exploit the possibilities
Showing 1 - 25 of 2,058 RSS Feed

Proof of Concept Files

Sony PlayStation 4 WebKit Code Execution
Posted Mar 8, 2019
Authored by Specter

Sony PlayStation 4 (PS4) versions prior to 6.20 webkit code execution proof of concept exploit.

tags | exploit, code execution, proof of concept
advisories | CVE-2018-4441
MD5 | 64b616b09a63dc016eada1c0c7754a6c
RealTerm Serial Terminal 2.0.0.70 Echo Port Buffer Overflow
Posted Mar 6, 2019
Authored by Matteo Malvica, Hodorsec, Alejandra Sanchez

RealTerm Serial Terminal version 2.0.0.70 suffers from an echo port buffer overflow vulnerability. Modifications to the original proof of concept include the fact that it uses a larger payload size for shellcode due to different jump offsets and filters the bad character 0x3a as this is the character for port which causes an error ":".

tags | exploit, overflow, shellcode, proof of concept
MD5 | 9b31bdb38b680b223198f700a17dcfa6
Raisecom XPON ISCOMHT803G-U_2.0.0_140521_R4.1.47.002 Remote Code Execution
Posted Mar 5, 2019
Authored by Jameel Nabbo

Raisecom XPON ISCOMHT803G-U_2.0.0_140521_R4.1.47.002 remote code execution proof of concept exploit.

tags | exploit, remote, code execution, proof of concept
advisories | CVE-2019-7385
MD5 | 3aee84bd66a663648cc9a1aadcd3d032
Microsoft Edge Chakra 1.11.4 Type Confusion
Posted Mar 4, 2019
Authored by Fahad Aid Alharbi

Microsoft Edge Chakra version 1.11.4 read permission via type confusion proof of concept exploit.

tags | exploit, proof of concept
advisories | CVE-2019-0539
MD5 | fdfbeed046784671787a8891b3bcd7f8
Drupal 8.6.9 REST Remote Code Execution
Posted Feb 25, 2019
Authored by leonjza

Drupal versions 8.6.9 and below REST service remote code execution proof of concept exploit.

tags | exploit, remote, code execution, proof of concept
advisories | CVE-2019-6340
MD5 | 4986eea49c4c20d968ca236b18bdcac1
Exploitation Framework For STMicroelectronics DVB Chipsets
Posted Feb 20, 2019
Authored by Adam Gowdiak | Site security-explorations.com

A multitude of security issues exist within STMicroelectronics DVB chipsets including, but not limited to credential leakage, buffer overflow, and data leaks. This is the full release of both the whitepaper and dozens of proof of concept details.

tags | exploit, overflow, proof of concept
MD5 | 36463dd0c95db85c29e0f6e7d4033996
Memu Play 6.0.7 Privilege Escalation
Posted Feb 20, 2019
Authored by Alejandra Sanchez

Memu Play version 6.0.7 privilege escalation proof of concept exploit.

tags | exploit, proof of concept
MD5 | 2f26018a6ea0589879b43a7afef1a851
snapd 2.37 (Ubuntu) dirty_sock Local Privilege Escalation
Posted Feb 13, 2019
Authored by Chris Moberly

This exploit bypasses access control checks to use a restricted API function (POST /v2/snaps) of the local snapd service. This allows the installation of arbitrary snaps. Snaps in "devmode" bypass the sandbox and may include an "install hook" that is run in the context of root at install time. dirty_sockv2 leverages the vulnerability to install an empty "devmode" snap including a hook that adds a new user to the local system. This user will have permissions to execute sudo commands. As opposed to version one, this does not require the SSH service to be running. It will also work on newer versions of Ubuntu with no Internet connection at all, making it resilient to changes and effective in restricted environments. This exploit should also be effective on non-Ubuntu systems that have installed snapd but that do not support the "create-user" API due to incompatible Linux shell syntax. Some older Ubuntu systems (like 16.04) may not have the snapd components installed that are required for sideloading. If this is the case, this version of the exploit may trigger it to install those dependencies. During that installation, snapd may upgrade itself to a non-vulnerable version. Testing shows that the exploit is still successful in this scenario. This is the second of two proof of concepts related to this issue. Versions below 2.37.1 are affected.

tags | exploit, arbitrary, shell, local, root, proof of concept
systems | linux, ubuntu
advisories | CVE-2019-7304
MD5 | e9db49ddfa940a474a61af831e403fe3
snapd 2.37 (Ubuntu) dirty_sock Local Privilege Escalation
Posted Feb 13, 2019
Authored by Chris Moberly

This exploit bypasses access control checks to use a restricted API function (POST /v2/create-user) of the local snapd service. This queries the Ubuntu SSO for a username and public SSH key of a provided email address, and then creates a local user based on these value. Successful exploitation for this version requires an outbound Internet connection and an SSH service accessible via localhost. This is one of two proof of concepts related to this issue. Versions below 2.37.1 are affected.

tags | exploit, local, proof of concept
systems | linux, ubuntu
advisories | CVE-2019-7304
MD5 | 0dcbfdab6f37dbe3458ba63c7f68ffc7
runc Host Command Execution
Posted Feb 13, 2019
Authored by FEEXD

runc versions prior to 1.0-rc6 (Docker < 18.09.2 host command execution proof of concept exploit.

tags | exploit, proof of concept
advisories | CVE-2019-5736
MD5 | 4c9bbc256e33551d234d6062a2f9d9a8
River Past Audio Converter 7.7.16 Denial Of Service
Posted Feb 6, 2019
Authored by Achilles

River Past Audio Converter version 7.7.16 denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
MD5 | 02b6fb485b21ee34945ef72cb05ca9e1
Device Monitoring Studio 8.10.00.8925 Denial Of Service
Posted Feb 6, 2019
Authored by Victor Mondragon

