exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files from Daniel Monzon

First Active2020-01-31
Last Active2022-01-05
Vodafone H-500-s 3.5.10 WiFi Password Disclosure
Posted Jan 5, 2022
Authored by Daniel Monzon

Vodafone H-500-s version 3.5.10 suffers from a wifi password disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | 141bb2c0b6895ca188f6be64c7802d296621286ca56799588453acf04705218e
SEO Panel 4.6.0 Remote Code Execution
Posted Oct 12, 2020
Authored by Daniel Monzon, Kiko Andreu

SEO Panel version 4.6.0 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | b7fdbfc990d758f4c465bfe8ee4722f434a0df23c71e4e01dbc978e0b84b8305
ZenTao Pro 8.8.2 Remote Code Execution
Posted Jul 22, 2020
Authored by Daniel Monzon, Erik Wynter, Melvin Boers | Site metasploit.com

This Metasploit module exploits a command injection vulnerability in ZenTao Pro 8.8.2 and earlier versions in order to execute arbitrary commands with SYSTEM privileges. Valid credentials for a ZenTao admin account are required. This module has been successfully tested against ZenTao 8.8.1 and 8.8.2 running on Windows 10 (XAMPP server).

tags | exploit, arbitrary
systems | windows
advisories | CVE-2020-7361
SHA-256 | 191b945627084957824fcc0caf7eb0edfafb74b14433e38de0cb21c995667b52
ZenTao Pro 8.8.2 Command Injection
Posted Jul 3, 2020
Authored by Daniel Monzon, Melvin Boers

ZenTao Pro version 8.8.2 suffers from a remote command injection vulnerability.

tags | exploit, remote
SHA-256 | 88047021ac7e39af78404eaf3bc03d029ca987e039a286560260a125bbf65e1f
OpenEDX Ironwood 2.5 Remote Code Execution
Posted May 20, 2020
Authored by Daniel Monzon

OpenEDX platform Ironwood version 2.5 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2020-13144
SHA-256 | 7a54e38627d6ca731048e6e1fe6e6741c718fa2f3cd5f6374e5ad4c2c7cf6dd0
Online Healthcare Patient Record Management System 1.0 SQL Injection
Posted May 18, 2020
Authored by Daniel Monzon

Online Healthcare Patient Record Management System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 0639d828a1081e369c71ca99163da888fc17e3c66874a56c8ed1b6b3f6ff0932
Online Course Registration 2.0 SQL Injection
Posted Apr 27, 2020
Authored by Daniel Monzon

Online Course Registration 2.0 suffers from authentication bypass and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 26afb62846a4c92f004b9a7cac3b03d936d7e88b0188192473b7c8520d10e860
WordPress Media Library Assistant 2.81 Local File Inclusion
Posted Apr 13, 2020
Authored by Daniel Monzon

WordPress Media Library Assistant plugin version 2.81 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 635cc70ebb74ad6e562d7979b7e15e3290d1009789ac02bb3abfb9943b4d1e6b
WordPress Appointment Booking Calendar 1.3.34 CSV Injection
Posted Mar 12, 2020
Authored by Daniel Monzon

WordPress Appointment Booking Calendar plugin version 1.3.34 suffers from a CSV injection vulnerability.

tags | exploit
advisories | CVE-2020-9371, CVE-2020-9372
SHA-256 | 8901cadcbcfe9a8feae646bdae78309de9f0a6e07e4f3616b6d12c1fe85412ba
WordPress Search Meter 2.13.2 CSV Injection
Posted Mar 11, 2020
Authored by Daniel Monzon

WordPress Search Meter plugin version 2.13.2 suffers from a CSV injection vulnerability.

tags | exploit
SHA-256 | d5c8d2dbc0b8ad68faf4f1c3a3dbe3e473831cdd46723d2d4e24989b12f689ea
Lotus Core CMS 1.0.1 Local File Inclusion
Posted Jan 31, 2020
Authored by Daniel Monzon

Lotus Core CMS version 1.0.1 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 64a93093c3144c62847025d1a0a0a0a219c1538c1ff7ebd71cf3f9e630e664b0
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close