exploit the possibilities
Showing 1 - 25 of 100 RSS Feed

Files

Zerologon Netlogon Privilege Escalation
Posted Nov 18, 2020
Authored by West Shepherd

Proof of concept exploit for the ZeroLogin Netlogon privilege escalation vulnerability.

tags | exploit, proof of concept
advisories | CVE-2020-1472
MD5 | ea7695085892f1f97ad5522bc93d5d3b

Related Files

Drupal Hotblocks 6.x Cross Site Scripting
Posted Aug 15, 2012
Authored by Justin C. Klein Keane

Drupal version 6.22 with Hotblocks 6.x suffers from cross site scripting and denial of service vulnerabilities. Proof of concept information included.

tags | exploit, denial of service, vulnerability, xss, proof of concept
MD5 | 5da693999cb3569b91a2694457c2ef6d
Drupal Custom Publishing Options 6.x XSS
Posted Aug 15, 2012
Authored by Justin C. Klein Keane

Drupal version 6.22 with Custom Publishing Options version 6.x-1.4 suffers from a cross site scripting vulnerability. Proof of concept information included.

tags | exploit, xss, proof of concept
MD5 | 05bf47d3155c586ff4dbd60012fef6b6
Pure-FTPd 1.0.21 Denial Of Service
Posted Aug 14, 2012
Authored by Kingcope

Pure-FTPd version 1.0.21 crash proof of concept exploit that leverages a NULL pointer dereference.

tags | exploit, proof of concept
MD5 | 92e10f766d544df6057bc6a709f00f5e
Oracle BTM Server 12.1.0.2.7 Remote Code Execution
Posted Aug 7, 2012
Authored by rgod | Site retrogod.altervista.org

Oracle Business Transaction Management Server version 12.1.0.2.7 suffers from a remote code execution vulnerability in the FlashTunnelService WriteToFile message. Proof of concept included.

tags | exploit, remote, code execution, proof of concept
MD5 | 942dde996f9deaa3c951dcebc0fb416f
AOL Products downloadUpdater2 Plugin SRC Parameter Remote Code Execution
Posted Aug 7, 2012
Authored by rgod | Site retrogod.altervista.org

AOL products downloadUpdater2 plugin suffers from a remote code execution vulnerability. Proof of concept included.

tags | exploit, remote, code execution, proof of concept
MD5 | 4e869fb75d06d79472c0d6cb106c9e8d
FreeBSD Kernel SCTP Denial Of Service
Posted Aug 3, 2012
Authored by Shaun Colley

The SCTP implementation used by FreeBSD ("reference implementation") is vulnerable to a remote NULL pointer dereference in kernel due to a logic bug. When parsing ASCONF chunks, an attempt is made to find an association by address. if the address found is INADDR_ANY, sctp_findassoc_by_vtag() is called and an attempt is made to find an association by vtag. Before searching for the vtag in a hash table, a pointer is set to NULL, with the intention of redefining it after finding the association. However, if the specified vtag is not found, the function returns and the ptr is never reinitialized, causing a kernel panic when the NULL pointer is later dereferenced by the SCTP_INP_DECR_REF macro when flow returns to sctp_process_control(). This is a proof of concept denial of service exploit.

tags | exploit, remote, denial of service, kernel, proof of concept
systems | freebsd
MD5 | 05cc888759970d3a27b3dd8dfef71014
SC DHCP 4.1.2 Denial Of Service
Posted Jul 29, 2012
Authored by K1P0D

Proof of concept denial of service exploit for the zero length client id infinite loop vulnerability in DHCP version 4.1.2.

tags | exploit, denial of service, proof of concept
advisories | CVE-2012-3571
MD5 | acd26c3b35f867f8759ed93617b5abaf
Shahumyanmedia CMS 2010 Authentication Bypass
Posted Jul 22, 2012
Authored by Akastep, BOT_25

Shahumyanmedia CMS 2010 suffers from an authentication bypass vulnerability. Proof of concept code included.

tags | exploit, proof of concept, bypass
systems | linux
MD5 | 6311c88c2e0143753db8de288fb93f98
PHP 6.0 openssl_verify() Buffer Overflow
Posted Jul 20, 2012
Authored by Pr0T3cT10n