Device Monitoring Studio version 8.10.00.8925 denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
MD5 | 8e87f007e01aa3082e704d734b2d9e09
LibSSH 0.7.6 / 0.8.4 Unauthorized Access
Posted Feb 3, 2019
Authored by JAS502N

LibSSH versions 0.7.6 and 0.8.4 unauthorized access proof of concept exploit.

tags | exploit, proof of concept
advisories | CVE-2018-10933
MD5 | b72473cb445228a611c955229548f5aa
Remote Process Explorer 1.0.0.16 Denial Of Service
Posted Feb 2, 2019
Authored by Rafael Pedrero

Remote Process Explorer version 1.0.0.16 denial of service proof of concept exploit with SEH overwrite.

tags | exploit, remote, denial of service, proof of concept
MD5 | c6545e34b4b586d8d94e80af7c754321
FlexHEX 2.46 Denial Of Service
Posted Feb 1, 2019
Authored by Rafael Pedrero

FlexHEX version 2.46 denial of service proof of concept exploit with SEH overwrite.

tags | exploit, denial of service, proof of concept
MD5 | c88caddada53e191e4cd6969d144f8d1
Advanced Host Monitor 11.90 Beta Denial Of Service
Posted Feb 1, 2019
Authored by Luis Martinez

Advanced Host Monitor version 11.90 Beta registration number denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
MD5 | 9b45d9752d7336e436b882a3ea7ee9e0
Advanced File Manager 3.4.1 Denial Of Service
Posted Jan 30, 2019
Authored by Rafael Pedrero

Advanced File Manager version 3.4.1 denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
MD5 | bdf06eb3f4224acb235334304ae28ef1
IP-Tools 2.50 Denial Of Service
Posted Jan 30, 2019
Authored by Rafael Pedrero

IP-Tools version 2.50 denial of service SEH overwrite proof of concept exploit.

tags | exploit, denial of service, proof of concept
MD5 | c16d7e82936663bab7dd19978c93e5f9
Necrosoft DIG 0.4 Denial Of Service
Posted Jan 30, 2019
Authored by Rafael Pedrero

Necrosoft DIG version 0.4 denial of service SEH overwrite proof of concept exploit.

tags | exploit, denial of service, proof of concept
MD5 | 31a32a06eac7e6728d0a318e795237ec
Python GnuPG 0.4.3 Improper Input Validation
Posted Jan 25, 2019
Authored by Stig Palmquist, Alexander Kjall

Researchers discovered a way to inject data through the passphrase property of the gnupg.GPG.encrypt() and gnupg.GPG.decrypt() methods when symmetric encryption is used. The supplied passphrase is not validated for newlines, and the library passes --passphrase-fd=0 to the gpg executable, which expects the passphrase on the first line of stdin, and the ciphertext to be decrypted or plaintext to be encrypted on subsequent lines. By supplying a passphrase containing a newline an attacker can control/modify the ciphertext/plaintext being decrypted/encrypted. Proof of concept exploit included. Version 0.4.3 is affected.

tags | exploit, proof of concept
advisories | CVE-2019-6690
MD5 | e016c88b0480fac6a3d286a496f1edac
Microsoft Windows VCF Arbitrary Code Execution
Posted Jan 22, 2019
Authored by Eduardo Braun Prado

Microsoft Windows VCF or Contact file URL manipulation arbitrary code execution proof of concept exploit. Tested on Windows 7 SP1, 8.1, 10 v.1809 with full patches up to January 2019. Both x86 and x64 architectures were tested.

tags | exploit, arbitrary, x86, code execution, proof of concept
systems | windows, 7
MD5 | 094fed868f7fb979125879d67bb9e5a4
unCaptcha2 - Google ReCaptcha Proof Of Concept
Posted Jan 3, 2019
Authored by Dave Levin, George Hughey, Daven Patel, Kevin Bock | Site uncaptcha.cs.umd.edu

unCaptcha2 is a proof of concept that defeats the latest version of ReCaptcha with 91% accuracy as of January, 2019.

tags | exploit, proof of concept
MD5 | 324783751fd33b1eca1f3a4a4c58cf33
Armitage 1.14.11 Denial Of Service
Posted Dec 26, 2018
Authored by Mr Winst0n

Armitage version 1.14.11 denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
MD5 | 7d88223dda5f792f87ac9c9c1fa98f1d
NetShareWatcher 1.5.8 Denial Of Service
Posted Dec 25, 2018
Authored by T3jv1l

NetShareWatcher version 1.5.8 denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
MD5 | c658449d9705d7121cbd705ac8bf8b06
ShareAlarmPro 2.1.4 Denial Of Service
Posted Dec 25, 2018
Authored by T3jv1l

ShareAlarmPro version 2.1.4 denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
MD5 | 102923f5ffe5016b2cd399b417621780
Page 1 of 83
Back12345Next

File Archive:

March 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    15 Files
  • 2
    Mar 2nd
    5 Files
  • 3
    Mar 3rd
    3 Files
  • 4
    Mar 4th
    25 Files
  • 5
    Mar 5th
    20 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    12 Files
  • 9
    Mar 9th
    3 Files
  • 10
    Mar 10th
    4 Files
  • 11
    Mar 11th
    23 Files
  • 12
    Mar 12th
    12 Files
  • 13
    Mar 13th
    12 Files
  • 14
    Mar 14th
    19 Files
  • 15
    Mar 15th
    12 Files
  • 16
    Mar 16th
    3 Files
  • 17
    Mar 17th
    1 Files
  • 18
    Mar 18th
    15 Files
  • 19
    Mar 19th
    22 Files
  • 20
    Mar 20th
    14 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    15 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close