exploit the possibilities
Showing 1 - 18 of 18 RSS Feed

Files Date: 2021-11-08

Email-Worm.Win32.Plexus.b Code Execution
Posted Nov 8, 2021
Authored by malvuln | Site malvuln.com

Email-Worm.Win32.Plexus.b malware suffers from a code execution vulnerability.

tags | exploit, worm, code execution
systems | windows
MD5 | f441fc1a0712331cb91cd60902234b73
Trojan.Win32.SkynetRef.y Unauthenticated Open Proxy
Posted Nov 8, 2021
Authored by malvuln | Site malvuln.com

Trojan.Win32.SkynetRef.y malware suffers from an unauthenticated open proxy vulnerability.

tags | exploit, trojan
systems | windows
MD5 | 4ac8fe73a9f4f6dfc26df0e707510161
Trojan.Win32.SkynetRef.x Unauthenticated Open Proxy
Posted Nov 8, 2021
Authored by malvuln | Site malvuln.com

Trojan.Win32.SkynetRef.x malware suffers from an unauthenticated open proxy vulnerability.

tags | exploit, trojan
systems | windows
MD5 | a51d9740e840688a1534500f06616001
Simple Client Management System 1.0 Cross Site Scripting
Posted Nov 8, 2021
Authored by Sentinal920

Simple Client Management System version 1.0 suffers from multiple persistent cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | 5f6c2b32ee515b1c2c829dfd9903f6a6
Trojan.Win32.Servstar.poa Unquoted Service Path
Posted Nov 8, 2021
Authored by malvuln | Site malvuln.com

Trojan.Win32.Servstar.poa malware suffers from an unquoted service path vulnerability.

tags | exploit, trojan
systems | windows
MD5 | 406fdd56e13266b8458c2f2d30bb268a
Kmaleon 1.1.0.205 SQL Injection
Posted Nov 8, 2021
Authored by Amel Bouziane-Leblond

Kmalen version 1.1.0.205 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 8ce176d49c3d5f96998baf92e30bed97
Backdoor.Win32.Hupigon.bnbb Unquoted Service Path
Posted Nov 8, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Hupigon.bnbb malware suffers from an unquoted service path vulnerability.

tags | exploit
systems | windows
MD5 | 48fbaea649a307919b880f7710028e64
HEUR.Backdoor.Win32.Denis.gen Denial Of Service
Posted Nov 8, 2021
Authored by malvuln | Site malvuln.com

HEUR.Backdoor.Win32.Denis.gen malware suffers from a denial of service vulnerability.

tags | exploit, denial of service
systems | windows
MD5 | 6b54a986706ebc1d2576bb8f48845722
zlog 1.2.15 Buffer Overflow
Posted Nov 8, 2021
Authored by LIWEI

zlog version 1.2.15 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
MD5 | 0631881a982d58d7cd6fc1acce5cfcf6
Backdoor.Win32.Hupigon.nqr Unauthenticated Open Proxy
Posted Nov 8, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Hupigon.nqr malware suffers from an unauthenticated open proxy vulnerability.

tags | exploit
systems | windows
MD5 | 5c284a19859fa10968141455c56d0c41
My Neighbor's Flat Smells Like Data
Posted Nov 8, 2021
Authored by Gerard Fuguet

Whitepaper on hacking smart switches to capture credentials for a network.

tags | paper
MD5 | 7ec0ee00b8ec7776a111270adbb2154e
Froxlor 0.10.29.1 SQL Injection
Posted Nov 8, 2021
Authored by Martin Cernac

Froxlor version 0.10.2l9.1 suffers from a remote SQL injection vulnerability that can enable an attacker to achieve remote code execution.

tags | exploit, remote, code execution, sql injection
advisories | CVE-2021-42325
MD5 | 199ae6f461294464fbb3a624620dc945
Backdoor.Win32.Pahador.aj Authentication Bypass / Code Execution
Posted Nov 8, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Pahador.aj malware suffers from bypass and code execution vulnerabilities.

tags | exploit, vulnerability, code execution
systems | windows
MD5 | 0c38bce0efb389504669fd2a350b8a5e
WordPress Backup And Restore 1.0.3 Arbitrary File Deletion
Posted Nov 8, 2021
Authored by Murat Demirci

WordPress Backup and Restore plugin version 1.0.3 suffers from an arbitrary file deletion vulnerability.

tags | exploit, arbitrary
MD5 | 2a04b185235b1b72ce77b6faa38feef4
Backdoor.Win32.VB.afu Insecure Transit
Posted Nov 8, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.VB.afu suffers from an insecure transit vulnerability that discloses credentials.

tags | exploit
systems | windows
MD5 | a5bb8f7955b5313e26014d70e125e15c
Money Transfer Management System 1.0 SQL Injection
Posted Nov 8, 2021
Authored by Aryan Chehreghani

Money Transfer Management System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
MD5 | 198a4c0ec392b8b7fe01f51dc961a248
FusionPBX 4.5.29 Remote Code Execution
Posted Nov 8, 2021
Authored by Luska

FusionPBX version 4.5.29 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2021-43405
MD5 | 04581f4f5ce3e86ac66a0ee9d086008f
Backdoor.Win32.VB.afu Insecure Permissions
Posted Nov 8, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.VB.afu malware suffers from an insecure permissions vulnerability.

tags | exploit
systems | windows
MD5 | 0f33d4a9ef973acf1f91d34e423ac30d
Page 1 of 1
Back1Next

File Archive:

December 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    18 Files
  • 2
    Dec 2nd
    11 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close