what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 100 RSS Feed

Files

Safari On iOS Denial Of Service
Posted Jun 8, 2012
Authored by Larry W. Cashdollar

Proof of concept crash exploit for Safari on iOS that leverage a denial of service vulnerability.

tags | exploit, denial of service, proof of concept
systems | apple
SHA-256 | b7aed7d45d2d8c141f4d038fb1e6bb148bd5d8c687b4740e140f2b04997e86d9

Related Files

XnView FlashPix Image Processing Heap Overflow
Posted Jun 16, 2012
Authored by Francis Provencher

A boundary error in the Xfpx.dll module when processing FlashPix images can be exploited to cause a heap-based buffer overflow via a specially crafted FPX file. Proof of concept included.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | d3d27e656535c43a189940b4169f03b8e070dc18bbb730bd07e54480765d5f37
XnView ECW Image Processing Heap Overflow
Posted Jun 16, 2012
Authored by Francis Provencher

A boundary error in the NCSEcw.dll module when decompressing Enhanced Compressed Wavelet images can be exploited to cause a heap-based buffer overflow via a specially crafted ECW file. Proof of concept included.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | 2b805ba8e0fb396319306ee83628841d7255eb906f045dd4b7bcf89a37a9e721
XnView RAS Image Processing Heap Overflow
Posted Jun 16, 2012
Authored by Francis Provencher

An integer truncation error when processing Sun Raster images can be exploited to cause a heap-based buffer overflow via a specially crafted "Depth" value in a RAS file. Proof of concept included.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | deec59b7511a6a5f9b798bbeb76b449e5acbef7e088fb4533468afed85672740
Adobe Illustrator CS5.5 Memory Corruption Proof Of Concept
Posted Jun 14, 2012
Authored by Felipe Andres Manzano

Adobe Illustrator CS5.5 memory corruption proof of concept exploit that spawns a calculator.

tags | exploit, proof of concept
advisories | CVE-2012-0780
SHA-256 | 35acd4b2f3b86dad800d4dd1e04e53c4376cae35b9ee1d7a968284f59cf357ee
Mozilla Firefox Web Browser 13.0 Remote Denial Of Service
Posted Jun 14, 2012
Authored by Ucha Gobejishvili

Mozilla Firefox version 13.0 remote denial of service proof of concept exploit.

tags | exploit, remote, denial of service, proof of concept
SHA-256 | ae7f511ae4c9e3d17f34eb4e61e113606abd673ebae4661615339b1341be665c
Apple iTunes 10.6.1.7 M3U Playlist Buffer Overflow
Posted Jun 12, 2012
Authored by LiquidWorm | Site zeroscience.mk

Apple iTunes version 10.6.1.7 M3U playlist file walking heap buffer overflow proof of concept exploit. This also affects 10.6.0.40.

tags | exploit, overflow, proof of concept
systems | apple
advisories | CVE-2012-0677
SHA-256 | 6ca043856d67f4a832ccf2fb3c9bc2d684d525d689f7920b7106be12c3031bb0
F5 BIG-IP Remote Root Authentication Bypass
Posted Jun 12, 2012
Authored by David Kennedy

This is a proof of concept remote root authentication bypass exploit for F5 BIG-IP. Written in Python.

tags | exploit, remote, root, proof of concept, python
SHA-256 | 56ead1dc2b7a0b89044841502ec4977b0bed8067f3b3118da72703e3b50cbed2
IrfanView 4.33 Format Plugin Overflow
Posted Jun 3, 2012
Authored by Francis Provencher

The Format plugin in IrfanView version 4.33 suffers from a TTF file parsing stack based overflow vulnerability. Proof of concept TTF file included.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | ef722236a74014bdcead5b4e91a1c08b978a058a903f4d9df3043c15edb2afa7
IrfanView 4.33 Heap Overflow
Posted Jun 2, 2012
Authored by Francis Provencher

IrfanView version 4.33 suffers from a format plugin ECW decompression heap overflow vulnerability. Proof of concept included.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | c43538eed93169fc8652f2b6ea9ae40400dd1b5be469cc38d6a0f59a42a293b4
Microsoft Wordpad 5.1 Null Pointer Dereference
Posted Jun 1, 2012
Authored by condis

