Exploit the possiblities
Showing 101 - 125 of 2,561 RSS Feed

Shell Files

Observium Remote Command Execution
Posted Nov 11, 2016
Site computest.nl

During a recent penetration test Computest found and exploited various issues in Observium, going from unauthenticated user to full shell access as root.

tags | advisory, shell, root
MD5 | f3ac229c071c2690f48c6b8bdf0de332
sNews CMS 1.7 Shell Upload
Posted Nov 4, 2016
Authored by Amir.ght

sNews CMS version 1.7 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
MD5 | ee618399e9a431071cc85bdaefae0a91
TrendMicro InterScan Web Security Virtual Appliance Shellshock
Posted Oct 22, 2016
Authored by Hacker Fantastic

TrendMicro InterScan Web Security Virtual Appliance remote code execution exploit that leverages the shellshock vulnerability to spawn a connect-back shell. TrendMicro has contacted Packet Storm and provided the following link with patch information: <a href="https://success.trendmicro.com/solution/1105233">https://success.trendmicro.com/solution/1105233</a>

tags | exploit, remote, web, shell, code execution
advisories | CVE-2014-6271
MD5 | 024456ad9c32bbf192f9b2a8604a853e
PizzaInn Beta 3 specials-exec.php Shell Upload
Posted Oct 20, 2016
Authored by Nassim Asrir

PizzaInn version Beta 3 suffers from a remote shell upload vulnerability in specials-exec.php.

tags | exploit, remote, shell, php
MD5 | 47beba4494e98a05ef73762e61d83e24
CNDSOFT 2.3 Cross Site Request Forgery / Shell Upload
Posted Oct 20, 2016
Authored by Besim

CNDSOFT version 2.3 suffers from cross site request forgery and remote shell upload vulnerabilities.

tags | exploit, remote, shell, vulnerability, file upload, csrf
MD5 | 38118e0e98ba2462b18cd31e9c504cca
CloudShare 1.6 Shell Upload
Posted Oct 19, 2016
Authored by indoushka

CloudShare version 1.6 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
MD5 | bf1245fb3713d11a5b556e508d980e8d
HP Client Automation 7.9 Command Injection
Posted Oct 10, 2016
Authored by slidingwindow0xff

HP Client Automation remote command injection exploit that adds backdoor accounts and provides a reverse shell. Author tested on version 7.9 but believes it should also work on 8.1, 9.0, and 9.1.

tags | exploit, remote, shell
advisories | CVE-2015-1497
MD5 | 67ab6e5588817394db2e3d945fd4c7e5
Red Hat Security Advisory 2016-1996-01
Posted Oct 4, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1996-01 - Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller framework for web application development. Action Pack implements the controller and the view components. An input validation flaw was found in the way CloudForms regular expressions were passed to the expression engine via the JSON API and the web-based UI. A user with the ability to view collections and filter them could use this flaw to execute arbitrary shell commands on the host with the privileges of the CloudForms process.

tags | advisory, web, arbitrary, shell, ruby
systems | linux, redhat
advisories | CVE-2016-7040
MD5 | 0a76737b20bd23fd5da5a8e13dee366d
Cisco Security Advisory 20160928-aaados
Posted Sep 29, 2016
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - A vulnerability in the Authentication, Authorization, and Accounting (AAA) service for remote Secure Shell Host (SSH) connections to the device for Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to cause the vulnerable device to reload. The vulnerability is due to an error log message when a remote SSH connection to the device fails AAA authentication. An attacker could exploit this vulnerability by attempting to authenticate to the targeted device. An exploit could allow the attacker to cause a denial of service (DoS) condition. Cisco has released software updates that address this vulnerability. There is a workaround that addresses this vulnerability.

tags | advisory, remote, denial of service, shell
systems | cisco, osx
MD5 | f9cb5fe12bc2121506a1c0c12892f28d
Android Stagefright MP4 tx3g Integer Overflow
Posted Sep 27, 2016
Authored by jduck, NorthBit | Site metasploit.com

This Metasploit module exploits a integer overflow vulnerability in the Stagefright Library (libstagefright.so). The vulnerability occurs when parsing specially crafted MP4 files. While a wide variety of remote attack vectors exist, this particular exploit is designed to work within an HTML5 compliant browser. Exploitation is done by supplying a specially crafted MP4 file with two tx3g atoms that, when their sizes are summed, cause an integer overflow when processing the second atom. As a result, a temporary buffer is allocated with insufficient size and a memcpy call leads to a heap overflow. This version of the exploit uses a two-stage information leak based on corrupting the MetaData that the browser reads from mediaserver. This method is based on a technique published in NorthBit's Metaphor paper. First, we use a variant of their technique to read the address of a heap buffer located adjacent to a SampleIterator object as the video HTML element's videoHeight. Next, we read the vtable pointer from an empty Vector within the SampleIterator object using the video element's duration. This gives us a code address that we can use to determine the base address of libstagefright and construct a ROP chain dynamically. NOTE: the mediaserver process on many Android devices (Nexus, for example) is constrained by SELinux and thus cannot use the execve system call. To avoid this problem, the original exploit uses a kernel exploit payload that disables SELinux and spawns a shell as root. Work is underway to make the framework more amenable to these types of situations. Until that work is complete, this exploit will only yield a shell on devices without SELinux or with SELinux in permissive mode.

tags | exploit, remote, overflow, shell, kernel, root
advisories | CVE-2015-3864
MD5 | 057a5f7427ec278d6c1be05309a18c30
Metasploit Web UI Diagnostic Console Command Execution
Posted Sep 22, 2016
Authored by Justin Steven | Site metasploit.com

