Stored XSS in “Menu Editor” – htmlyv2.9.9

Read Time:24 Second

Posted by Andrey Stoykov on Sep 18

# Exploit Title: Stored XSS in “Menu Editor” – htmlyv2.9.9
# Date: 9/2024
# Exploit Author: Andrey Stoykov
# Version: 2.9.9
# Tested on: Ubuntu 22.04
# Blog:
https://msecureltd.blogspot.com/2024/09/friday-fun-pentest-series-10-stored-xss.html

Stored XSS #1:

Steps to Reproduce:

1. Login as admin
2. Browse to “Menu Editor”
3. In “Name” field add payload “><img src=x onerror=alert(1)>
4. In…

Read More

Backdoor.Win32.BlackAngel.13 / Unauthenticated Remote Command Execution

Read Time:20 Second

Posted by malvuln on Sep 18

Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024
Original source:
https://malvuln.com/advisory/d1523df44da5fd40df92602b8ded59c8.txt
Contact: malvuln13 () gmail com
Media: x.com/malvuln

Threat: Backdoor.Win32.BlackAngel.13
Vulnerability: Unauthenticated Remote Command Execution
Description: The malware listens on TCP port 1850. Third party
adversaries who can reach an infected host can issue commands made
available by the backdoor….

Read More

Backdoor.Win32.CCInvader.10 / Authentication Bypass

Read Time:20 Second

Posted by malvuln on Sep 18

Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024
Original source:
https://malvuln.com/advisory/cb86af8daa35f6977c80814ec6e40d63.txt
Contact: malvuln13 () gmail com
Media: x.com/malvuln

Threat: Backdoor.Win32.CCInvader.10
Vulnerability: Authentication Bypass
Description: The malware runs an FTP server. Third-party adversarys
who can reach infected systems can logon using any username/password
combination. Intruders may then upload…

Read More

Backdoor.Win32.Delf.yj / Information Disclosure

Read Time:21 Second

Posted by malvuln on Sep 18

Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024
Original source:
https://malvuln.com/advisory/f991c25f1f601cc8d14dca4737415238.txt
Contact: malvuln13 () gmail com
Media: x.com/malvuln

Threat: Backdoor.Win32.Delf.yj
Vulnerability: Information Disclosure
Description: The malware listens on TCP port 8080. Third-party
adversaries who can reach an infected system, can download screen
captures of a victims machine by making a simple…

Read More