exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 100 RSS Feed

Files

Safari On iOS Denial Of Service
Posted Jun 8, 2012
Authored by Larry W. Cashdollar

Proof of concept crash exploit for Safari on iOS that leverage a denial of service vulnerability.

tags | exploit, denial of service, proof of concept
systems | apple
SHA-256 | b7aed7d45d2d8c141f4d038fb1e6bb148bd5d8c687b4740e140f2b04997e86d9

Related Files

Guitar Pro 6.1.1 r10791 Denial Of Service
Posted May 9, 2012
Authored by condis

Guitar Pro version 6.1.1 r10791 crash proof of concept exploit that creates a malicious .gpx file.

tags | exploit, denial of service, proof of concept
SHA-256 | b47118b6504b93679f30789d5a6f880b92105d33719aa58355ff34da6cc8da53
BeyondCHM 1.1 Buffer Overflow
Posted Apr 24, 2012
Authored by shinnai | Site shinnai.altervista.org

BeyondCHM version 1.1 suffers from a buffer overflow vulnerability when handling a specially crafted chm file. Proof of concept included.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | 1f4140d1bd20cda3a4f39e3e694685f225a0d65e60da185fa2ca460418e79975
Mobipocket Reader 6.2 Build 608 Buffer Overflow
Posted Apr 23, 2012
Authored by shinnai | Site shinnai.altervista.org

Mobipocket Reader version 6.2 build 608 suffers from a buffer overflow vulnerability. Proof of concept included.

tags | exploit, overflow, proof of concept
SHA-256 | 956ac848bb2710f1365550adfff0b8787d1dfb621595612c0d1b192087b80cb7
SumatraPDF 2.0.1 Memory Corruption
Posted Apr 23, 2012
Authored by shinnai | Site shinnai.altervista.org

SumatraPDF version 2.0.1 suffers from chm and mobi file memory corruption vulnerabilities. Proof of concept included.

tags | exploit, vulnerability, proof of concept
systems | linux
SHA-256 | 2c48263ca242c08c83e3159ab0488a34d4ec0b9ed8c46ee7db29a49caef65b02
Liferay 6.0.5 ce WebDAV File Reading
Posted Apr 21, 2012
Authored by Jelmer Kuperus

By creating a specially crafted webdav request that contains an external entity it is possible to read files from Liferay Portal version 6.0.5 ce. Proof of concept code included.

tags | exploit, proof of concept
systems | linux
SHA-256 | 3cd00ba5d2fefa08a9eafaa941c8ee4bdbf23dae39cb2ccf5da00cbf88d064e4
Liferay 6.1 Default Configuration Compromise
Posted Apr 21, 2012
Authored by Jelmer Kuperus

By utilizing the json webservices exposed in Liferay Portal version 6.1 you can register a new user with any role in the system, including the built in administrator role. Proof of concept included.

tags | exploit, proof of concept
systems | linux
SHA-256 | 3f6c3c5b9e5e27e968adbe87afc167aa13e200b89a6647cbde10d03c9a021bac
Liferay JSON Request Control Takeover
Posted Apr 20, 2012
Authored by Jelmer Kuperus

Liferay Portal suffers from a takeover vulnerability due to a single HTTP request allowing an attacker to reconfigure which memcached to use. Proof of concept code included. Version 6.1 ce is confirmed vulnerable.

tags | exploit, web, proof of concept
systems | linux
SHA-256 | 52363e44fb0da67d9da2ef19c482ca115b0e60ea50da8776e953b5d028b5ea91
Samsung Device Endless Restart / Possible Buffer Overflow
Posted Apr 20, 2012
Authored by Luigi Auriemma | Site aluigi.org

Samsung devices with support for remote controllers suffer from endless restart and possible buffer overflow vulnerabilities. Proof of concept code included.

tags | exploit, remote, overflow, vulnerability, proof of concept
systems | linux
SHA-256 | 854a533372bb43e4a6e8df97f85425d1da3dc842c39a23331c498211f1cde33b
Wireshark call_dissector() Denial Of Service
Posted Apr 19, 2012
Authored by Wireshark

Wireshark suffers from a call_dissector() NULL pointer dereference denial of service vulnerability. Proof of concept pcap included.

