what you don't know can hurt you
Showing 1 - 25 of 2,826 RSS Feed

Shell Files

TP-Link Cloud Cameras NCXXX Bonjour Command Injection
Posted Sep 18, 2020
Authored by Pietro Oliva | Site metasploit.com

TP-Link cloud cameras NCXXX series (NC200, NC210, NC220, NC230, NC250, NC260, NC450) are vulnerable to an authenticated command injection vulnerability. In all devices except NC210, despite a check on the name length in swSystemSetProductAliasCheck, no other checks are in place in order to prevent shell metacharacters from being introduced. The system name would then be used in swBonjourStartHTTP as part of a shell command where arbitrary commands could be injected and executed as root. NC210 devices cannot be exploited directly via /setsysname.cgi due to proper input validation. NC210 devices are still vulnerable since swBonjourStartHTTP did not perform any validation when reading the alias name from the configuration file. The configuration file can be written, and code execution can be achieved by combining this issue with CVE-2020-12110.

tags | exploit, arbitrary, shell, cgi, root, code execution
advisories | CVE-2020-12109
MD5 | 65581bfcfd69f6bd2c8b8917eda921c4
Gentoo Linux Security Advisory 202009-08
Posted Sep 14, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202009-8 - An information disclosure vulnerability in GNOME Shell might allow local attackers to obtain sensitive information. Versions less than 3.34.5-r1 are affected.

tags | advisory, shell, local, info disclosure
systems | linux, gentoo
advisories | CVE-2020-17489
MD5 | 309e5318135523eb52d41ec01f1dface
Red Lion N-Tron 702-W / 702M12-W 2.0.26 XSS / CSRF / Shell
Posted Sep 3, 2020
Authored by T. Weber | Site sec-consult.com

Red Lion N-Tron 702-W and 702M12-W versions 2.0.26 and below suffer from cross site request forgery, hidden shell interface, cross site scripting and busybox vulnerabilities.

tags | exploit, shell, vulnerability, xss, csrf
advisories | CVE-2020-16204, CVE-2020-16206, CVE-2020-16208, CVE-2020-16210
MD5 | 0d2c4894db250550f69bf99d4b85cdbd
SiteMagic CMS 4.4.2 Shell Upload
Posted Sep 3, 2020
Authored by V1n1v131r4

SiteMagic CMS version 4.4.2 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
MD5 | 9b13334a85c32519bca21e7d26088a4b
Red Hat Security Advisory 2020-3592-01
Posted Sep 1, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-3592-01 - The bash packages provide Bash, which is the default shell for Red Hat Enterprise Linux.

tags | advisory, shell, bash
systems | linux, redhat
advisories | CVE-2019-9924
MD5 | 6866e5562af91fd7c2e0245ba478bbd0
CMS Made Simple 2.2.14 Shell Upload
Posted Aug 31, 2020
Authored by Luis Noriega

CMS Made Simple version 2.2.14 suffers from an authenticated remote shell upload vulnerability.

tags | exploit, remote, shell
MD5 | e2fb278aa541f2c08d1c82df912d2cc9
WordPress Autoptimize 2.7.6 Shell Upload
Posted Aug 28, 2020
Authored by SunCSR

WordPress Autoptimize plugin version 2.7.6 suffers from an authenticated remote shell upload vulnerability.

tags | exploit, remote, shell
MD5 | 07265bbb9062f5d7ecf6fa2ea1b61683
Ubuntu Security Notice USN-4464-1
Posted Aug 18, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4464-1 - It was discovered that GNOME Shell incorrectly handled the login screen password dialog. Sensitive information could possibly be exposed during user logout.

tags | advisory, shell
systems | linux, ubuntu
advisories | CVE-2020-17489
MD5 | 8745f9f5ffe60d4092fe96c7797d1064
Red Hat Security Advisory 2020-3474-01
Posted Aug 18, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-3474-01 - The bash packages provide Bash, which is the default shell for Red Hat Enterprise Linux.

