what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 19 of 19 RSS Feed

Files from numan turle

First Active2018-10-30
Last Active2023-01-31
Control Web Panel Unauthenticated Remote Command Execution
Posted Jan 31, 2023
Authored by Spencer McIntyre, numan turle | Site metasploit.com

Control Web Panel versions prior to 0.9.8.1147 are vulnerable to unauthenticated OS command injection. Successful exploitation results in code execution as the root user. The results of the command are not contained within the HTTP response and the request will block while the command is running.

tags | exploit, web, root, code execution
advisories | CVE-2022-44877
SHA-256 | 00cb85e5ab25f2d5091aa8c72d9d5252d08919dce9dbd37743bea7469e5dbc51
Control Web Panel 7 Remote Code Execution
Posted Jan 9, 2023
Authored by numan turle

Control Web Panel 7 versions prior to 0.9.8.1147 suffer from an unauthenticated remote code execution vulnerability.

tags | exploit, remote, web, code execution
advisories | CVE-2022-44877
SHA-256 | 698ef6e35dc8ca09f1857de4c6b56f25be500ed741ecd49ee2cd7f5d8dbf30ef
WordPress MasterStudy LMS 2.7.5 Account Creation
Posted Feb 18, 2022
Authored by numan turle

WordPress MasterStudy LMS plugin version 2.7.5 suffers from a missing access control allowing an unauthenticated party the ability to create an administrative account.

tags | exploit
advisories | CVE-2022-0441
SHA-256 | a3a490fa31272315dc3b33abac3a970e548d08d2ce2376d9748f5e401a62604f
Usermin 1.820 Remote Code Execution
Posted Aug 27, 2021
Authored by numan turle

Usermin version 1.820 authenticated remote code execution exploit.

tags | exploit, remote, code execution
SHA-256 | 1269514ec09dd065b78ba3dc999b0430fa4c0a9cedd960a589ba52d447a070a5
ZesleCP 3.1.9 Remote Code Execution
Posted Aug 27, 2021
Authored by numan turle

ZesleCP version 3.1.9 authenticated remote code execution exploit.

tags | exploit, remote, code execution
SHA-256 | 13dc036088e14a3dceb02f4bb93c56fa35609cd89f5f254b27c676047a24cb78
CyberPanel 2.1 Remote Code Execution
Posted Aug 27, 2021
Authored by numan turle

CyberPanel version 2.1 authenticated remote code execution exploit.

tags | exploit, remote, code execution
SHA-256 | 09cef76696c3f322663bcaedb3554377b61ecaadf24c49140593ee2a871b9d80
VestaCP 0.9.8 Command Injection
Posted Mar 19, 2021
Authored by numan turle

VestaCP version 0.9.8 suffers from a command injection vulnerability.

tags | exploit
SHA-256 | 938b6d6c27f61c9809c0637869f486e2fe7cb522a5ec286367a8f2f9bb53eebb
Hestia Control Panel 1.3.2 Arbitrary File Write
Posted Mar 18, 2021
Authored by numan turle

Hestia Control Panel version 1.3.2 suffers from an arbitrary file write vulnerability.

tags | exploit, arbitrary
SHA-256 | 8b07c29d22da704987a057fc57eda3059e580a1bc74f3d39dc736521084796f9
VestaCP 0.9.8 Cross Site Scripting
Posted Mar 18, 2021
Authored by numan turle

VestaCP version 0.9.8 suffers from a persistent cross site scripting vulnerability. Original discovery of persistent cross site scripting was discovered in this version in February of 2016 by Necmettin COSKUN.

tags | exploit, xss
SHA-256 | 936b7288bed9dcf93c8a516f91cad5a07fbe2daf994ea79501c73aef2e6153aa
YetiShare File Hosting Script 5.1.0 Server-Side Request Forgery
Posted Feb 8, 2021
Authored by numan turle

YetiShare File Hosting Script version 5.1.0 suffers from a server-side request forgery vulnerability.

tags | exploit
SHA-256 | 267963706eb600892bf78eae10349bea0978bddee0ad4d5e7923f6769861288d
LinuxKI Toolset 6.01 Remote Command Execution
Posted Jun 10, 2020
Authored by numan turle, Cody Winkler | Site metasploit.com

This Metasploit module exploits a vulnerability in LinuxKI Toolset versions 6.01 and below which allows remote code execution. The kivis.php pid parameter received from the user is sent to the shell_exec function, resulting in the security vulnerability.

tags | exploit, remote, php, code execution
advisories | CVE-2020-7209
SHA-256 | fd9d232691fc54e620006cc480b1bc31a3d0a9f3015b5ff23f6b2af4b02b0a6e
NVMS-1000 Directory Traversal
Posted Dec 13, 2019
Authored by numan turle

NVMS-1000 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | f1c11abd36b12a347c4f48a04a3556a2af087fcd5951ff65d04144b4ddf23398
Bullwark Momentum Series JAWS 1.0 Directory Traversal
Posted Dec 12, 2019
Authored by numan turle

Bullwark Momentum Series JAWS version 1.0 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 812ea067f8411484fcca9fa042d4db7bb3aaad1b2fbd3bcfba9f99c82a72d77e
Crystal Live HTTP Server 6.01 Directory Traversal
Posted Nov 18, 2019
Authored by numan turle

Crystal Live HTTP Server version 6.01 suffers from a directory traversal vulnerability.

tags | exploit, web, file inclusion
SHA-256 | a2124740820c2e0d6ff88759285feeb95e3df9273457fcc5ae7c11f03c6e5dd1
gSOAP 2.8 Directory Traversal
Posted Nov 13, 2019
Authored by numan turle

gSOAP version 2.8 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 10e3f480d11820c7ca0b9b68a2bc1ee47cdcfadb6e020a9d09309e174ef9005d
Interspire Email Marketer 6.20 Remote Code Execution
Posted May 23, 2019
Authored by numan turle

Interspire Email Marketer version 6.20 suffers from a remote code execution vulnerability in surveys_submit.php.

tags | exploit, remote, php, code execution
advisories | CVE-2018-19550
SHA-256 | 45d131e6a2425bb502f4a5d754152dd1a73aa4d4cac8f190794723acfe99d49e
NUUO NVRmini upgrade_handle.php Remote Command Execution
Posted Feb 7, 2019
Authored by Berk Dusunur, numan turle | Site metasploit.com

This Metasploit module exploits a vulnerability in the web application of NUUO NVRmini IP camera, which can be done by triggering the writeuploaddir command in the upgrade_handle.php file.

tags | exploit, web, php
advisories | CVE-2018-14933
SHA-256 | 0e6d6f16b31358d1595593354838281181d64f454a338a4ce6a5d4c2cc1f34b3
Zyxel VMG1312-B10D 5.13AAXA.8 Directory Traversal
Posted Nov 26, 2018
Authored by numan turle

Zyxel VMG1312-B10D 5.13AAXA.8 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 60c8e9a5e09699dcc7795a645cfb7557da62d34304af0a5f585f8638ad3a1365
ZyXEL VMG3312-B10B Credential Disclosure
Posted Oct 30, 2018
Authored by numan turle

ZyXEL VMG3312-B10B versions prior to 1.00 (AAPP.7) suffer from a credential disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | 043dd9f6802d82984a7afef78cd5da2562fb13860ca43e1bd31ad2d12e9cdc30
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close