Twenty Year Anniversary
Showing 1 - 25 of 793 RSS Feed

File Upload Files

HiScout GRC Suite File Upload
Posted Sep 13, 2018
Authored by Sebastian Auwaerter

HiScout GRC Suite versions prior to 3.1.5 suffer from a file upload vulnerability. An authenticated attacker with the permission to edit or add a "WebSiteElement" to the "content" pages is able to upload any file with any file extension to the data directory of the application. This directory is in the web root and the uploaded file is executed on the server if ".aspx" is chosen as the file extension and if the file contains aspx source code. Any commands can be executed with the permissions of the web server user on the server by exploiting this vulnerability.

tags | exploit, web, root, file upload
advisories | CVE-2018-16796
MD5 | a35fd22828c02d235e1b374dd87de2af
LiteCart 2.1.2 Arbitrary File Upload
Posted Aug 27, 2018
Authored by Haboob Team

LiteCart version 2.1.2 suffers from a remote file upload vulnerability.

tags | exploit, remote, file upload
advisories | CVE-2018-12256
MD5 | 44fd0ea7d19bec8cfb7f443bc7ae5960
OCS Inventory NG Webconsole Shell Upload
Posted Aug 6, 2018
Authored by Simon Uvarov

OCS Inventory NG OCS Inventory Server through 2.5 allows a privileged user to gain access to the server via a template file containing PHP code, because file extensions other than .html are permitted.

tags | exploit, php, file upload
advisories | CVE-2018-14857
MD5 | f671f8d4d1775a87dfdb4e245c86573a
WordPress Responsive Thumbnail Slider Arbitrary File Upload
Posted Jul 27, 2018
Authored by Arash Khazaei, Shelby Pace | Site metasploit.com

This Metasploit module exploits an arbitrary file upload vulnerability in Responsive Thumbnail Slider Plugin v1.0 for WordPress post authentication.

tags | exploit, arbitrary, file upload
MD5 | be85945c5f032d73aa3ce61a1cd67566
File Upload Restrictions Bypass
Posted Jul 23, 2018
Authored by Haboob Team

Whitepaper called File Upload Restrictions Bypass.

tags | paper, file upload
MD5 | 9d615f9f2d0f44874ac4900c33b860ef
WAGO e!DISPLAY 7300T XSS / File Upload / Code Execution
Posted Jul 11, 2018
Authored by T. Weber | Site sec-consult.com

WAGO e!DISPLAY 7300T WP 4.3 480x272 PIO1 version FW 01 - 01.01.10(01) suffer from code execution, cross site scripting, weak permission, and remote file upload vulnerabilities.

tags | exploit, remote, vulnerability, code execution, xss, file upload
advisories | CVE-2018-12979, CVE-2018-12980, CVE-2018-12981
MD5 | f12e1bdd6ce0d40862c5cca1957f6a1a
ShopNx Arbitrary File Upload
Posted Jul 4, 2018
Authored by Borna Nematzadeh

ShopNx suffers from an arbitrary file upload vulnerability.

tags | exploit, arbitrary, file upload
advisories | CVE-2018-12519
MD5 | 873cfaf579555162d921b6c033b40dab
Intex Router N-150 Arbitrary File Upload
Posted Jun 25, 2018
Authored by Samrat Das

Intex Router N-150 suffers from a remote arbitrary file upload vulnerability.

tags | exploit, remote, arbitrary, file upload
MD5 | 3f9571e629e73736e76af98281a91a9a
Redaxo CMS Mediapool Arbitrary File Upload
Posted Jun 13, 2018
Authored by h0n1gsp3cht

Redaxo CMS Mediapool add-on versions prior to 5.5.1 suffer from a remote file upload vulnerability.

tags | exploit, remote, file upload
MD5 | 2ee9e258e0cbc86d2f56b93a4898abbb
Appnitro MachForm SQL Injection / Traversal / File Upload
Posted May 28, 2018
Authored by Amine Taouirsa

Appnitro MachForm suffers from remote file upload, remote SQL injection, and path traversal vulnerabilities.

