Remote Buffer Overflow Description: Zombam.geq listens
January 20th, 2021 📆 | 7826 Views ⚑
Discovery / credits: Malvuln – malvuln.com (c) 2021Original source: https://malvuln.com/advisory/bf0682b674ef23cf8ba0deeaf546f422.txtContact: [email protected]: twitter.com/malvuln Threat: Backdoor.Win32.Whirlpool.10Vulnerability: Remote Stack Buffer OverflowDescription: Whirlpool listens
January 20th, 2021 📆 | 7489 Views ⚑
Discovery / credits: Malvuln – malvuln.com (c) 2021Original source: https://malvuln.com/advisory/a0edb91f62c8c083ec35b32a922168d1.txtContact: [email protected]: twitter.com/malvuln Threat: Backdoor.Win32.Whisper.bVulnerability: Remote Stack Corruption Description: Whisper.b listens
January 19th, 2021 📆 | 7146 Views ⚑
Discovery / credits: Malvuln – malvuln.com (c) 2021Original source: https://malvuln.com/advisory/9adffcc98cd658a7f9c5419480013f72.txtContact: [email protected]: twitter.com/malvuln Threat: Backdoor.Win32.Latinus.bVulnerability: Remote Buffer Overflow Description: Malware listens
January 19th, 2021 📆 | 8487 Views ⚑
Discovery / credits: Malvuln – malvuln.com (c) 2021Original source: https://malvuln.com/advisory/eb6fd418cd3b52132ffb029b52839edf.txtContact: [email protected]: twitter.com/malvuln Threat: Backdoor.Win32.WhgrxVulnerability: Remote Host Header Stack Buffer OverflowDescription:
January 19th, 2021 📆 | 2160 Views ⚑
Discovery / credits: Malvuln – malvuln.com (c) 2021Original source: https://malvuln.com/advisory/1e42493dcef54a62bc28e0a1338c1142.txtContact: [email protected]: twitter.com/malvuln Threat: Backdoor.Win32.MnetsVulnerability: Remote Stack Buffer Overflow – (UDP
January 18th, 2021 📆 | 2465 Views ⚑
*]import sys, ssl, os, time*]import requests*]from requests.packages.urllib3.exceptions import InsecureRequestWarning requests.packages.urllib3.disable_warnings(InsecureRequestWarning) #*]# Exploit Title : Cisco UCS Manager – 2.2(1d) –
Comments