PHP version 6.0 openssl_verify() local buffer overflow proof of concept exploit.

tags | exploit, overflow, local, php, proof of concept
MD5 | 81292fb829cd03fe56e9c8973fd9ea5d
Oracle Outside-In FPX File Parsing Heap Overflow
Posted Jul 20, 2012
Authored by Francis Provencher

Oracle Outside-In FPX file parsing suffers from a heap overflow vulnerability. Proof of concept included.

tags | exploit, overflow, proof of concept
systems | linux
MD5 | 14b7cc6d4281c3674c6a470b686aeb41
Oracle Outside-In LWP File Parsing Buffer Overflow
Posted Jul 20, 2012
Authored by Francis Provencher

Oracle Outside-In LWP file parsing suffers from a stack based buffer overflow vulnerability. Proof of concept included.

tags | exploit, overflow, proof of concept
systems | linux
MD5 | e54576ec5c307e95a78b7c8c72fa5582
Oracle Outside-In JP2 File Parsing Heap Overflow
Posted Jul 20, 2012
Authored by Francis Provencher

Oracle Outside-IN JP2 file parsing suffers from a heap overflow vulnerability. Proof of concept included.

tags | exploit, overflow, proof of concept
systems | linux
MD5 | 0604e5d82ca8a62f0adb2fe3fd913118
Arora Browser 0.10.2 Denial Of Service
Posted Jul 18, 2012
Authored by t3rm!n4t0r

Arora Browser version 0.10.2 remote denial of service proof of concept exploit.

tags | exploit, remote, denial of service, proof of concept
MD5 | 3ce9db998051cb269c90cae1098c6903
WaveSurfer 1.8.8p4 Memory Corruption
Posted Jul 13, 2012
Authored by Jean Pascal Pereira

WaveSurfer version 1.8.8p4 memory corruption proof of concept exploit.

tags | exploit, proof of concept
MD5 | e7831d769305e7dabfebca73ee8ee341
Microsoft XML Core Services Uninitialized Memory
Posted Jul 5, 2012
Authored by Brian Mariani, High-Tech Bridge SA, Frederic Bourla | Site htbridge.com

This is a thorough analysis of the Microsoft XML core services uninitialized memory vulnerability as noted by CVE-2012-1889. It includes proof of concept data to trigger the issue and goes through the flow.

tags | paper, proof of concept
advisories | CVE-2012-1889
MD5 | dac14355b665d3bf9f9009f567879d5b
Microsoft IIS Tilde Character Name Disclosure / Denial Of Service
Posted Jul 2, 2012
Authored by Soroush Dalili

Microsoft IIS suffers from a short file/folder name disclosure vulnerability when handling tilde characters. The .NET framework may also suffer from a denial of service condition relating to the handling of tilde. Proof of concept scanner included.

tags | exploit, denial of service, proof of concept
systems | linux
MD5 | 2b424f4a874aa574d9d64507b3cab96a
GIMP 2.8.0 Denial Of Service
Posted Jun 29, 2012
Authored by Joseph Sheridan | Site reactionpenetrationtesting.co.uk

There is a file handling denial of service in GIMP (the GNU Image Manipulation Program) for the 'fit' file format affecting all versions (Windows and Linux) up to 2.8.0. A file in the fit format with a malformed 'XTENSION' header will cause a crash in the GIMP program. The flaw is triggered by opening a crafted 'fit' file or allowing the file explorer dialog to preview the file. Proof of concept included.

tags | exploit, denial of service, proof of concept
systems | linux, windows
advisories | CVE-2012-3236
MD5 | 9010e4009599ecb23e4c8ad1ffbd2957
Irfanview Plugins 4.33 Overflow
Posted Jun 29, 2012
Authored by Joseph Sheridan | Site reactionpenetrationtesting.co.uk

IrfanView Formats PlugIn is prone to an overflow condition. The JLS Plugin (jpeg_ls.dll) library fails to properly sanitize user-supplied input resulting in a heap-based buffer overflow. With a specially crafted JLS compressed image file, a context-dependent attacker could potentially execute arbitrary code. Proof of concept included. Irfanview Plugins version 4.33 is affected.