tags | exploit, remote, vulnerability, sql injection, file inclusion, file upload
advisories | CVE-2018-6409, CVE-2018-6410, CVE-2018-6411
MD5 | b12919cc6902374a5ee31d11fbf166fd
Easy File Uploader 1.7 Shell Upload
Posted May 24, 2018
Authored by indoushka

Easy File Uploader version 1.7 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell, file upload
MD5 | 72afb65d3fa31008dd700ca8653852f9
Easy File Uploader 1.7 SQL Injection / Cross Site Scripting
Posted May 22, 2018
Authored by Ozkan Mustafa Akkus

Easy File Uploader version 1.7 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection, file upload
MD5 | c05bbc2ad32029b0f1334e4d15889fbb
MyBiz MyProcureNet 5.0.0 File Upload / Cross Site Scripting
Posted May 14, 2018
Authored by Fikri Fadzil, Wan Ikram, Jasveer Singh, Ahmad Ramadhan Amizudin | Site sec-consult.com

MyBiz MyProcureNet version 5.0.0 suffers from remote file upload and cross site scripting vulnerabilities.

tags | advisory, remote, vulnerability, xss, file upload
advisories | CVE-2018-11091, CVE-2018-11090
MD5 | 9d259792840d984bdc75e2b482b86e96
PlaySMS import.php Code Execution
Posted May 7, 2018
Authored by Touhid M.Shaikh | Site metasploit.com

This Metasploit module exploits an authenticated file upload remote code execution vulnerability in PlaySMS version 1.4. This issue is caused by improper file contents handling in import.php (aka the Phonebook import feature). Authenticated Users can upload a CSV file containing a malicious payload via vectors involving the User-Agent HTTP header and PHP code in the User-Agent. This Metasploit module was tested against PlaySMS 1.4 on VulnHub's Dina 1.0 machine and Windows 7.

tags | exploit, remote, web, php, code execution, file upload
systems | windows, 7
advisories | CVE-2017-9101
MD5 | f976c4045dcaba09573750799d5fb25a
PlaySMS sendfromfile.php Code Execution
Posted May 7, 2018
Authored by Touhid M.Shaikh, DarkS3curity | Site metasploit.com

This Metasploit module exploits a code injection vulnerability within an authenticated file upload feature in PlaySMS version 1.4. This issue is caused by improper file name handling in sendfromfile.php file. Authenticated Users can upload a file and rename the file with a malicious payload. This Metasploit module was tested against PlaySMS 1.4 on VulnHub's Dina 1.0 machine and Windows 7.

tags | exploit, php, file upload
systems | windows, 7
advisories | CVE-2017-9080
MD5 | 2580a04744c23352ceb458505fd66e3d
Watchguard Hard-Coded Credentials / Failed Controls
Posted May 3, 2018
Authored by Stephen Shkardoon

WatchGuard Access Points running firmware before version 1.2.9.15 suffer from hard-coded credential, hidden authentication, file upload, and incorrect validation vulnerabilities.

tags | exploit, vulnerability, file upload
advisories | CVE-2018-10575, CVE-2018-10576, CVE-2018-10577, CVE-2018-10578
MD5 | 2ce103fc55de9e6fbe94f48a5f490449
ASUSTOR ADM 3.1.0.RFQ3 Chained Remote Code Execution
Posted May 2, 2018
Authored by Matthew F

ASUSTOR ADM versions 3.1.0.RFQ3 and below chained exploit that leverages stored cross site scripting, cross site request forgery, path traversal, and file upload vulnerabilities.

tags | exploit, vulnerability, xss, file upload, csrf
MD5 | a3b210023543df6ac13e213699161e0a
Jfrog Artifactory Code Execution / Shell Upload
Posted Apr 26, 2018
Authored by Alessio Sergi

Jfrog Artifactory versions prior to 4.16 suffer from unauthenticated arbitrary file upload and remote command execution vulnerabilities.

