what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from Jos Wetzels

Email addressa.l.g.m.wetzels at gmail.com
First Active2014-12-03
Last Active2016-06-22
DarkComet Server 3.2 Remote File Download
Posted Jun 22, 2016
Authored by Jesse Hertz, Shawn Denbow, Jos Wetzels | Site metasploit.com

This Metasploit module exploits an arbitrary file download vulnerability in the DarkComet C&C server versions 3.2 and up. The exploit does not need to know the password chosen for the bot/server communication.

tags | exploit, arbitrary
SHA-256 | 526875de4b2f6bc5ec72d1ffc0e835dfcf46ebb40dc25640bde82c28768474fd
Poison Ivy 2.1.x C2 Buffer Overflow
Posted Jun 9, 2016
Authored by Jos Wetzels | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in the Poison Ivy 2.1.x C&C server. The exploit does not need to know the password chosen for the bot/server communication.

tags | exploit, overflow
SHA-256 | 4f558f9b55f9f8cc84972af4fc3f4cdbdcf5968234547a9e4d1b6b5291586cf8
HumHub 0.10.0 File Upload / Remote Code Execution
Posted Feb 14, 2015
Authored by Jos Wetzels

HumHub versions 0.10.0 and below suffer from .htaccess file upload and remote code execution vulnerabilities.

tags | advisory, remote, vulnerability, code execution, file upload
SHA-256 | 270e4348775db45bf8d7044ae1b7d6bb66a03193fd05759df6b2527b2e04fce4
Humhub Insecure Password Validation / Reset
Posted Dec 13, 2014
Authored by Jos Wetzels

Humhub versions 0.10.0-rc.1 and below suffer from insecure password validation and password reset vulnerabilities.

tags | exploit, vulnerability
SHA-256 | a0c970925cf93592f6e24c8b8beb06e6c309e87a56aa82420855febf69f24445
Humhub 0.10.0-rc.1 Cross Site Scripting / SQL Injection
Posted Dec 9, 2014
Authored by Jos Wetzels, Emiel Florijn

Humhub versions 0.10.0-rc.1 and below suffer from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | a8b814b89548826f53744a839edb39b524a3238eaea84c586c85c33e616b62ac
Yii Framwork CmsInput Improper XSS Filter
Posted Dec 3, 2014
Authored by Jos Wetzels

Yii framework's CmsInput extension versions 1.2 and prior suffer from an improper cross site scripting sanitation implementation.

tags | exploit, xss
SHA-256 | ca8da68b1474bc4281b1f32954bc5774467cd5f06b1ea17ad128a0eaed3567b7
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    43 Files
  • 20
    Aug 20th
    29 Files
  • 21
    Aug 21st
    42 Files
  • 22
    Aug 22nd
    26 Files
  • 23
    Aug 23rd
    25 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close