Jelmer de Hen

9 exploits Active since Sep 2009
CVE-2009-3103 EXPLOITDB python WORKING POC
Microsoft Windows Server 2008 - Resource Management Error
Array index error in the SMBv2 protocol implementation in srv2.sys in Microsoft Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold and SP2, and Windows 7 RC allows remote attackers to execute arbitrary code or cause a denial of service (system crash) via an & (ampersand) character in a Process ID High header field in a NEGOTIATE PROTOCOL REQUEST packet, which triggers an attempted dereference of an out-of-bounds memory location, aka "SMBv2 Negotiation Vulnerability." NOTE: some of these details are obtained from third party information.
EIP-2026-113752 EXPLOITDB text WORKING POC
WordPress Plugin Firestats 1.6.5 - Multiple Cross-Site Scripting Vulnerabilities
EIP-2026-113749 EXPLOITDB text WORKING POC
WordPress Plugin Firestats - Remote Configuration File Download
EIP-2026-111335 EXPLOITDB text WRITEUP
Pligg CMS 1.1.3 - Multiple Vulnerabilities
EIP-2026-104864 EXPLOITDB text WORKING POC
68KB Knowledge Base Script 1.0.0rc2 - Search SQL Injection
EIP-2026-104862 EXPLOITDB text WORKING POC
68kb 68KB Base 1.0.0rc3 - Cross-Site Request Forgery (Admin)
EIP-2026-104863 EXPLOITDB text WORKING POC
68KB Knowledge Base 1.0.0rc3 - Cross-Site Request Forgery (Edit Main Settings)
EIP-2026-100866 EXPLOITDB python WORKING POC
NIBE heat pump - Local File Inclusion
EIP-2026-100867 EXPLOITDB python WORKING POC
NIBE heat pump - Remote Code Execution