This Metasploit module exploits the "diagnostic console" feature in the Metasploit Web UI to obtain a reverse shell. The diagnostic console is able to be enabled or disabled by an administrator on Metasploit Pro and by an authenticated user on Metasploit Express and Metasploit Community. When enabled, the diagnostic console provides access to msfconsole via the web interface. An authenticated user can then use the console to execute shell commands. NOTE: Valid credentials are required for this module. Tested against: Metasploit Community 4.1.0, Metasploit Community 4.8.2, Metasploit Community 4.12.0

tags | exploit, web, shell
MD5 | f55eac7067e3f61f0a0d73859d65082b
WordPress Neosense Theme 1.7 Shell Upload
Posted Sep 19, 2016
Authored by Walter Hop

WordPress Neosense theme version 1.7 suffers from a remote shell upload vulnerability.

tags | advisory, remote, shell
MD5 | f2ba5d09e06ff571c9fdd1a1f2317297
ZooKeeper 3.4.8 / 3.5.2 Buffer Overflow
Posted Sep 16, 2016
Authored by Lyon Yang

ZooKeeper versions 3.4.0 through 3.4.8 and 3.5.0 through 3.5.2 suffer from a buffer overflow vulnerability. This affects the ZooKeeper C client shells cli_st and cli_mt.

tags | advisory, overflow, shell
advisories | CVE-2016-5017
MD5 | 7dd2e27bd61e0307cd441984a0c91fc0
Bezaat Script 2 Shell Upload
Posted Sep 15, 2016
Authored by xBADGIRL21

Bezaat Script version 2 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
MD5 | 0973270c9beb31b7fe96b3871889d8d3
Windows x86 Password Protected TCP Bind Shell
Posted Sep 13, 2016
Authored by Roziul Hasan Khan Shifat

637 bytes small Microsoft Windows x86 password protect TCP bind shell shellcode.

tags | shell, x86, tcp, shellcode
systems | windows
MD5 | 44673d888c74d09fc997b10a17a7957e
Windows x86 TCP Bind Shell Shellcode
Posted Sep 8, 2016
Authored by Roziul Hasan Khan Shifat

Microsoft Windows x86 TCP bind shell shellcode.

tags | shell, x86, tcp, shellcode
systems | windows
MD5 | 81ca9b2fe7691f52ad5a45f10902c82e
Windows x86 Persistent Reverse TCP Shell Shellcode
Posted Sep 5, 2016
Authored by Roziul Hasan Khan Shifat

494 bytes small Microsoft Windows x86 persistent reverse TCP shell shellcode.

tags | shell, x86, tcp, shellcode
systems | windows
MD5 | cba8ff21939e5ed42a7ac164c813babc
HelpDeskz 1.0.2 Shell Upload
Posted Aug 29, 2016
Authored by Lars Morgenroth

HelpDeskz versions 1.0.2 and below suffer from a remote, unauthenticated shell upload vulnerability.

tags | exploit, remote, shell
MD5 | 1bffc0d2e7cd410e95ce8f3f601f1643
Dotclear 2.9.1 Shell Upload
Posted Aug 25, 2016
Authored by Wiswat Aswamenakul

Dotclear version 2.9.1 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell, bypass
MD5 | 0dc55b44729f1bf8db31a659479c8849
Actiontec T2200H Remote Reverse Root Shell
Posted Aug 16, 2016
Authored by Andrew Klaus

Actiontec T2200H allows for command injection that provides a remote root reverse shell.

tags | exploit, remote, shell, root
MD5 | 9489a774d63572ecee9b06a196dac3fd
WordPress Theme Directory 2.0.16 Shell Upload
Posted Aug 16, 2016
Authored by xBADGIRL21

WordPress Theme Directory versions 2.0.14 through 2.0.16 suffer from a remote shell upload vulnerability.

tags | exploit, remote, shell
MD5 | 12c674782470cc0ea3d087ab1071ed1c
WordPress Tevolution 2.3.1 Shell Upload
Posted Aug 16, 2016
Authored by xBADGIRL21

WordPress Tevolution plugin version 2.3.1 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
MD5 | bd5546300fd195e876e792fe8e2a2560
Linux/x86 zsh TCP Bind Shell Port 9090
Posted Aug 12, 2016
Authored by thryb

96 bytes small Linux/x86 zsh TCP bind shell shellcode that binds to port 9090.

tags | shell, x86, tcp, shellcode
systems | linux
MD5 | 974564dfff1d7a2ae4a509fc7bb6815d
NUUO 3.0.8 strong_user.php Backdoor Remote Shell Access
Posted Aug 6, 2016
Authored by LiquidWorm | Site zeroscience.mk

NUUO NVRmini, NVRmini2, Crystal and NVRSolo devices have a hidden PHP script that when called, a backdoor user is created with poweruser privileges that is able to read and write files on the affected device. The backdoor user 'bbb' when created with the password '111111' by visiting 'strong_user.php' script is able to initiate a secure shell session and further steal and/or destroy sensitive information.

tags | exploit, shell, php
MD5 | 9e5ca7496b9bacd01a8225e0787a09ee
NUUO NVRmini 2 NE-4160 ShellShock Remote Code Execution
Posted Aug 6, 2016
Authored by LiquidWorm | Site zeroscience.mk

NUUO NVRmini, NVRmini2, Crystal, NVRSolo suffer from an authenticated ShellShock vulnerability. This could allow an attacker to gain control over a targeted computer if exploited successfully. The vulnerability affects Bash, a common component known as a shell that appears in many versions of Linux and Unix.

tags | exploit, shell, bash
systems | linux, unix
MD5 | bb960d175fc981dc81fdb39cbdef56df
Page 5 of 103
Back34567Next

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    4 Files
  • 19
    Nov 19th
    2 Files
  • 20
    Nov 20th
    9 Files
  • 21
    Nov 21st
    14 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close