the original cloud security
Showing 26 - 50 of 729 RSS Feed

File Upload Files

dirList 0.3.0 File Upload / Command Execution
Posted Jan 17, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

dirList version 0.3.0 suffers from file upload bypass and remote command execution vulnerabilities.

tags | exploit, remote, vulnerability, file upload
MD5 | 610809d93925f3ef53825df4b21b21e6
openWYSIWYG Insert Image 1.4.7 Arbitrary File Upload
Posted Jan 16, 2017
Authored by Mojtaba MobhaM

openWYSIWYG Insert Image version 1.4.7 suffers from a remote arbitrary unauthenticated file upload vulnerability.

tags | exploit, remote, arbitrary, file upload
MD5 | 740100de45e846df21c5ae89ee8513c2
MC Coming Soon Arbitrary File Upload / Improper Access Restrictions
Posted Jan 15, 2017
Authored by Ihsan Sencan

MC Coming Soon script suffers from arbitrary file upload and improper access restriction vulnerabilities.

tags | exploit, arbitrary, vulnerability, file upload
MD5 | 4dfd4806196147a896059dbb6aaa56d7
Nuked Klan CMS 1.8 File Upload
Posted Jan 9, 2017
Authored by M.R.S.L.Y

Nuked Klan CMS version 1.8 suffers from a remote file upload vulnerability.

tags | exploit, remote, file upload
MD5 | f9b9a3da8e3a9fd2f4b0b99a11519103
WordPress Templatic 2.3.6 File Upload
Posted Dec 30, 2016
Authored by r3m1ck

WordPress Templatic plugin versions 2.3.6 and below suffer from a remote file upload vulnerability.

tags | exploit, remote, file upload
MD5 | e45b4f800f6995870bca7805f7df6a0f
HP Security Bulletin HPSBMU03684 1
Posted Dec 16, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBMU03684 1 - Several potential security vulnerabilities have been identified in HPE Version Control Repository Manager(VCRM) on Windows and Linux. The vulnerabilities could be exploited remotely resulting in Cross-Site Request Forgery, Sensitive Information Disclosure, and Malicious File Upload. Revision 1 of this advisory.

tags | advisory, vulnerability, info disclosure, file upload, csrf
systems | linux, windows
advisories | CVE-2016-8513, CVE-2016-8514, CVE-2016-8515
MD5 | 278ea369ca1ab93f575acadda358aab7
SweetRice 1.5.1 File Upload
Posted Nov 3, 2016
Authored by Ehsan Hosseini

SweetRice version 1.5.1 suffers from a remote file upload vulnerability.

tags | exploit, remote, file upload
MD5 | 2a6f7eb53a61263e6d355594fb03699a
Moodle CMS 3.1.2 Cross Site Scripting / File Upload
Posted Nov 1, 2016
Authored by Vadodil Joel Varghese

Moodle CMS versions 3.1.2 and below suffer from cross site scripting and file upload vulnerabilities.

tags | exploit, vulnerability, xss, file upload
MD5 | fb0b95632547a001049bdae7e3d18171
WordPress Userpro Remote File Upload
Posted Oct 21, 2016
Authored by T3rm!nat0r5 | Site metasploit.com

This Metasploit module exploits an arbitrary PHP code upload in thewordpress Ifileupload plugin, The vulnerability allows for unauthorization file upload and remote code execution.

tags | exploit, remote, arbitrary, php, code execution, file upload
MD5 | e488687e807e8098cbec133d782598c0
CNDSOFT 2.3 Cross Site Request Forgery / Shell Upload
Posted Oct 20, 2016
Authored by Besim

CNDSOFT version 2.3 suffers from cross site request forgery and remote shell upload vulnerabilities.

tags | exploit, remote, shell, vulnerability, file upload, csrf
MD5 | 38118e0e98ba2462b18cd31e9c504cca
Ruby on Rails Dynamic Render File Upload Remote Code Execution
Posted Oct 13, 2016
Site metasploit.com