Microsoft Wordpad version 5.1 suffers from a null pointer dereference vulnerability when handling .doc files. Proof of concept included.

tags | exploit, proof of concept
systems | linux
SHA-256 | f658d02c9b3a700c896b3777bb7470b170aca95ccaf5c375cb8266ecd8b4a3de
MiniWeb Content-Length Denial Of Service
Posted Jun 1, 2012
Authored by infodox

MiniWeb Content-Length denial of service proof of concept exploit. Original vulnerability discovered by Luigi Auriemma.

tags | exploit, denial of service, proof of concept
SHA-256 | f68adef9522b7ceb14448112ea32e0abd2f8d6621850e2a8a61eb0f2110c61a2
GIMP 2.6 script-fu Buffer Overflow
Posted May 31, 2012
Authored by Joseph Sheridan | Site reactionpenetrationtesting.co.uk

There is a buffer overflow in the script-fu server component of GIMP (the GNU Image Manipulation Program) in all 2.6 versions (Windows and Linux versions) affecting both the script-fu console and the script-fu network server. A crafted msg to the script-fu server overflows a buffer and overwrites several function pointers allowing the attacker to gain control of EIP and potentially execute arbitrary code. Proof of concept code included.

tags | exploit, overflow, arbitrary, proof of concept
systems | linux, windows
advisories | CVE-2012-2763
SHA-256 | 3314be7d12f71ac43757fa38c7b5d582d33d0a31d034dd7a8a87b9037b9edecb
Browser Navigation Download Trick
Posted May 31, 2012
Authored by Michal Zalewski | Site lcamtuf.coredump.cx

It is an important and little-known property of web browsers that one document can always navigate other, non-same-origin windows to arbitrary URLs. Perhaps more interestingly, you can also navigate third-party documents to resources served with Content-Disposition: attachment, in which case, you get the original contents of the address bar, plus a rogue download prompt attached to an unsuspecting page that never wanted you to download that file. Proof of concept code included.

tags | exploit, web, arbitrary, proof of concept
systems | windows
SHA-256 | c8e117983282dd44d231f39a10dc8b0b2bf8c46c42490f1cf78aeb4b75db6be8
iOS 5.1.1 Safari Browser Denial Of Service
Posted May 26, 2012
Authored by Alberto Ortega

iOS versions 5.1.1 and below Safari Browser JS match(), search() crash proof of concept exploit.

tags | exploit, proof of concept
systems | cisco
SHA-256 | 88bf13ee6936fd4a41664c0ccb5fe91fdf90eb621dae78246483afea0a274ca3
ResEdit 1.5.11-win32 Buffer Overflow
Posted May 25, 2012
Authored by Walied Assar

ResEdit version 1.5.11-win32 suffers from a buffer overflow. Proof of concept denial of service exploits included.

tags | exploit, denial of service, overflow, proof of concept
systems | linux, windows
SHA-256 | b262a9976e97dcbc6e64df36a7f4ee9302668979e3d09d6cc91825b139dcfede
Symantec End Point Protection / Network Access Control 11.x Code Execution
Posted May 23, 2012
Authored by 41.w4r10r

Symantec End Point Protection version 11.x and Symantec Network Access Control version 11.x local code execution proof of concept exploit.

tags | exploit, local, code execution, proof of concept
advisories | CVE-2012-0289
SHA-256 | d2c6c09960003fa18cb090bcea7cbd0573d048ef3bac16353e5db8e15ab33911
Windows XP Keyboard Layouts Pool Corruption Proof Of Concept
Posted May 23, 2012
Authored by Oleksiuk Dmytro

This proof of concept code demonstrates a Microsoft Windows XP keyboard layouts pool corruption vulnerability, post MS12-034. The vulnerability exists in the function win32k!ReadLayoutFile() that parses keyboard layout file data.

tags | exploit, proof of concept
systems | windows
SHA-256 | 54effee805a222747d3e4ec5807005657d3668ba3d5cbbdb7f184fa0ed2f64c3
Liferay 6.1 Cross Site Request Forgery
Posted May 15, 2012
Authored by Jelmer Kuperus

Liferay version 6.1 is vulnerable to JSON-related cross site request forgery attacks. Proof of concept code is included.