tags | advisory, shell, bash
systems | linux, redhat
advisories | CVE-2019-9924
MD5 | b84476e366afe54f22aacc4f6034cd1d
CMS Made Simple 2.2.14 Shell Upload
Posted Aug 13, 2020
Authored by Roel van Beurden

CMS Made Simple version 2.2.14 suffers from an authenticated shell upload vulnerability.

tags | exploit, shell
MD5 | c88d34ecd4d1716eecd2778aa52e4bd3
Online Bike Rental 1.0 Shell Upload
Posted Aug 1, 2020
Authored by Bobby Cooke, hyd3sec

Online Bike Rental version 1.0 suffers from an authenticated remote shell upload vulnerability.

tags | exploit, remote, shell
MD5 | c24d92ba32b907f53df823c312feb8d2
Gentoo Linux Security Advisory 202007-63
Posted Jul 31, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202007-63 - Multiple vulnerabilities have been found in SNMP Trap Translator, the worst of which could allow attackers to execute arbitrary shell code. Versions less than 1.4.1 are affected.

tags | advisory, arbitrary, shell, vulnerability
systems | linux, gentoo
MD5 | 050446e49cdf58e9ef909a5278dbe5be
Online Bike Rental 1.0 Shell Upload
Posted Jul 31, 2020
Authored by hyd3sec

Online Bike Rental version 1.0 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
MD5 | 5137e92942eb565db42676669250675a
Koken CMS 0.22.24 Shell Upload
Posted Jul 27, 2020
Authored by V1n1v131r4

Koken CMS version 0.22.24 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
MD5 | 5b0592db7ea566f8f67175e561151e2f
Oracle Solaris 11 Device Driver Utility 1.3.1 Race Condition
Posted Jul 15, 2020
Authored by Larry W. Cashdollar

Oracle Solaris 11 Device Driver Utility version 1.3.1 suffers from an insecure use of /tmp that can allow for a race condition which leads to privilege escalation. Included exploit provides a root shell.

tags | exploit, shell, root
systems | solaris
advisories | CVE-2020-14724
MD5 | 0d782daa9cfb79ed229915dc519292a7
Pandora FMS 7.0 NG 7XX Remote Command Execution
Posted Jul 11, 2020
Authored by Fernando Catoira, Erik Wynter, Julio Sanchez | Site metasploit.com

This Metasploit module exploits a vulnerability (CVE-2020-13851) in Pandora FMS versions 7.0 NG 742, 7.0 NG 743, and 7.0 NG 744 (and perhaps older versions) in order to execute arbitrary commands. This module takes advantage of a command injection vulnerability in th e Events feature of Pandora FMS. This flaw allows users to execute arbitrary commands via the target parameter in HTTP POST requests to the Events function. After authenticating to the target, the module attempts to exploit this flaw by issuing such an HTTP POST request, with the target parameter set to contain the payload. If a shell is obtained, the module will try to obtain the local MySQL database password via a simple grep command on the plaintext /var/www/html/pandora_console/include/config.php file. Valid credentials for a Pandora FMS account are required. The account does not need to have admin privileges. This module has been successfully tested on Pandora 7.0 NG 744 running on CentOS 7 (the official virtual appliance ISO for this version).

tags | exploit, web, arbitrary, shell, local, php
systems | linux, centos
advisories | CVE-2020-13851
MD5 | f5291266eaebb8b290e3a0b7e6659455
F5 BIG-IP TMUI Directory Traversal / File Upload / Code Execution
Posted Jul 7, 2020
Authored by wvu, Mikhail Klyuchnikov | Site metasploit.com

This Metasploit module exploits a directory traversal in F5's BIG-IP Traffic Management User Interface (TMUI) to upload a shell script and execute it as the root user.

tags | exploit, shell, root
advisories | CVE-2020-5902
MD5 | bc9ef269b0fbd9bf35cb0c0f8d89b446
CDATA OLTs Backdoor / Privilege Escalation / Information Disclosure
Posted Jul 7, 2020
Authored by Pierre Kim