This Metasploit module exploits a remote code execution vulnerability in the explicit render method when leveraging user parameters. This Metasploit module has been tested across multiple versions of Ruby on Rails. The technique used by this module requires the specified endpoint to be using dynamic render paths. Also, the vulnerable target will need a POST endpoint for the TempFile upload, this can literally be any endpoint. This Metasploit module does not use the log inclusion method of exploitation due to it not being universal enough. Instead, a new code injection technique was found and used whereby an attacker can upload temporary image files against any POST endpoint and use them for the inclusion attack. Finally, you only get one shot at this if you are testing with the builtin rails server, use caution.

tags | exploit, remote, code execution, file upload, ruby
advisories | CVE-2016-0752
MD5 | 330df82eae0981c2ca7cc8777a63a53c
Forbiz Infoway CMS File Upload / Cross Site Scripting
Posted Oct 7, 2016
Authored by M.R.S.L.Y

Forbiz Infoway CMS suffers from cross site scripting and remote file upload vulnerabilities.

tags | exploit, remote, vulnerability, xss, file upload
MD5 | cf087eb872d7b1021640d1d09a7e2744
EMC ViPR SRM XSS / CSRF / File Upload / Brute Force
Posted Sep 13, 2016
Site emc.com

EMC ViPR SRM versions prior to 3.7.2 suffer from cross site request forgery, cross site scripting, brute force, and remote file upload vulnerabilities.

tags | advisory, remote, vulnerability, xss, file upload, csrf
advisories | CVE-2016-0922, CVE-2016-6641, CVE-2016-6642, CVE-2016-6643
MD5 | 35b4414787c6f34d8dd86c193785b71b
WordPress Cubed Theme 1.2 CSRF / File Upload
Posted Sep 9, 2016
Authored by howucan

WordPress Cubed theme version 1.2 suffers from cross site request forgery and remote file upload vulnerabilities.

tags | exploit, remote, vulnerability, file upload, csrf
MD5 | fa4196605f52b02f8cd82e5c9562d32e
Jobberbase 2.0 Disclosure / XSS / Code Execution / Upload
Posted Sep 8, 2016
Authored by Ross Marks

Jobberbase version 2.0 suffers from code execution, open redirect, path disclosure, unrestricted file upload, and SQL injection vulnerabilities.

tags | exploit, vulnerability, code execution, xss, sql injection, info disclosure, file upload
MD5 | fe6cd5ec5043dc4c0ac9d9e0f99b84be
BSNL Teracom Router Firmware Rewrite / Link Modification
Posted Sep 3, 2016
Authored by Ajay Gowtham

BSNL Teracom routers suffer from a firmware rewrite via unrestricted file upload issue and a link modification issue.

tags | exploit, file upload
MD5 | c08a87b7f8ebdcb824d75caf9d0045ab
Barracuda Web App Firewall/Load Balancer Post Auth Remote Root Exploit (2)
Posted Jul 26, 2016
Authored by Russell Sanford | Site metasploit.com

This Metasploit module exploits a remote command execution vulnerability in the Barracuda Web App Firewall Firmware Version <= 8.0.1.007 and Load Balancer Firmware <= v5.4.0.004 by exploiting a two vulnerabilities in the web administration interface. The first bug leverages a Arbitrary File Upload vulnerability to create a malicious file containing shell commands before using a second bug meant to clean up left-over core files on the device to execute them. By sending a specially crafted requests it's possible to inject system commands while escalating to root do to relaxed sudo configurations on the appliances.

tags | exploit, remote, web, arbitrary, shell, root, vulnerability, file upload
MD5 | e1652406ee326c56040c4cfc3a3a472c
Tiki Wiki 15.1 Unauthenticated File Upload
Posted Jul 12, 2016
Authored by Mehmet Ince | Site metasploit.com

