Cisco ASA crash proof of concept exploit.
49a72c843e58b62bc3926abab78f08ed
Geovision Inc. IP Camera and Video Server remote command execution proof of concept exploit.
420b8077a65259982e45e68c08322a8e
Arq version 5.10 suffers from a local privilege escalation vulnerability. Proof of concept 1 of 2.
3da3da7949403e1940cb180fdaff4d2e
Arq version 5.10 suffers from a local privilege escalation vulnerability. Proof of concept 2 of 2.
167d6d2ff29f9f810d3814645ed35ec7
Proof of concept that exploits the default typing issue in Jackson-databind via Spring application contexts and expressions.
bd94dd448499d73f15b54018b06b7f7f
Spectre information disclosure proof of concept exploit that affects multiple CPUs.
98f87055672b6c38186854b5370f5469
MikroTik version 6.40.5 kernel failure denial of service proof of concept exploit.
12c83cbcfbe3a5163c4f8fc4865dd781
MikroTik RouterBoard versions 6.39.2 and 6.40.5 DNS daemon denial of service proof of concept exploit.
c3b26684e576d6b6c58b6f3270bef359
This is a proof of concept for the Huge Dirty Cow vulnerability (CVE-2017-1000405). Before running, make sure to set transparent huge pages to "always" with "echo always | sudo tee /sys/kernel/mm/transparent_hugepage/enabled".
9d2549b018a6567383860ce3ca06d79a
Google Chrome versions prior to 62 universal cross site scripting proof of concept exploit.
ad8127eed413a23668fc4660414117ff
Xlight FTP Server version 3.8.8.5 buffer overflow proof of concept exploit.
04ca2efc16ac86410b0b8ec54d0cf44a
PTP-RAT is a proof of concept that allows data theft via screen-share protocols. Each screen flash starts with a header. This contains a magic string, "PTP-RAT-CHUNK" followed by a sequence number. When the receiver is activated, it starts taking screenshots at twice the transmission frequency (the Nyquist rate). When it detects a valid header, it decodes the pixel colour information and waits on the next flash. As soon as a valid header is not detected, it reconstructs all the flashes and saves the result to a file. To transfer a file, you run an instance of the Rat locally on your hacktop, and set that up as a receiver. Another instance is run on the remote server and this acts as a sender. You simply click on send file, and select a file to send. The mouse pointer disappears and the screen begins to flash as the file is transmitted via the pixel colour values. At the end of the transfer, a file-save dialog appears on the receiver, and the file is saved.
a9f22c83ef28df19417af14c266ee39a
This is a proof of concept exploit for the waitid bug introduced in version 4.13 of the Linux kernel. It can be used to break out of sandboxes such as that in Google Chrome.
d639706ada72778161ee250f8be0e58d
SMPlayer version 17.11.0 .m3u buffer overflow proof of concept denial of service exploit.
1bcb814e932a01009608c02420cfeeb3
Tizen Studio version 1.3 Smart Development Bridge versions prior to 2.3.2 buffer overflow proof of concept exploit.
e22467b2016604b70e379a7ceeb375e7
Easy MPEG/AVI/DIVX/WMV/RM to DVD buffer overflow proof of concept exploit.
eb38712a65a4d2609d36bab4451b164b
A proof of concept has been released that bypasses the fix for the original finding regarding an incorrect optimization in BytecodeGenerator::emitGetByVal in WebKit JSC.
c93b1f362e5c29a309a5639c5750833c
DiskBoss Enterprise version 8.4.16 buffer overflow proof of concept exploit.
d8c794bace6408671418a351c6bf5b1f
BlueBorne BlueTooth buffer overflow proof of concept exploit that causes a denial of service vulnerability on Linux kernels prior to 4.13.1.
8fe062e0b377bb75c70ddb9e02781792
Proof of concept exploit for a Microsoft Windows .NET Framework remote code execution vulnerability. It spawns mspaint.
d6acb1333fa78b74fd573adf48276c84
MessengerScan version 1.05 Hostname / IP field SEH / EIP overwrite proof of concept exploit.
d01b51ff6d93ca2535ac08f25c5e60ad
MS05-039 Scan version 1.0 hostname / IP field local buffer overflow proof of concept exploit.
220466729f7d646f04bfa6d4f96f833a
MyDoomScanner version 1.00 Hostname / IP field SEH overwrite proof of concept exploit.
edddd4e7dc4902da8543a8f7ae8f9949
DSScan version 1.0 Hostname / IP field SEH overwrite proof of concept exploit.
f87d80f851cc2e46db1143906609c748
MS05-039 Scan version 1.0 Hostname / IP field local buffer overflow proof of concept exploit.
394e9ea4b3eb977bf9e15c2d5d678161