tags | exploit, overflow, arbitrary, proof of concept
systems | linux
advisories | CVE-2012-3585
MD5 | 19e2303aec22265a732c54a7f34abcc2
Sielco Sistemi Winlog 2.07.16 Code Execution / Directory Traversal
Posted Jun 27, 2012
Authored by Luigi Auriemma | Site aluigi.org

Sielco Sistemi Winlog versions 2.07.16 and below suffer from various code execution, stack overflow, and directory traversal vulnerabilities. Proof of concept utility included.

tags | exploit, overflow, vulnerability, code execution, proof of concept
systems | linux
MD5 | bbbc355567ebc9612708ad1e1f30c924
Apple QuickTime Security Bypass
Posted Jun 25, 2012
Authored by Adam Gowdiak | Site security-explorations.com

Security Explorations does not agree with Apple's evaluation of a vulnerability they reported. They have decided to release proof of concept code to demonstrate a bypass vulnerability in Apple QuickTime Java extensions.

tags | exploit, java, proof of concept, bypass
systems | linux, apple
MD5 | b455e16bcd79c5388b8972a887d86fc8
IrfanView 4.33 Heap Overflow
Posted Jun 25, 2012
Authored by Francis Provencher

IrfanView version 4.33 suffers from a DJVU image processing heap overflow vulnerability. Proof of concept included.

tags | exploit, overflow, proof of concept
systems | linux
MD5 | c7f95f46198dae678fe77ae9422efe42
ACDSee PRO 5.1 Heap Overflows
Posted Jun 23, 2012
Authored by Francis Provencher

ACDSee PRO version 5.1 suffers from image processing heap overflow vulnerabilities. Proof of concepts included.

tags | exploit, overflow, vulnerability, proof of concept
systems | linux
MD5 | eb7a4d04ab92fcbd638d6718703ef189
XnView 1.98.8 Heap Overflows
Posted Jun 23, 2012
Authored by Francis Provencher

XnView version 1.98.8 suffers from GIF, PCT, and TIFF image processing heap overflow vulnerabilities. Proof of concepts included.

tags | exploit, overflow, vulnerability, proof of concept
systems | linux
MD5 | 38d379d4410dd76995d2a4ca2056d28d
Samsung AllShare 2.1.1.0 NULL Pointer
Posted Jun 20, 2012
Authored by Luigi Auriemma | Site aluigi.org

Samsung AllShare versions 2.1.1.0 and below suffer from a NULL pointer vulnerability. Proof of concept utility included.

tags | exploit, proof of concept
systems | linux
MD5 | b9ae6217e5a0d036c6480c8218ea2349
Total Video Player 1.31 Proof Of Concept
Posted Jun 18, 2012
Authored by 0dem

Total Video Player version 1.31 crash proof of concept denial of service exploit that creates malicious files.

tags | exploit, denial of service, proof of concept
MD5 | 3503b7e865c243e96bcb8c4d05dd8d6f
Page 1 of 4
Back1234Next

File Archive:

January 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    4 Files
  • 2
    Jan 2nd
    3 Files
  • 3
    Jan 3rd
    3 Files
  • 4
    Jan 4th
    33 Files
  • 5
    Jan 5th
    31 Files
  • 6
    Jan 6th
    21 Files
  • 7
    Jan 7th
    15 Files
  • 8
    Jan 8th
    19 Files
  • 9
    Jan 9th
    1 Files
  • 10
    Jan 10th
    1 Files
  • 11
    Jan 11th
    33 Files
  • 12
    Jan 12th
    19 Files
  • 13
    Jan 13th
    27 Files
  • 14
    Jan 14th
    8 Files
  • 15
    Jan 15th
    16 Files
  • 16
    Jan 16th
    1 Files
  • 17
    Jan 17th
    2 Files
  • 18
    Jan 18th
    20 Files
  • 19
    Jan 19th
    32 Files
  • 20
    Jan 20th
    15 Files
  • 21
    Jan 21st
    10 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close