tags | exploit, denial of service, proof of concept
systems | linux
advisories | CVE-2012-1593
SHA-256 | 8139489227889d61c55034247a3d493ffe6a2ec4f169b8c36e0554eda132852d
LibreOffice 3.5.2.2 Memory Corruption
Posted Apr 18, 2012
Authored by shinnai | Site shinnai.altervista.org

LibreOffice version 3.5.2.2 suffers from a soffice.exe\soffice.bin memory corruption vulnerability when handling a malformed RTF file. This is a proof of concept exploit.

tags | exploit, proof of concept
SHA-256 | 9108e491be1d7df3025c505170e97f3e07e7d1652a9bd9606c234343e61301b5
MS11-046 Proof Of Concept
Posted Apr 18, 2012
Authored by FB1H2S

This is a proof of concept exploit for the vulnerability documented in MS11-046 for the Microsoft Windows Ancillary Function Driver (AFD).

tags | exploit, proof of concept
systems | windows
SHA-256 | db03166f4056e42fe514f3a64ffbe8b1395886a9e9f58f55dbe8e7302af75e70
McAfee Web Gateway And Squid Proxy 3.1.19 Bypass
Posted Apr 13, 2012
Authored by Gabriel Menezes Nunes

McAfee Web Gateway and Squid Proxy version 3.1.19 suffers from a bypass vulnerability due to putting trust in Host headers. Proof of concept tool included. Squid is only vulnerable to the attacks if the filtered site is using SSL.

tags | exploit, web, proof of concept, bypass
systems | unix
advisories | CVE-2012-2212, CVE-2012-2213
SHA-256 | fd5a23a84846044a1ea5a10e1231aba1d4783081f27119ecd5de07b7485b6ad5
Adobe Flash Player Information Leak
Posted Apr 10, 2012
Authored by Fermin J. Serna

Adobe Flash Player versions prior to 10.3.183.16 and 11.x before 11.1.102.63 suffer from an information disclosure vulnerability. This archive has research related to this issue, proof of concept source code, and a swf that demonstrates the issue.

tags | exploit, proof of concept, info disclosure
systems | linux
advisories | CVE-2012-0769
SHA-256 | a3e0acb403967ecb2ab50b95e92c7801505af37a7f830f9ad5119219170efa9f
PHP 5.4 / 5.3 eregi() Memory Limit Bypass
Posted Mar 30, 2012
Authored by Maksymilian Arciemowicz

PHP versions 5.4 and 5.3 suffer from a deprecated eregi() memory_limit bypass vulnerability. Proof of concepts included.

tags | exploit, php, proof of concept, bypass
systems | linux
SHA-256 | b8f9235bcde03d20acafbedaa0aa12b05d9c56034aaaa1a9f164f8fbde699142
Quest InTrust 10.4.x File Overwrite
Posted Mar 29, 2012
Authored by rgod | Site retrogod.altervista.org

Quest InTrust version 10.4.x suffers from ArDoc.dll active-x control remote file creation / overwrite vulnerabilities in the ReportTree and SimpleTree classes. Proof of concept code included.

tags | exploit, remote, vulnerability, activex, proof of concept
systems | linux
SHA-256 | 1b249434937ec1c1ec6432094ca9aca11399fda520e83ee44caaf8e3963ed614
Drupal Activity 6.x XSS Proof Of Concept
Posted Mar 29, 2012
Authored by Justin C. Klein Keane | Site drupal.org

This file documents a proof of concept to demonstrate the cross site scripting vulnerability in the Drupal Activity module version 6.x.

tags | exploit, xss, proof of concept
SHA-256 | 21cff53d4151dcb6cd0a86095cfb274645d44512ecad08ffa9a0c5beb8eac1e5
D-Link SecuriCam DCS-5605 Network Surveillance Buffer Overflow
Posted Mar 29, 2012
Authored by rgod | Site retrogod.altervista.org

The D-Link SecuriCam DCS-5605 Network Surveillance DcsCliCtrl.dll active-x control suffers from a buffer overflow vulnerability. Proof of concept code included.