tags | exploit, remote, arbitrary, vulnerability, file upload
advisories | CVE-2016-10036
MD5 | dc65bc67fb5a4cdd39a3ef7d94a10ce6
WordPress File Upload 4.3.3 Cross Site Scripting
Posted Apr 10, 2018
Authored by ManhNho

WordPress File Upload plugin version 4.3.3 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss, file upload
MD5 | 1444aa728d5ff96b90fa2afbafd41c90
WordPress File Upload 4.3.2 Cross Site Scripting
Posted Apr 10, 2018
Authored by ManhNho

WordPress File Upload plugin version 4.3.2 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss, file upload
advisories | CVE-2018-9172
MD5 | b07861eb4f07f3cc5cc2adf684dd60c2
ClipBucket beats_uploader Unauthenticated Arbitrary File Upload
Posted Mar 26, 2018
Authored by Touhid M.Shaikh | Site metasploit.com

This Metasploit module exploits a vulnerability found in ClipBucket versions before 4.0.0 (Release 4902). A malicious file can be uploaded using an unauthenticated arbitrary file upload vulnerability. It is possible for an attacker to upload a malicious script to issue operating system commands. This issue is caused by improper session handling in /action/beats_uploader.php file. This Metasploit module was tested on ClipBucket before 4.0.0 - Release 4902 on Windows 7 and Kali Linux.

tags | exploit, arbitrary, php, file upload
systems | linux, windows, 7
MD5 | d2275d600b73e806af00c2c4d704c496
OTRS Command Injection
Posted Mar 3, 2018
Authored by Ali BawazeEer

OTRS versions 5.0.0 through 5.0.24 and 6.0.0 through 6.0.1 suffer from remote code execution vulnerabilities.

tags | exploit, remote, vulnerability, code execution, file upload
advisories | CVE-2018-7567
MD5 | ac1bc6a06bf339a083573a1b4efc681c
ClipBucket SQL Injection / Command Injection / File Upload
Posted Feb 27, 2018
Authored by Fikri Fadzil, Wan Ikram, Jasveer Singh, Ahmad Ramadhan Amizudin | Site sec-consult.com

ClipBucket versions prior to 4.0.0 Release 4902 suffer from OS command injection, arbitrary file upload, and remote SQL injection vulnerabilities.

tags | exploit, remote, arbitrary, vulnerability, sql injection, file upload
MD5 | 5f01efc19d73b84eb391886d4efcadc7
Joomla! Proclaim 9.1.1 Shell Upload
Posted Feb 23, 2018
Authored by Ihsan Sencan

Joomla! Proclaim component version 9.1.1 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell, file upload
advisories | CVE-2018-7316
MD5 | e4b3f4730e22f3b7318737ee5628509e
Tejari Arbitrary File Upload
Posted Feb 16, 2018
Authored by Arvind Vishwakarma

Tejari suffers from an arbitrary file upload vulnerability.

tags | advisory, arbitrary, file upload
MD5 | fe73773199d81547dabdd4fe82e4b5d6
Page 1 of 32
Back12345Next

File Archive:

September 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    1 Files
  • 2
    Sep 2nd
    3 Files
  • 3
    Sep 3rd
    15 Files
  • 4
    Sep 4th
    15 Files
  • 5
    Sep 5th
    18 Files
  • 6
    Sep 6th
    18 Files
  • 7
    Sep 7th
    15 Files
  • 8
    Sep 8th
    2 Files
  • 9
    Sep 9th
    2 Files
  • 10
    Sep 10th
    16 Files
  • 11
    Sep 11th
    17 Files
  • 12
    Sep 12th
    15 Files
  • 13
    Sep 13th
    29 Files
  • 14
    Sep 14th
    21 Files
  • 15
    Sep 15th
    3 Files
  • 16
    Sep 16th
    1 Files
  • 17
    Sep 17th
    15 Files
  • 18
    Sep 18th
    16 Files
  • 19
    Sep 19th
    29 Files
  • 20
    Sep 20th
    18 Files
  • 21
    Sep 21st
    5 Files
  • 22
    Sep 22nd
    2 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close