Moritz Jodeit

9 exploits Active since Dec 2007
CVE-2012-2174 METASPLOIT ruby WORKING POC
IBM Lotus Notes - Code Injection
The URL handler in IBM Lotus Notes 8.x before 8.5.3 FP2 allows remote attackers to execute arbitrary code via a crafted notes:// URL.
CVE-2007-5863 METASPLOIT ruby WORKING POC
Apple Mac OS X 10.5.1 - Command Injection
Software Update in Apple Mac OS X 10.5.1 allows remote attackers to execute arbitrary commands via a man-in-the-middle (MITM) attack between the client and the server, using a modified distribution definition file with the "allow-external-scripts" option.
CVE-2012-2174 EXPLOITDB ruby WORKING POC
IBM Lotus Notes - Code Injection
The URL handler in IBM Lotus Notes 8.x before 8.5.3 FP2 allows remote attackers to execute arbitrary code via a crafted notes:// URL.
CVE-2015-6152 EXPLOITDB html WORKING POC
Microsoft Internet Explorer - Memory Corruption
Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-6162.
EIP-2026-115060 EXPLOITDB text WRITEUP
Citrix XenApp / XenDesktop XML Service - Heap Corruption
EIP-2026-115059 EXPLOITDB text WRITEUP
Citrix XenApp / XenDesktop - Stack Buffer Overflow
CVE-2007-5863 EXPLOITDB ruby WORKING POC
Apple Mac OS X 10.5.1 - Command Injection
Software Update in Apple Mac OS X 10.5.1 allows remote attackers to execute arbitrary commands via a man-in-the-middle (MITM) attack between the client and the server, using a modified distribution definition file with the "allow-external-scripts" option.
CVE-2010-4107 EXPLOITDB ruby WORKING POC
HP 9000 - Path Traversal
The default configuration of the PJL Access value in the File System External Access settings on HP LaserJet MFP printers, Color LaserJet MFP printers, and LaserJet 4100, 4200, 4300, 5100, 8150, and 9000 printers enables PJL commands that use the device's filesystem, which allows remote attackers to read arbitrary files via a command inside a print job, as demonstrated by a directory traversal attack.
CVE-2010-4107 EXPLOITDB text WORKING POC
HP 9000 - Path Traversal
The default configuration of the PJL Access value in the File System External Access settings on HP LaserJet MFP printers, Color LaserJet MFP printers, and LaserJet 4100, 4200, 4300, 5100, 8150, and 9000 printers enables PJL commands that use the device's filesystem, which allows remote attackers to read arbitrary files via a command inside a print job, as demonstrated by a directory traversal attack.