exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files Date: 2023-06-11

polkit Authentication Bypass
Posted Jun 11, 2023
Authored by Kevin Backhouse, GitHub Security Lab

Proof of concept exploit for an authentication bypass vulnerability in polkit.

tags | exploit, proof of concept, bypass
advisories | CVE-2021-3560
SHA-256 | 458437eef69ad8bf3f51e3b80d608d2052ad08a989fbda8025248aff1d4b2a27
Chrome JIT Compiler Type Confusion
Posted Jun 11, 2023
Authored by Man Yue Mo, GitHub Security Lab

Proof of concept exploit for a type confusion bug in the JIT compiler of Chrome that can be used to achieve remote code execution.

tags | exploit, remote, code execution, proof of concept
advisories | CVE-2021-30632
SHA-256 | 30eeadf8f371d4a17379456833c3996be91c75c93e2bc055f9e6f40682fc5995
Chrome V8 Logic Bug / Use-After-Free
Posted Jun 11, 2023
Authored by Man Yue Mo, GitHub Security Lab

Proof of concept for a logic bug in the implementation of the garbage collector (GC) in v8 (the JavaScript interpreter of Chrome). The exploit poc.js is tested on v8 version 9.4.146.16 (commit 452f57b), which is the version shipped with Chrome 94.0.4606.61, the one before the bug was fixed, on Ubuntu 20.04.

tags | exploit, javascript, proof of concept
systems | linux, ubuntu
advisories | CVE-2021-37975
SHA-256 | 9bcd05375f4716e560bf2a6e62f7e0eed58e6eb6f38f4070b6205036e9ca28ca
Chrome Renderer Type Confusion / Remote Code Execution
Posted Jun 11, 2023
Authored by Man Yue Mo, GitHub Security Lab

Proof of concept remote code execution exploit that demonstrates a vulnerability in the Chrome renderer sandbox by simply visiting a malicious website.

tags | exploit, remote, code execution, proof of concept
advisories | CVE-2022-1134
SHA-256 | 0bef9994895034465485b3ccc1c259c22c1bde140f7e3d288d935477095db1e7
Chrome WebAudio Use-After-Free
Posted Jun 11, 2023
Authored by Man Yue Mo, GitHub Security Lab

Proof of concept exploit for a Chrome use-after-free vulnerability of non-garbage-collected objects, which is allocated by the PartitionAlloc memory allocator.

tags | exploit, proof of concept
advisories | CVE-2020-6449
SHA-256 | 3c22f0abad82c2cbf4c1d29bf8cfddf026899fc8272a11d1fea6c2c2b02b6e21
Chrome Renderer Remote Code Execution
Posted Jun 11, 2023
Authored by Man Yue Mo, GitHub Security Lab

Proof of concept exploit for a Chrome renderer remote code execution vulnerability.

tags | exploit, remote, code execution, proof of concept
advisories | CVE-2020-15972
SHA-256 | 9fe14db33f51b4c5ac882ae3b87ce8ce4342d37160fda598491088767b81b67e
Chrome Beta Use-After-Free / Sandbox Escape
Posted Jun 11, 2023
Authored by GitHub Security Lab

Proof of concept exploit that demonstrates a bug in the beta version of Chrome v86 that can be used to escape the Chrome sandbox from a compromised renderer.

tags | exploit, proof of concept
SHA-256 | b0c911b35a3da8ed4e47de3b6f2acdb186d98212584981d214eb86e01f442f36
Chrome Sandbox Escape
Posted Jun 11, 2023
Authored by Man Yue Mo, GitHub Security Lab

Proof of concept exploit that demonstrates a bug that can be used to escape the Chrome sandbox from a compromised renderer. Two exploits are included, one for the 64 bit version 90.0.4430.91 and the other is for the 32 bit version 88.0.4324.181. The build configs are in the corresponding sub directories.

tags | exploit, proof of concept
advisories | CVE-2021-30528
SHA-256 | 6f9069e00ff5656306f2637f1524304a8b31f78226021e7cf37a36cd64d05030
CImg Command Injection
Posted Jun 11, 2023
Authored by GitHub Security Lab, Cristian-Alexandru Staicu

Proof of concept exploit for a command injection vulnerability in the CImg library. The vulnerability was fixed in version 2.3.4.

tags | exploit, proof of concept
SHA-256 | 6ef5d7dcb85c308d39aa850e6468244ceb1dac7d7125ea9aa8dd53e5b5db5a01
Apache Struts Remote Code Execution
Posted Jun 11, 2023
Authored by GitHub Security Lab

Apache Struts remote code execution proof of concept exploit that affects versions prior to 2.3.35 and 2.5.17.

tags | exploit, remote, code execution, proof of concept
advisories | CVE-2018-11776
SHA-256 | 378f12002cded8ad65b82350acd98b42b3b0fa65d697cfb00d3661569e72472f
Qualcomm NPU Use-After-Free / Information Leak
Posted Jun 11, 2023
Authored by Man Yue Mo, GitHub Security Lab

Proof of concept code that exploits three bugs that can be used to gain arbitrary kernel code execution, read and write from the untrusted app domain. Kernel code is executed in the context of the root user and the exploit also disable SELinux. The exploit is tested on Samsung Galaxy A71 with firmware version A715FXXU3BUB5, Baseband A715FXXU3BUB4 and Kernel version 4.14.190-20973144.

