exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 151 - 175 of 3,252 RSS Feed

Shell Files

Planet eStream Code Execution / SQL Injection / XSS / Broken Control
Posted Dec 9, 2022
Authored by Philipp Espernberger, Timon Vogel, Hrvoje Filakovic | Site sec-consult.com

Planet eStream versions prior to 6.72.10.07 suffer from shell upload, account takeover, broken access control, SQL injection, both persistent and reflective cross site scripting, path traversal, and information disclosure vulnerabilities.

tags | exploit, shell, vulnerability, xss, sql injection, info disclosure
advisories | CVE-2022-45889, CVE-2022-45890, CVE-2022-45891, CVE-2022-45892, CVE-2022-45893, CVE-2022-45894, CVE-2022-45895, CVE-2022-45896
SHA-256 | 0dca96db49c3aae632e40d6b29c30d32088f3d7c6667b64b954a6a6345dcc625
Red Hat Security Advisory 2022-8872-01
Posted Dec 8, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-8872-01 - An update for python-django20 is now available for Red Hat OpenStack Platform 16.1.9 (Train) for Red Hat Enterprise Linux (RHEL) 8.2. Issues addressed include cross site scripting, denial of service, remote shell upload, and remote SQL injection vulnerabilities.

tags | advisory, remote, denial of service, shell, vulnerability, xss, sql injection, python
systems | linux, redhat
advisories | CVE-2022-22818, CVE-2022-23833, CVE-2022-28346
SHA-256 | e5e7d087bfcb84b64424f6f5ba3f374d1774f83da6dd2bb3d702e487b2cbd58b
Red Hat Security Advisory 2022-8863-01
Posted Dec 8, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-8863-01 - Paramiko is a module for python 2.3 or greater that implements the SSH2 protocol for secure connections to remote machines. Unlike SSL, the SSH2 protocol does not require heirarchical certificates signed by a powerful central authority. You may know SSH2 as the protocol that replaced telnet and rsh for secure access to remote shells, but the protocol also includes the ability to open arbitrary channels to remote services across an encrypted tunnel.

tags | advisory, remote, arbitrary, shell, protocol, python
systems | linux, redhat
advisories | CVE-2022-24302
SHA-256 | 59534817e9e5c4ed208e21817cc8d384718759ee9feaec332ee49ea7ba65f1b5
Red Hat Security Advisory 2022-8845-01
Posted Dec 8, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-8845-01 - Paramiko is a module for python 2.3 or greater that implements the SSH2 protocol for secure connections to remote machines. Unlike SSL, the SSH2 protocol does not require heirarchical certificates signed by a powerful central authority. You may know SSH2 as the protocol that replaced telnet and rsh for secure access to remote shells, but the protocol also includes the ability to open arbitrary channels to remote services across an encrypted tunnel.

tags | advisory, remote, arbitrary, shell, protocol, python
systems | linux, redhat
advisories | CVE-2022-24302
SHA-256 | a6a2060126d1be99be2aca8297f1257ee4619fcacb1e48e24b430da0c6b1eb8c
Roxy Fileman 1.4.6 Remote Shell Upload
Posted Nov 21, 2022
Authored by Hadi Mene

Roxy Fileman versions 1.4.6 and below remote shell upload proof of concept exploit.

tags | exploit, remote, shell, proof of concept, file upload
advisories | CVE-2022-40797
SHA-256 | 16a9c59173c82b869a340397a5e68377531e0e0f9be9781793142e4f47786e1b
FLIR AX8 1.46.16 Remote Command Injection
Posted Nov 2, 2022
Authored by Samy Younsi, Thomas Knudsen, h00die-gr3y | Site metasploit.com

All FLIR AX8 thermal sensor cameras versions up to and including 1.46.16 are vulnerable to remote command injection. This can be exploited to inject and execute arbitrary shell commands as the root user through the id HTTP POST parameter in the res.php endpoint. This module uses the vulnerability to upload and execute payloads gaining root privileges.

tags | exploit, remote, web, arbitrary, shell, root, php
advisories | CVE-2022-37061
SHA-256 | a321cd3e8960e684cbab1cd82bb0f9be0cda474af87c57e7f89fa9aaa83b6bca
Zimbra Privilege Escalation
Posted Oct 19, 2022
Authored by Ron Bowes, EvergreenCartoons | Site metasploit.com

This Metasploit module exploits a vulnerable sudo configuration that permits the Zimbra user to execute postfix as root. In turn, postfix can execute arbitrary shellscripts, which means it can execute a root shell.

tags | exploit, arbitrary, shell, root
advisories | CVE-2022-3569
SHA-256 | 60ec0dcab5b58dbebac7ed6c99c5cf1fb52f76e5b1a5f3723089e823fc252948
pfSense pfBlockerNG 2.1.4_26 Shell Upload
Posted Oct 17, 2022
Authored by IHTeam, jheysel-r7 | Site metasploit.com