tags | exploit, overflow, activex, proof of concept
systems | linux
SHA-256 | 1edd0a6afe6d31147b097c2127b64cc9e88a0013161e4c6fafa7d291d19e8ba8
Quest InTrust 10.4.x Annotation Objects Code Execution
Posted Mar 29, 2012
Authored by rgod | Site retrogod.altervista.org

Quest InTrust version 10.4.x with Annotation Objects active-x control ANNOTATEX.DLL suffers from a remote code execution vulnerability. Proof of concept code included.

tags | exploit, remote, code execution, activex, proof of concept
systems | linux
SHA-256 | f434df904932a8864ea9998ff353e34532f5d8a789fcad5b7ac3fbfc4f65fc1b
TRENDnet SecurView TV-IP121WN Wireless Internet Camera UltraMJCam Buffer Overflow
Posted Mar 29, 2012
Authored by rgod | Site retrogod.altervista.org

The TRENDnet SecurView TV-IP121WN wireless internet camera UltraMJCam active-x control suffers from an OpenFileDlg() WideCharToMultiByte remote buffer overflow. Proof of concept code included.

tags | exploit, remote, overflow, activex, proof of concept
systems | linux
SHA-256 | a1448bcd0d8740d3db37283f486bc15f2158a7b7818ccafbfc0569b5d3cb8984
KnFTPd 1.0.0 Denial Of Service
Posted Mar 29, 2012
Authored by Stefan Schurtz

KnFTPd version 1.0.0 FEAT denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
SHA-256 | 23362117b24d612d1493f972844422aad68f031cda99ca830f75c6ecd391d069
PHP 5.4.0 Denial Of Service
Posted Mar 24, 2012
Authored by ls

PHP version 5.4.0 built-in web server denial of service proof of concept exploit.

tags | exploit, web, denial of service, php, proof of concept
SHA-256 | bbfd3425e200f20aede920fb93f171459ebc22c83495b9e14ad46cef5fb558db
Ricoh DC Software DL-10 FTP Server 1.1.0.6 Buffer Overflow
Posted Mar 22, 2012
Authored by Julien Ahrens

Ricoh DC Software DL-10 FTP server (SR10.exe) versions 1.1.0.6 and below remote buffer overflow proof of concept exploit that sends a malformed request.

tags | exploit, remote, overflow, proof of concept
SHA-256 | e13e1ecd389948511c8683234485d24ca0d9825e618486eaf3a184e64db4cf90
PeerFTP Server 4.01 Denial Of Service
Posted Mar 20, 2012
Authored by localh0t

PeerFTP Server versions 4.01 and below remote crash proof of concept exploit. Written in Python.

tags | exploit, remote, denial of service, proof of concept, python
SHA-256 | 7fea8fd5ea03f6f40b86a936296cfa83efffedf1395acd42b3bd95bde1104b3a
Microsoft Remote Desktop Use-After-Free
Posted Mar 17, 2012
Authored by Luigi Auriemma | Site aluigi.org

This archive encompasses an advisory about the MS12-020 use-after-free vulnerability in Microsoft Remote Desktop, details about the leaked exploit in relation to this report, and a proof of concept exploit.

tags | exploit, remote, proof of concept
systems | linux
SHA-256 | 9a94d068fd0f6a8f044593bfb8ff8e4f4527cff18adacfeaddb785decdbbaa82
XnView FlashPix Image Processing Heap Overflow
Posted Mar 13, 2012
Authored by Francis Provencher

XnView FlashPix suffers from an image processing heap overflow vulnerability. Proof of concept file included.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | 97c5fd589baeaf814316e7cce4504bc6ee68880801787c1bf145adc3a4300494
Page 3 of 4
Back1234Next

File Archive:

February 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    11 Files
  • 2
    Feb 2nd
    9 Files
  • 3
    Feb 3rd
    5 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    0 Files
  • 6
    Feb 6th
    0 Files
  • 7
    Feb 7th
    0 Files
  • 8
    Feb 8th
    0 Files
  • 9
    Feb 9th
    0 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    0 Files
  • 13
    Feb 13th
    0 Files
  • 14
    Feb 14th
    0 Files
  • 15
    Feb 15th
    0 Files
  • 16
    Feb 16th
    0 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close