This Metasploit module exploits a file upload vulnerability in Tiki Wiki versions 15.1 and below which could be abused to allow unauthenticated users to execute arbitrary code under the context of the web server user. The issue comes with one of the 3rd party components. Name of that components is ELFinder -version 2.0-. This components comes with default example page which demonstrates file operations such as upload, remove, rename, create directory etc. Default configuration does not force validations such as file extension, content-type etc. Thus, unauthenticated user can upload PHP file. The exploit has been tested on Debian 8.x 64-bit and Tiki Wiki 15.1.

tags | exploit, web, arbitrary, php, file upload
systems | linux, debian
MD5 | 75ff5f78056283806bf48c4b08b4edfc
GNU Wget Arbitrary File Upload / Potential Remote Code Execution
Posted Jul 6, 2016
Authored by Dawid Golunski

GNU Wget versions prior to 1.18 suffer from an arbitrary file upload vulnerability that may allow for remote code execution.

tags | exploit, remote, arbitrary, code execution, file upload
advisories | CVE-2016-4971
MD5 | c1bff7c5ea44db8d87e028c13050cabc
Teampass 2.1.26 Arbitrary File Upload
Posted Jul 6, 2016
Authored by Peter Kok | Site vulnerability-lab.com

Teampass version 2.1.26 suffers from a remote authenticated file upload vulnerability that may allow for code execution.

tags | exploit, remote, code execution, file upload
MD5 | f26594fd5dac0172639bf267355e99df
Nagios XI Chained Remote Code Execution
Posted Jul 6, 2016
Authored by wvu, Francesco Oddo | Site metasploit.com

This Metasploit module exploits an SQL injection, auth bypass, file upload, command injection, and privilege escalation in Nagios XI <= 5.2.7 to pop a root shell.

tags | exploit, shell, root, sql injection, file upload
MD5 | f70bea86a23da44db72654aedbe0c274
WordPress CodeCanyon Real3D FlipBook 2.18.8 File Deletion / Upload / XSS
Posted Jul 5, 2016
Authored by Mukarram Khalid

WordPress CodeCanyon Real3D FlipBook plugin version 2.18.8 suffers from unauthenticated file deletion, file upload, and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, file upload
MD5 | a6f0fad26239bf3152b28b3b1ba8e436
Debian Security Advisory 3614-1
Posted Jul 2, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3614-1 - The TERASOLUNA Framework Development Team discovered a denial of service vulnerability in Apache Commons FileUpload, a package to make it easy to add robust, high-performance, file upload capability to servlets and web applications. A remote attacker can take advantage of this flaw by sending file upload requests that cause the HTTP server using the Apache Commons Fileupload library to become unresponsive, preventing the server from servicing other requests.

tags | advisory, remote, web, denial of service, file upload
systems | linux, debian
advisories | CVE-2016-3092
MD5 | 8842da40ae7c42b85da4c1c180d199b4
Debian Security Advisory 3611-1
Posted Jun 30, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3611-1 - The TERASOLUNA Framework Development Team discovered a denial of service vulnerability in Apache Commons FileUpload, a package to make it easy to add robust, high-performance, file upload capability to servlets and web applications. A remote attacker can take advantage of this flaw by sending file upload requests that cause the HTTP server using the Apache Commons Fileupload library to become unresponsive, preventing the server from servicing other requests.

tags | advisory, remote, web, denial of service, file upload
systems | linux, debian
advisories | CVE-2016-3092
MD5 | eaa31806900c66154bd56d14b7920190
Sierra Wireless AirLink Raven XE Industrial 3G Gateway CSRF / File Upload
Posted Jun 23, 2016
Authored by Karn Ganeshen

Sierra Wireless AirLink Raven XE Industrial 3G Gateway suffers from cross site request forgery, information disclosure, and remote file upload vulnerabilities.

tags | exploit, remote, vulnerability, info disclosure, file upload, csrf
MD5 | 3e6d79e2ff5f919a1799a9ffb4c203b2
Page 2 of 30
Back12345Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    2 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close