exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from Jos Wetzels

Email addressa.l.g.m.wetzels at gmail.com
First Active2014-12-03
Last Active2016-06-22
DarkComet Server 3.2 Remote File Download
Posted Jun 22, 2016
Authored by Jesse Hertz, Shawn Denbow, Jos Wetzels | Site metasploit.com

This Metasploit module exploits an arbitrary file download vulnerability in the DarkComet C&C server versions 3.2 and up. The exploit does not need to know the password chosen for the bot/server communication.

tags | exploit, arbitrary
SHA-256 | 526875de4b2f6bc5ec72d1ffc0e835dfcf46ebb40dc25640bde82c28768474fd
Poison Ivy 2.1.x C2 Buffer Overflow
Posted Jun 9, 2016
Authored by Jos Wetzels | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in the Poison Ivy 2.1.x C&C server. The exploit does not need to know the password chosen for the bot/server communication.

tags | exploit, overflow
SHA-256 | 4f558f9b55f9f8cc84972af4fc3f4cdbdcf5968234547a9e4d1b6b5291586cf8
HumHub 0.10.0 File Upload / Remote Code Execution
Posted Feb 14, 2015
Authored by Jos Wetzels

HumHub versions 0.10.0 and below suffer from .htaccess file upload and remote code execution vulnerabilities.

tags | advisory, remote, vulnerability, code execution, file upload
SHA-256 | 270e4348775db45bf8d7044ae1b7d6bb66a03193fd05759df6b2527b2e04fce4
Humhub Insecure Password Validation / Reset
Posted Dec 13, 2014
Authored by Jos Wetzels

Humhub versions 0.10.0-rc.1 and below suffer from insecure password validation and password reset vulnerabilities.

tags | exploit, vulnerability
SHA-256 | a0c970925cf93592f6e24c8b8beb06e6c309e87a56aa82420855febf69f24445
Humhub 0.10.0-rc.1 Cross Site Scripting / SQL Injection
Posted Dec 9, 2014
Authored by Jos Wetzels, Emiel Florijn

Humhub versions 0.10.0-rc.1 and below suffer from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | a8b814b89548826f53744a839edb39b524a3238eaea84c586c85c33e616b62ac
Yii Framwork CmsInput Improper XSS Filter
Posted Dec 3, 2014
Authored by Jos Wetzels

Yii framework's CmsInput extension versions 1.2 and prior suffer from an improper cross site scripting sanitation implementation.

tags | exploit, xss
SHA-256 | ca8da68b1474bc4281b1f32954bc5774467cd5f06b1ea17ad128a0eaed3567b7
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close