tags | exploit, arbitrary, kernel, root, code execution, proof of concept
advisories | CVE-2021-1940, CVE-2021-1968, CVE-2021-1969
SHA-256 | d7fb13a8e212690bea66fdff3ce4d52d05a239e824796af7a580b4f67ac5a57d
Qualcomm Adreno GPU Information Leak
Posted Jun 11, 2023
Authored by Man Yue Mo, GitHub Security Lab

Proof of concept exploit for an information leak vulnerability in the Qualcomm Adreno GPU. The bug can be used to leak information in other user apps, as well as in the kernel from an untrusted app. The directory adreno_user contains a proof-of-concept for leaking memory from other applications. It will repeatedly trigger the bug and read the stale information contained in memory pages.

tags | exploit, kernel, proof of concept
advisories | CVE-2022-25664
SHA-256 | 14a7bc813fbfd5b0814582d935ba39c5649faf3bc3609e054c88db47e4159c41
Qualcomm kgsl Driver Use-After-Free
Posted Jun 11, 2023
Authored by Man Yue Mo, GitHub Security Lab

Qualcomm kgsl driver use-after-free proof of concept exploit. The bug can be used to gain arbitrary kernel memory read and write from the untrusted app domain, which is then used to disable SELinux and gain root. The exploit is tested on the Samsung Galaxy Z Flip 3 (European version SM-F711B) with firmware version F711BXXS2BUL6, Baseband F711BXXU2BUL4 and Kernel version 5.4.86-qgki-23063627-abF711BXXS2BUL6 (EUX region).

tags | exploit, arbitrary, kernel, root, proof of concept
advisories | CVE-2022-22057
SHA-256 | 013038a08c172f14d7c3c6abb8e3556978d9037f5c5e575225e2ff3cf63e5655
Qualcomm kgsl Driver Use-After-Free
Posted Jun 11, 2023
Authored by Man Yue Mo, GitHub Security Lab

Qualcomm kgsel driver proof of concept use-after-free exploit. The bug can be used to gain arbitrary kernel code execution, read and write from the untrusted app domain. The exploit is tested on Samsung Galaxy A71 with firmware version A715FXXU3ATJ2, Baseband A715FXXU3ATI5 and Kernel version 4.14.117-19828683.

tags | exploit, arbitrary, kernel, code execution, proof of concept
advisories | CVE-2020-11239
SHA-256 | b38ccffb8c90b392f46848fba04831d2ef7063a8f36bb2c4835fd662f0d5379e
Android Arm Mali GPU Arbitrary Code Execution
Posted Jun 11, 2023
Authored by Man Yue Mo, GitHub Security Lab

Proof of concept exploit for Android on Arm Mali GPU with a kernel driver bug that can be used to gain arbitrary kernel code execution from the untrusted app domain, which is then used to disable SELinux and gain root. The exploit is tested on the Google Pixel 6 with the November 2022 and January 2023 patch.

tags | exploit, arbitrary, kernel, root, code execution, proof of concept
advisories | CVE-2022-46395
SHA-256 | 1c81e6cc4abcfe0ecb1417d1ee980963d887a2109472ab157bbd2c2fa62921ef
Android Arm Mali GPU Arbitrary Code Execution
Posted Jun 11, 2023
Authored by Man Yue Mo, GitHub Security Lab

Proof of concept exploit for the Arm Mali GPU that can be used to gain arbitrary kernel code execution from the untrusted app domain, which is then used to disable SELinux and gain root. The exploit is tested on the Google Pixel 6. The original exploit that was sent to Google is included as hello-jni.c as a reference and was tested on the July 2022 patch of the Pixel 6. Due to the fact that Pixel 6 cannot be downgraded from Android 13 to Android 12, an updated version of the exploit, mali_shrinker_mmap.c is included, which supports various firmware in Android 13, including the December patch, which is the latest affected version.

tags | exploit, arbitrary, kernel, root, code execution, proof of concept
advisories | CVE-2022-38181
SHA-256 | bc50f9e9f9fe69b36613124dc79ca07e6c6523713f3c1192a6204b4ec7783f2c
Android Arm Mali GPU Arbitrary Code Execution
Posted Jun 11, 2023
Authored by Man Yue Mo, GitHub Security Lab

Proof of concept exploit for a memory corruption vulnerability in the Arm Mali GPU kernel driver that was reported in January of 2022. The bug can be used to gain arbitrary kernel code execution from the untrusted app domain, which is then used to disable SELinux and gain root. The exploit is tested on the Google Pixel 6 and supports patch levels from November 2021 to February 2022. It is easy to add support for other firmware by changing a few image offsets.

tags | exploit, arbitrary, kernel, root, code execution, proof of concept
advisories | CVE-2022-20186
SHA-256 | 66eea2398301c881c76dc1359392bb4e7585bacb1998c8e4de619ba964588857
Android Arm Mali GPU Arbitrary Code Execution
Posted Jun 11, 2023
Authored by Man Yue Mo, GitHub Security Lab

Proof of concept exploit for GHSL-2023-005. A security patch from the upstream Arm Mali driver somehow got missed out in the update for the Pixel phones and was reported to Google in January 2023. The bug can be used to gain arbitrary kernel code execution from the untrusted app domain, which is then used to disable SELinux and gain root. The exploit is tested on the Google Pixel 6 for devices running the January 2023 patch.

tags | exploit, arbitrary, kernel, root, code execution, proof of concept
SHA-256 | b4dee085caf18f3a2b27ef4e7e723670fff60eb3022abf602e9819d7317518e8
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close