tags | exploit, proof of concept, csrf
systems | linux
SHA-256 | f0c48ee96cb75fd2a8d5d59f4b09ac01709712a9b3fbfe5a377400b30d006239
SVG Java Execution Trigger
Posted May 15, 2012
Authored by Nicolas Gregoire

Some SVG specifications, like SVG 1.1 and SVG tiny 1.2, allow Java code execution when the file is opened. Proof of concept code included.

tags | exploit, java, code execution, proof of concept
systems | linux
SHA-256 | d11b15fccafdf18190f23d0b7a7f20f25dfc6fada15ef8cba05227b1c2721da0
Liferay 6.1 Name / Email Address Disclosure
Posted May 15, 2012
Authored by Jelmer Kuperus

Liferay version 6.1 suffers from a vulnerability where it is possible to retrieve the names and email addresses of all users. Proof of concept code included.

tags | exploit, proof of concept, info disclosure
systems | linux
SHA-256 | ffa34db28244865608548350015903d37722b844554e14ccaf7d8347188e784a
Liferay 6.1 No Account Access Bypass
Posted May 15, 2012
Authored by Jelmer Kuperus

Liferay version 6.1 suffers from a circumvention issue when restricting access to ip blocks. Proof of concept exploit included.

tags | exploit, proof of concept, bypass
systems | linux
SHA-256 | 6619bfbbf1dbfa7eb563e65bcabfac916b63c4ac1431da326cb548fddb4f5fdd
FlexNet License Server Manager 11.9.1 Stack Overflow
Posted May 13, 2012
Authored by Luigi Auriemma | Site aluigi.org

FlexNet License Server Manager versions 11.9.1 and below suffer from a stack overflow vulnerability in lmgrd. Proof of concept included.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | e1685cec49a2c9fdbef7f2df8194086852d758d0cee891a610d91b40c7e329ac
Pro-face Pro-Server EX 1.30.000 Memory Issues / Integer Overflow
Posted May 13, 2012
Authored by Luigi Auriemma | Site aluigi.org

Pro-face Pro-Server EX versions 1.30.000 and PCRuntime versions 3.1.00 suffer from memory related and integer overflow vulnerabilities. Proof of concept included.

tags | exploit, overflow, vulnerability, proof of concept
systems | linux
SHA-256 | 6eba0c58436511df2a7c1ddd9624d256ee11fcd20a797290f0587ece9614fe70
QNX phrelay/phindows/phditto Overflows
Posted May 11, 2012
Authored by Luigi Auriemma | Site aluigi.org

QNX phrelay/phindows/phditto suffer from bpe_decompress stack overflow and Photon Session buffer overflow vulnerabilities. Proof of concept test code included.

tags | exploit, overflow, vulnerability, proof of concept
systems | linux
SHA-256 | a8febe1f7594f7227637fd1ab3e211df28595f24d5860319add7faa94e431a79
Adobe Photoshop CS5.1 U3D.8BI Buffer Overflow
Posted May 11, 2012
Authored by rgod | Site retrogod.altervista.org

Adobe Photoshop version CS5.1 U3D.8BI suffers from a library collada asset elements stack based buffer overflow vulnerability. Proof of concept included.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | 3b56287d07b0ddbf3d319fb8f5847cc3fb85dc7f6c1df369e6873d52c0c28335
Page 2 of 4
Back1234Next

File Archive:

January 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    0 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    5 Files
  • 4
    Jan 4th
    5 Files
  • 5
    Jan 5th
    9 Files
  • 6
    Jan 6th
    5 Files
  • 7
    Jan 7th
    0 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    18 Files
  • 10
    Jan 10th
    31 Files
  • 11
    Jan 11th
    30 Files
  • 12
    Jan 12th
    33 Files
  • 13
    Jan 13th
    25 Files
  • 14
    Jan 14th
    0 Files
  • 15
    Jan 15th
    0 Files
  • 16
    Jan 16th
    7 Files
  • 17
    Jan 17th
    25 Files
  • 18
    Jan 18th
    38 Files
  • 19
    Jan 19th
    6 Files
  • 20
    Jan 20th
    21 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    24 Files
  • 24
    Jan 24th
    68 Files
  • 25
    Jan 25th
    22 Files
  • 26
    Jan 26th
    20 Files
  • 27
    Jan 27th
    17 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    20 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close