This Metasploit module leverages a remote shell upload vulnerability in pfSense pfBlockerNG plugin versions 2.1.4_26 and below. Note that version 3.x is unaffected.

tags | exploit, remote, shell
advisories | CVE-2022-31814
SHA-256 | 4189e967b6b81ffffd850d9ece99fb550a29985985f2bcf2dcb9de105fffe02c
Web Based Student Clearance 1.0 Shell Upload
Posted Oct 10, 2022
Authored by Akash Pandey

Web Based Student Clearance version 1.0 suffers from a remote shell upload vulnerability.

tags | exploit, remote, web, shell
advisories | CVE-2022-3436
SHA-256 | ac7df912113c209e4aa92b944d9b94db3f34c974d4195900b8a821b928f931f6
WordPress Elementor 3.6.2 Shell Upload
Posted Oct 4, 2022
Authored by h00die, Ramuel Gall, AkuCyberSec | Site metasploit.com

WordPress Elementor plugin versions 3.6.0 through 3.6.2 suffer from a remote shell upload vulnerability. This is achieved by sending a request to install Elementor Pro from a user supplied zip file. Any user with Subscriber or more permissions is able to execute this.

tags | exploit, remote, shell
advisories | CVE-2022-1329
SHA-256 | 0537a61d8c7e168ee93f25ae88cc62b13741cb186c02291ebc2f946f834cd81f
GuppY CMS 6.00.10 Shell Upload
Posted Oct 1, 2022
Authored by Chokri Hammedi

GuppY CMS version 6.00.10 suffers from an authenticated remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 7379f5703f8c8447e89b8393459ce54d04deb30eed715a6df6b281a1b380609b
Debian Security Advisory 5229-1
Posted Sep 28, 2022
Authored by Debian | Site debian.org

Debian Linux Security Advisory 5229-1 - Two vulnerabilities were discovered in FreeCAD, a CAD/CAM program, which could result in the execution of arbitrary shell commands when opening a malformed file.

tags | advisory, arbitrary, shell, vulnerability
systems | linux, debian
advisories | CVE-2021-45844, CVE-2021-45845
SHA-256 | e221b714aa252c043fe261bba268b9bb76b8a4565c7895307eb7ff13412d67b8
Debian Security Advisory 5234-1
Posted Sep 28, 2022
Authored by Debian | Site debian.org

Debian Linux Security Advisory 5234-1 - An arbitrary code execution vulnerability was disovered in fish, a command line shell. When using the default configuraton of fish, changing to a directory automatically ran `git` commands in order to display information about the current repository in the prompt. Such repositories can contain per-repository configuration that change the behavior of git, including running arbitrary commands.

tags | advisory, arbitrary, shell, code execution
systems | linux, debian
advisories | CVE-2022-20001
SHA-256 | d6134612ed2eb603546e00e78930c6db0692023b8724bb62b9827ee351491ec4
Debian Security Advisory 5242-1
Posted Sep 28, 2022
Authored by Debian | Site debian.org

Debian Linux Security Advisory 5242-1 - It was discovered that the Commandline class in maven-shared-utils, a collection of various utility classes for the Maven build system, can emit double-quoted strings without proper escaping, allowing shell injection attacks.

tags | advisory, shell
systems | linux, debian
advisories | CVE-2022-29599
SHA-256 | 84714da50549cd80b4994a0222f28c86342b8b85cee2cb07fc540a8b7d3eba9b
Online Diagnostic Lab Management System 1.0 SQL Injection / Shell Upload
Posted Sep 26, 2022
Authored by Yousef Alraddadi

Online Diagnostic Lab Management System version 1.0 remote exploit that bypasses login with SQL injection and then uploads a shell.

tags | exploit, remote, shell, sql injection, bypass
SHA-256 | a9a666adc9b5791a812164167d20c4ced022f91eed35188667143b4e7b0ee94e
pfBlockerNG 2.1.4_26 Shell Upload
Posted Sep 26, 2022
Authored by IHTeam

pfBlockerNG version 2.1.4_26 unauthenticated remote shell upload exploit.

tags | exploit, remote, shell
SHA-256 | 1d7eee5bc1593b474c54a3d280da28d67551d6ae08d22fa5a7a679595e50b007
VIAVIWEB Wallpaper Admin SQL Injection / Shell Upload
Posted Sep 19, 2022
Authored by Edd13Mora

VIAVIWEB Wallpaper Admin suffers from remote shell upload and remote SQL injection vulnerabilities.

