This Metasploit module exploits a file upload vulnerability in D-Link DCS-931L network cameras. The setFileUpload functionality allows authenticated users to upload files to anywhere on the file system, allowing system files to be overwritten, resulting in execution of arbitrary commands. This Metasploit module has been tested successfully on a D-Link DCS-931L with firmware versions 1.01_B7 (2013-04-19) and 1.04_B1 (2014-04-21). D-Link DCS-930L, DCS-932L, DCS-933L models are also reportedly affected, but untested.
c85dbfd5bafc99162dc8561e5db898e4cfbb36756d3c4d4763c20bae09a13a20
Ubuntu 14.04 LTS and 15.10 overlayfs local root exploit.
1bf1b95880d7fb521bfe0cf76bb75801961ebb5f6b4b91508407ee6bad1b5076
OpenMRS Reporting module version 0.9.7 suffers from a remote code execution vulnerability.
fd199e31ee21d75296c0e641c82e2410d535f732c41273661857d2b2cf265376
Crony Cronjob Manager version 0.4.4 suffers from cross site request forgery and cross site scripting vulnerabilities.
40f08717147b07e300976954e8bb769e26619e5ee6ca1f2fb45f885e488bc9b7
MediaAccess TG788vn with Cisco HTTP firewall suffers from a file disclosure vulnerability.
3508c9984669fb8f79164dbade4b23db42f5eb4197791cd736568c4ebef5a055
151 bytes small TCP reverse shell with password prompt shellcode.
d8c504e589fd31d7ee0a0eb6d9fd5e95361c2c7780febf4c0b2c76505b3586bd