Various CDATA OLTs suffer from backdoor access with telnet, credential leaks, shell escape with root privileges, denial of service, and weak encryption algorithm vulnerabilities.

tags | exploit, denial of service, shell, root, vulnerability
MD5 | ef3e0aa364c3178ff74985235b1f0282
Bolt CMS 3.7.0 XSS / CSRF / Shell Upload
Posted Jul 3, 2020
Authored by Sivanesh Ashok

Bolt CMS versions 3.7.0 and below suffer from cross site request forgery, cross site scripting, and remote shell upload vulnerabilities that when combined can achieve remote code execution in one click.

tags | exploit, remote, shell, vulnerability, code execution, xss, csrf
advisories | CVE-2020-4040, CVE-2020-4041
MD5 | e1905dcd1353235ff99a9faf7ed545ef
Online Shopping Portal 3.1 SQL Injection / Shell Upload
Posted Jul 1, 2020
Authored by Umit Yalcin

Online Shopping Portal version 3.1 suffers from a remote SQL injection vulnerability that allows for authentication bypass as well as a shell upload.

tags | exploit, remote, shell, sql injection
MD5 | a413dd610290694b938f4df3d35a392d
Online Student Enrollment System 1.0 Shell Upload
Posted Jun 25, 2020
Authored by BKpatron, th3d1gger | Site metasploit.com

This Metasploit module exploits a cross site request forgery vulnerability in Online Student Enrollment System version 1.0 to perform a shell upload.

tags | exploit, shell, csrf
MD5 | 5b27f66c5ed24e68abd5443719b457a4
Arista Restricted Shell Escape / Privilege Escalation
Posted Jun 16, 2020
Authored by Chris Anders | Site metasploit.com

This Metasploit module takes advantage of a poorly configured TACACS+ config, Arista's bash shell, and a TACACS+ read-only account to achieve privilege escalation.

tags | exploit, shell, bash
advisories | CVE-2020-9015
MD5 | c89e5030f0dbb92c9b9a0aaee9be5226
Neon LMS Shell Upload
Posted Jun 16, 2020
Authored by th3d1gger | Site metasploit.com

This Metasploit module exploits a shell upload vulnerability in Neon LMS versions prior to 4.9.1.

tags | exploit, shell
MD5 | 26aa3aff8f77bd3458a0a09ac6e239c5
NeonLMS 4.6 Shell Upload
Posted Jun 6, 2020
Authored by th3d1gger

NeonLMS version 3.6 suffers from an authenticated remote shell upload vulnerability.

tags | exploit, remote, shell
MD5 | 2c01c097ed4377f370cef2cfdd6872fb
WordPress Drag And Drop Multi File Uploader Remote Code Execution
Posted Jun 4, 2020
Authored by h00die, Austin Martin | Site metasploit.com

This Metasploit module exploits a file upload feature of Drag and Drop Multi File Upload - Contact Form 7 for versions prior to 1.3.4. The allowed file extension list can be bypassed by appending a %, allowing for php shells to be uploaded. No authentication is required for exploitation.

tags | exploit, shell, php, file upload
advisories | CVE-2020-12800
MD5 | 8741d1320b67d5240a0da5c63f0f5065
Page 1 of 114
Back12345Next

File Archive:

September 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    20 Files
  • 2
    Sep 2nd
    15 Files
  • 3
    Sep 3rd
    15 Files
  • 4
    Sep 4th
    4 Files
  • 5
    Sep 5th
    1 Files
  • 6
    Sep 6th
    1 Files
  • 7
    Sep 7th
    15 Files
  • 8
    Sep 8th
    27 Files
  • 9
    Sep 9th
    7 Files
  • 10
    Sep 10th
    16 Files
  • 11
    Sep 11th
    9 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    25 Files
  • 15
    Sep 15th
    15 Files
  • 16
    Sep 16th
    15 Files
  • 17
    Sep 17th
    15 Files
  • 18
    Sep 18th
    12 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close