tags | exploit, remote, shell, vulnerability, sql injection
SHA-256 | 2adfb8f70f50742a66bf5ad5b7a1bccff06637cf13ee52a9534547c07ead30ed
Academy Learning Management System 5.7 Shell Upload
Posted Sep 13, 2022
Authored by th3d1gger

Academy Learning Management System version 5.7 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 8f5ea1ed03e514169afbef198fca84d3a923d2ba76402fc2c21d5c8fce52443a
Rocket LMS 1.6 Shell Upload
Posted Sep 13, 2022
Authored by th3d1gger

Rocket LMS version 1.6 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | e2684a4c3d7870e561b03625a565e5e6160ae406c842cde5968d1ac67eb2ffa3
Infix LMS 4.3.0 Shell Upload
Posted Sep 12, 2022
Authored by th3d1gger

Infix LMS version 4.3.0 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | b9fb1eb73b48a203ba61020ca1bc27e9a98b348e216dac02454c0283feade433
Cisco ASA-X With FirePOWER Services Authenticated Command Injection
Posted Sep 5, 2022
Authored by jbaines-r7 | Site metasploit.com

This Metasploit module exploits an authenticated command injection vulnerability affecting Cisco ASA-X with FirePOWER Services. This exploit is executed through the ASA's ASDM web server and lands in the FirePower Services SFR module's Linux virtual machine as the root user. Access to the virtual machine allows the attacker to pivot to the inside network, and access the outside network. Also, the SFR virtual machine is running snort on the traffic flowing through the ASA, so the attacker should have access to this diverted traffic as well. This module requires ASDM credentials in order to traverse the ASDM interface. A similar attack can be performed via Cisco CLI (over SSH), although that isn't implemented here. Finally, it's worth noting that this attack bypasses the affects of the lockdown-sensor command (e.g. the virtual machine's bash shell shouldn't be available but this attack makes it available). Cisco assigned this issue CVE-2022-20828. The issue affects all Cisco ASA that support the ASA FirePOWER module (at least Cisco ASA-X with FirePOWER Service, and Cisco ISA 3000). The vulnerability has been patched in ASA FirePOWER module versions 6.2.3.19, 6.4.0.15, 6.6.7, and 7.0.21. The following versions will receive no patch: 6.2.2 and earlier, 6.3.*, 6.5.*, and 6.7.*.

tags | exploit, web, shell, root, bash
systems | cisco, linux
advisories | CVE-2022-20828
SHA-256 | 68e16d3ce86c6321808a38fd985d56e82e3e74f93b1ebe13be653fa09e00432e
Zyxel Firewall SUID Binary Privilege Escalation
Posted Aug 31, 2022
Authored by jbaines-r7 | Site metasploit.com

This Metasploit module exploits CVE-2022-30526, a local privilege escalation vulnerability that allows a low privileged user (e.g. nobody) escalate to root. The issue stems from a suid binary that allows all users to copy files as root. This module overwrites the firewall's crontab to execute an attacker provided script, resulting in code execution as root. In order to use this module, the attacker must first establish shell access. For example, by exploiting CVE-2022-30525. Known affected Zyxel models include USG FLEX (50, 50W, 100W, 200, 500, 700), ATP (100, 200, 500, 700, 800), VPN (50, 100, 300, 1000), USG20-VPN and USG20W-VPN.

tags | exploit, shell, local, root, code execution
advisories | CVE-2022-30526
SHA-256 | ce0978f09bdc4f825505d8590e1f429b3ba8069c5e7e83d2268b514b437133c9
Hacking Zyxel IP Cameras To Get A Root Shell
Posted Aug 17, 2022
Authored by Eric Urban | Site hydrogen18.com

This paper is an in-depth blog post on hacking Zyxel IP cameras to obtain a root shell.

tags | paper, shell, root
SHA-256 | b1c1d5af6bd2b118ab3a1c720fe41a27cfec41885c4cf555570f4e8a14d7f78b
Gigaland NFT Marketplace 1.9 Shell Upload / Key Disclosure
Posted Aug 15, 2022
Authored by Sohel Yousef

Gigaland NFT Marketplace version 1.9 suffers from remote shell upload and ETH private key disclosure vulnerabilities.

tags | exploit, remote, shell, vulnerability, info disclosure
SHA-256 | ce98bcba1114e91aa9e9ba66766075c6356a782f55f6b972328c6840eadf1713
Gas Agency Management 2022 SQL Injection / XSS / Shell Upload
Posted Aug 12, 2022
Authored by nu11secur1ty

Gas Agency Management 2022 suffers from cross site scripting, remote SQL injection, and remote shell upload vulnerabilities.

tags | exploit, remote, shell, vulnerability, xss, sql injection
SHA-256 | fbd80e45f29f9c744b81fc81cb49905ea0ee4dbf9f49738b949c8e75caba6e49
Page 7 of 131
Back56789Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close