exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files from Ricardo Jose Ruiz Fernandez

Email addressricardojruiz93 at gmail.com
First Active2019-11-20
Last Active2023-03-17
Riello UPS Restricted Shell Bypass
Posted Mar 17, 2023
Authored by Ricardo Jose Ruiz Fernandez

Riello UPS systems can have their restricted configuration shell bypassed to gain full underlying operating system access.

tags | exploit, shell, bypass
SHA-256 | 6ef7e8370834a1f65507385ad2f9fb981e57f39aa18bf52ca3a727aaa3955839
10-Strike Network Inventory Explorer 9.3 Buffer Overflow
Posted Aug 23, 2022
Authored by Ricardo Jose Ruiz Fernandez

10-Strike Network Inventory Explorer versions 9.3 and below are vulnerable to a SEH based buffer overflow which leads to code execution or local privilege escalation. The vulnerable part of the program is the functionality to add computers from a text file.

tags | exploit, overflow, local, code execution
SHA-256 | 1dff0a8ce3b87274d21f80b9363b6ad6aff3966452e9561847b4d6b7d6caeac4
Zenitel AlphaCom XE Audio Server 11.2.3.10 Shell Upload
Posted Sep 15, 2021
Authored by Ricardo Jose Ruiz Fernandez

Remote command execution exploit for Zenitel AlphaCom XE Audio Server versions up to 11.2.3.10 which have a web interface called AlphaWeb XE that allows for a remote shell upload.

tags | exploit, remote, web, shell
advisories | CVE-2021-40845
SHA-256 | 74d530912782b4d1135f22f7bda97ec701c5233933221a5a7b8aa9b09cd95217
Zenitel AlphaCom XE Audio Server 11.2.3.10 Shell Upload
Posted Sep 14, 2021
Authored by Ricardo Jose Ruiz Fernandez

Zenitel AlphaCom XE Audio Server versions up to 11.2.3.10 have a web interface called AlphaWeb XE that allows for a remote shell upload.

tags | exploit, remote, web, shell
advisories | CVE-2021-40845
SHA-256 | db3e0721685ee34c318d514cffb76f972c85d297a6080f1d2a9693cb1d01d628
Zoho ManageEngine ServiceDesk Plus 9.4 User Enumeration
Posted Jun 17, 2021
Authored by Ricardo Jose Ruiz Fernandez

Zoho ManageEngine ServiceDesk Plus version 9.4 suffers from a user enumeration vulnerability.

tags | exploit
advisories | CVE-2021-31159
SHA-256 | 870a1afb9f1433380867e92d6f4b12a310e6ee87a00b11040bf6cfbd0e03d858
Textpattern CMS 4.8.3 Remote Code Execution
Posted Mar 4, 2021
Authored by Ricardo Jose Ruiz Fernandez

Textpattern CMS version 4.8.3 remote code execution exploit.

tags | exploit, remote, code execution
SHA-256 | 5d72f66d478a2984ca653c4a364a7b05f0376f43326f5771233c541c2b4d625f
Online Marriage Registration System 1.0 Remote Code Execution
Posted Feb 11, 2021
Authored by Ricardo Jose Ruiz Fernandez

Online Marriage Registration System (OMRS) version 1.0 remote code execution exploit. Original discovery of remote code execution in this version was discovered by Selim Enes Karaduman in June of 2020.

tags | exploit, remote, code execution
SHA-256 | 0b988c57a1f19668b972345f07ad174bcbd8fba23062032536f90e7035468ee9
Jalios JCMS 10 Backdoor Account / Authentication Bypass
Posted Nov 20, 2019
Authored by Ricardo Jose Ruiz Fernandez

Jalios JCMS 10 allows attackers to access any part of the website and the WebDAV server with administrative privileges via a backdoor account using any username and a specific password.

tags | advisory
advisories | CVE-2019-19033
SHA-256 | 4829f8ae23e18fce86bba81501fecaf37b995626d52f739665df9e76cff8be4a
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close