what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files from Jesus Olmos Gonzalez

Email addressjolmos at buguroo.com
First Active2006-01-21
Last Active2012-04-25
mount.cifs chdir() File Identification
Posted Apr 25, 2012
Authored by Jesus Olmos Gonzalez

mount.cifs chdir() allows for arbitrary file identification as root. All versions prior to 5.4 are affected.

tags | exploit, arbitrary, root
SHA-256 | 1a07d210c27edc8b4cb7f1f1ad3579fd0a15fb1679968e8465902f2d88e2e7ae
Joomla Exploit Scanner
Posted Oct 14, 2010
Authored by Jesus Olmos Gonzalez

This python script scans for 58 vulnerable Joomla component payloads.

tags | tool, scanner, python
systems | unix
SHA-256 | 26c1dd792718beea62e8eb0ab2d6c9e865e5fd26795e1320d27ddd6b697c5805
PSI Integer Overflow Denial Of Service
Posted Dec 30, 2008
Authored by Jesus Olmos Gonzalez

PSI suffers from a remote integer overflow denial of service vulnerability. Proof of concept code is included.

tags | exploit, remote, denial of service, overflow, proof of concept
SHA-256 | de69b659adeceb5045e248bf603c15268a1229a6571f12bd70969d4db0132621
Wordpress Forced Upgrade Vulnerability
Posted Dec 30, 2008
Authored by Jesus Olmos Gonzalez

Wordpress suffers from an unauthenticated forced upgrade vulnerability.

tags | exploit
SHA-256 | 049f31a474dbed4dfbfa791b5e68172ea3a6c3e9b523e251a85274eba9a59934
smbclientparser-exec.txt
Posted Jul 18, 2008
Authored by Jesus Olmos Gonzalez

The SmbClientParser perl module suffers from a vulnerability that allows for remote command execution.

tags | exploit, remote, perl
SHA-256 | 33334045f42d73fb46e9185faa3bbbcd3ff495de9f3d275a493a514453021afd
tikiwiki-traverse.txt
Posted Dec 24, 2007
Authored by Jesus Olmos Gonzalez

The Tikiwiki CMS has a vulnerability that allows an attacker to get the first 1000 bytes from an arbitrary file through the tiki-listmovies.php script.

tags | exploit, arbitrary, php, file inclusion
SHA-256 | c5dec4df826c950a9c132ae47977fa8e7beb6ae4e962420270fa9eb27e09c5b1
isaa-2007-004.txt
Posted Dec 8, 2007
Authored by Jesus Olmos Gonzalez

wwwstats versions 3.21 and below suffer from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 5457ca069024fd739d38219ac74f191a2708e419d1729044433de62fb2ba630d
wwwstatsHack.txt
Posted Nov 27, 2007
Authored by Jesus Olmos Gonzalez

Simple exploit that demonstrates a script insertion vulnerability in wwwstats.

tags | exploit
SHA-256 | 29014ac2d821ffd45216932fc69be04913f562187be248a4fb5138e2905af733
cygwin-overflow.txt
Posted Nov 27, 2007
Authored by Jesus Olmos Gonzalez

Cygwin is vulnerable to a buffer overflow when checking filename lengths. cygwin1.dll versions up to 1.5.7 are susceptible.

tags | exploit, overflow
SHA-256 | ddfe3c4fc38c8f3c7dae9dd85ffdd94747542985346d58ea5025bbed20ff9a2c
vtls-xss.txt
Posted Nov 13, 2007
Authored by Jesus Olmos Gonzalez

VTLS Inc.'s vtls.web.gateway CGI is susceptible to a cross site scripting vulnerability. Versions up to 48.1.0 are affected.

tags | exploit, web, cgi, xss
SHA-256 | 8dd7b975689fca20a6db74f32829fae10d09f886aa6152e808a33d4e79c5e9bf
isa-2006-013.txt
Posted May 23, 2007
Authored by Jesus Olmos Gonzalez

Microsoft IIS5 suffers from NTLM and basic authentication bypass vulnerabilities.

tags | exploit, vulnerability
SHA-256 | 62deb75d4279d8e14703bd0f0c22f77345ca3d79b23d558d052acdb9ec13c878
ISAA-2006-007.txt
Posted Dec 6, 2006
Authored by Jesus Olmos Gonzalez

The BlueSocket web administration interface is vulnerable to a cross site scripting attack. Versions below 5.2 are susceptible.

tags | exploit, web, xss
SHA-256 | c6811675ab88b514fd32f50e74e601ef360a5b8bee5f7c36be46f781d442d4d0
ISAA-2006-001.txt
Posted Jan 21, 2006
Authored by Jesus Olmos Gonzalez

123flashchat server versions 5.1 and below suffer from directory traversal attacks that allow for arbitrary file creation.

tags | exploit, arbitrary
SHA-256 | c355585c5c78eafe4950127b4ae6fcaf275381bbd3eae5c5002c6553dbf4ad06
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close