ePrivacy and GPDR Cookie Consent by Cookie Consentupload – Digitalmunition




Browsing the "upload" Tag

Hyland OnBase Arbitrary File Upload ≈ Packet Storm

September 11th, 2020 📆 | 1828 Views ⚑

CVSSv3.1 Score ————————————————- AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N Vendor ————————————————- Hyland Software – (https://www.hyland.com/en/andhttps://www.onbase.com/en/) Product ————————————————- Hyland OnBase All derivatives based on OnBase Versions

Tagged with:




Joomla GMapFP J3.5 / J3.5F Arbitrary File Upload ≈ Packet Storm

September 8th, 2020 📆 | 6259 Views ⚑

# Exploit Title: Joomla! Component GMapFP J3.5/J3.5F – Unauthenticated Arbitrary File Upload# Google Dork: inurl:”com_gmapfp”# Date: 2020-03-27# Exploit Author: ThelastVvV#

Tagged with:




flatCore CMS 1.5.5 Cross Site Scripting / Arbitrary File Upload ≈ Packet Storm

August 12th, 2020 📆 | 4104 Views ⚑

SEC Consult Vulnerability Lab Security Advisory < 20200807-0 >=======================================================================title: Multiple Vulnerabilitiesproduct: flatCore CMSvulnerable version: < =1.5.5fixed version: 1.5.7CVE number: –impact:

Tagged with:




Baldr Botnet Panel Shell Upload ≈ Packet Storm

July 30th, 2020 📆 | 4769 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRankinginclude Msf::Exploit::FileDropperinclude Msf::Exploit::Remote::HttpClientprepend Msf::Exploit::Remote::AutoCheck def initialize(info

Tagged with:




Socket.io-file 2.0.31 Arbitrary File Upload ≈ Packet Storm

July 28th, 2020 📆 | 3419 Views ⚑

# Exploit Title: Socket.io-file 2.0.31 – Arbitrary File Upload# Date: 2020-07-02# Exploit Author: Cr0wTom# Vendor Homepage: https://www.npmjs.com/package/socket.io-file# Software Link: https://www.npmjs.com/package/socket.io-file/v/2.0.31#

Tagged with:




WonderCMS 3.1.0 XSS / Directory Traversal / File Upload ≈ Packet Storm

July 17th, 2020 📆 | 6779 Views ⚑

SEC Consult Vulnerability Lab Security Advisory < 20200717-0 >=======================================================================title: Multiple Vulnerabilitiesproduct: WonderCMSvulnerable version: < =3.1.0fixed version: –CVE number: –impact: Highhomepage:

Tagged with:




Webtareas 2.1 / 2.1p File Upload / Information Disclosure ≈ Packet Storm

July 9th, 2020 📆 | 5969 Views ⚑

#Authenticated File Upload vulnerability#Author: AppleBois#Homepage: https://sourceforge.net/projects/webtareas/#Affected Version: 2.1 && 2.1p#Vendors Claim there’s a patch on 2.1p but it’s vulnerable and

Tagged with:




F5 BIG-IP TMUI Directory Traversal / File Upload / Code Execution ≈ Packet Storm

July 8th, 2020 📆 | 4956 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking prepend Msf::Exploit::Remote::AutoCheckinclude Msf::Exploit::Remote::HttpClientinclude Msf::Exploit::CmdStagerinclude

Tagged with:




Bolt CMS 3.7.0 XSS / CSRF / Shell Upload ≈ Packet Storm

July 4th, 2020 📆 | 7934 Views ⚑

########################################################################### Bolt CMS < = 3.7.0 Multiple Vulnerabilities ########################################################################### Author – Sivanesh Ashok | @sivaneshashok | stazot.com Date : 2020-03-24Vendor

Tagged with:




Online Shopping Portal 3.1 SQL Injection / Shell Upload ≈ Packet Storm

July 2nd, 2020 📆 | 3394 Views ⚑

# Exploit Title: Online Shopping Portal 3.1 – Authentication Bypass# Date: 2020-06-25# Exploit Author: Ümit Yalçın# Vendor Homepage: https://phpgurukul.com/shopping-portal-free-download/# Version:

Tagged with:




Online Student Enrollment System 1.0 Shell Upload ≈ Packet Storm

June 26th, 2020 📆 | 7500 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require ‘msf/core’require “net/http”require “uri”require ‘nokogiri’ class MetasploitModule < Msf::ExploitRank = ExcellentRanking include

Tagged with: