the original cloud security
Showing 76 - 100 of 1,922 RSS Feed

Proof of Concept Files

Microsoft Windows Forced Firewall Bypass
Posted Jun 2, 2016
Authored by coolervoid

This is a local proof of concept that simulates a keystroke to allow access when a firewall dialog comes up.

tags | exploit, local, proof of concept
MD5 | d47cdc89cc210d8e606aef4485efe7d2
TCPDump 4.5.1 Crash Proof Of Concept
Posted Jun 1, 2016
Authored by David Silveiro

TCPDump version 4.5.1 crash proof of concept exploit.

tags | exploit, proof of concept
MD5 | fd5659592e9063d05734e03b5002c683
Internet Explorer 8 User Mode Write AV
Posted Jun 1, 2016
Authored by Cody Sixteen

Microsoft Internet Explorer 8 user mode write AV proof of concept code.

tags | exploit, proof of concept
MD5 | 3ed11c876435e5b4f2357911922d9caa
Microsoft Internet Explorer 8 Divide By Zero Proof Of Concept
Posted May 30, 2016
Authored by Cody Sixteen

Microsoft Internet Explorer divide by zero proof of concept denial of service exploit.

tags | exploit, denial of service, proof of concept
MD5 | 023604e7336d88153edad098a13b2cf1
PowerFolder 10.4.321 Remote Code Execution
Posted May 24, 2016
Authored by Hans-Martin Muench

PowerFolder version 10.4.321 suffers from a remote code execution vulnerability. Proof of concept exploit included.

tags | exploit, remote, code execution, proof of concept
systems | linux
MD5 | 34c531d3d004a2411ee6ee63cfe6fd46
LG NAS N1A1 10119 Access Bypass / Directory Traversal / SQL Injection
Posted May 19, 2016
Authored by Gergely Eberhardt

LG NAS N1A1 version 10119 suffers from insecure direct object reference, SQL injection, directory traversal, arbitrary file upload/download, and sensitive information disclosure vulnerabilities. Full proof of concept exploit included.

tags | exploit, arbitrary, vulnerability, sql injection, proof of concept, info disclosure, file upload
MD5 | f3d1592fda0e69b32e25049543d0f95a
Adobe Reader DC 15.010.20060 Memory Corruption
Posted May 12, 2016
Authored by Pier-Luc Maltais

Adobe Reader DC versions 15.010.20060 and below memory corruption proof of concept exploit.

tags | exploit, proof of concept
systems | linux
advisories | CVE-2016-1077
MD5 | 65f99d20b7b57f87b318258170273847
Ipswitch WS_FTP LE 12.3 SEH Overwrite
Posted May 12, 2016
Authored by Zahid Adeel

Ipswitch WS_FTP LE version 12.3 search field SEH overwrite proof of concept exploit.

tags | exploit, proof of concept
MD5 | 41f32eb7834dd78325018e663a18101f
CIScan 1.00 SEH Overwrite
Posted May 11, 2016
Authored by Nipun Jaswal

CIScan version 1.00 hostname/IP field SEH overwrite proof of concept exploit.

tags | exploit, proof of concept
MD5 | c3c0359fb54254d1870bc180a8ca5ece
Android Broadcom Wi-Fi Driver Memory Corruption
Posted May 11, 2016
Authored by AbdSec

Android Broadcom Wi-Fi driver memory corruption proof of concept exploit.

tags | exploit, proof of concept
advisories | CVE-2016-0801
MD5 | 225cdfa780cf529ef6e597c18f9da528
Wireshark dissect_2008_16_security_4 Buffer Overflow
Posted May 1, 2016
Authored by Google Security Research, mjurczyk

The included proof of concept causes a crash due to a stack-based buffer overflow in Wireshark in dissect_2008_16_security_4.

tags | exploit, overflow, proof of concept
systems | linux
MD5 | c80ce6da69df2c0aa0946e7bc39e72f2
Yasr 0.6.9-5 Buffer Overflow
Posted Apr 26, 2016
Authored by Juan Sacco

Yasr console screen reader version 0.6.9-5 proof of concept buffer overflow exploit.

tags | exploit, overflow, proof of concept
MD5 | 0c29a4801678f46ec428371630318ae6
RATS 2.3 Crash Proof Of Concept
Posted Apr 25, 2016
Authored by David Silveiro

Rough Auditing Tool for Security (RATS) version 2.3 crash proof of concept code that results in a denial of service.

tags | exploit, denial of service, proof of concept
MD5 | f920ad889b61ec1bb93b3dbc8f4da9c6
IBM Java Issue 70 Bad Patch
Posted Apr 12, 2016
Authored by Adam Gowdiak | Site security-explorations.com

The patch for Issue 70 in IBM Java discovered by Security Explorations in 2013 was found to be faulty. Included are the full report and a proof of concept.

tags | exploit, java, proof of concept
systems | linux
advisories | CVE-2013-5456
MD5 | 0d5c6c7e0a9744495ab910305201e727
Xion Audio Player 1.5 Denial Of Service
Posted Apr 1, 2016
Authored by Charley Celice

Xion Audio Player versions 1.5 build 160 and below local proof of concept crash exploit.

tags | exploit, denial of service, local, proof of concept
MD5 | 45b6768d8cf6e6bcf96cbfc7d0019c7c
Windows Kernel NtGdiGetTextExtentExW Out-Of-Bounds Memory Read
Posted Mar 31, 2016
Authored by Google Security Research, hawkes

The included proof of concept crashes Windows 7 with special pool enabled on win32k.sys. The crash is due to accessing memory past the end of a buffer.

tags | exploit, proof of concept
systems | linux, windows, 7
advisories | CVE-2016-0093
MD5 | e05989cd4b370bea012d96b631c5ffc0
Android ih264d_process_intra_mb Memory Corruption
Posted Mar 31, 2016
Authored by Google Security Research, natashenka

The included proof of concept causes a crash in ih264d_process_intra_mb in avc parsing, likely due to incorrect bounds checking in one of the memcpy or memset calls in the method.

tags | exploit, proof of concept
systems | linux
MD5 | a4df13bd861ddd22c72fd635514ea67a
Apple Quicktime FPX / PSD File Parsing Memory Corruption
Posted Mar 30, 2016
Authored by Francis Provencher

Apple Quicktime versions prior to 7.7.79.80.95 suffer from .fpx and .psd file parsing memory corruption vulnerabilities. Multiple proof of concepts included.

tags | exploit, vulnerability, proof of concept
systems | linux, apple
advisories | CVE-2016-1767, CVE-2016-1768, CVE-2016-1769
MD5 | 3c5a29ece12ebdfba29f33d2077a59cd
Wildfly Filter Restriction Bypass / Information Disclosure
Posted Mar 21, 2016
Authored by Tal Solomon

Wildfly versions prior to 10.0.0.Final, including 9.0.2.Final, and 8.2.1.Final suffer from a WEB-INF and META-INF information disclosure issue via a filter restriction bypass vulnerability. Video included showing the proof of concept.

tags | exploit, web, proof of concept, bypass, info disclosure
systems | linux
advisories | CVE-2016-0793
MD5 | 552cf1689a4ca3d334fbbb88f6f4b414
Oracle Java Security Fix Bypass
Posted Mar 11, 2016
Authored by Adam Gowdiak | Site security-explorations.com

Security Explorations has released details and a proof of concept to bypass a broken security fix found in the Oracle Java SE fix from September, 2013.

tags | exploit, java, proof of concept
systems | linux
advisories | CVE-2013-5838
MD5 | 369b993c622ffb5038ab3ff0a3006afc
PuTTY / PSCP 0.66 Buffer Overflow
Posted Mar 11, 2016
Authored by oststrom

PuTTY / PSCP versions 0.66 and below suffer from a buffer overflow vulnerability. Proof of concept code included.

tags | exploit, overflow, proof of concept
systems | linux
advisories | CVE-2016-2563
MD5 | c5b8e728b962930bf0eae0a769870df8
GpicView 0.2.5 Buffer Overflow
Posted Feb 29, 2016
Authored by David Silveiro

GpicView version 0.2.5 buffer overflow crash proof of concept exploit.

tags | exploit, overflow, proof of concept
MD5 | 5904a127e7670c9e654d95baa5d95ed3
Core FTP Server 1.2 Buffer Overflow
Posted Feb 23, 2016
Authored by INSECT.B

Core FTP Server version 1.2 buffer overflow proof of concept exploit.

tags | exploit, overflow, proof of concept
MD5 | 6c9e003125e6fe84ce006abc7a63f8bd
STIMS Cutter 1.1.3.20 SEH Overwrite Buffer Overflow
Posted Feb 19, 2016
Authored by Shantanu Khandelwal

STIMS Cutter version 1.1.3.20 overflow proof of concept with SEH overwrite.

tags | exploit, overflow, proof of concept
MD5 | ce278106f77ad4800d23ea3041f0990e
CJExploiter 1.0.0
Posted Feb 18, 2016
Authored by Farzin

CJExploiter is a drag and drop ClickJacking exploit development assistance tool. First open the "index.html" with your browser locally and enter target URL and click on "View Site". You can dynamically create your own inputs. Finally by clicking the "Exploit It" button you can see the proof of concept.

tags | tool, proof of concept
systems | unix
MD5 | 96e52b02022b5e8833c2248ad07b0b24
Page 4 of 77
Back23456Next

File Archive:

October 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    15 Files
  • 2
    Oct 2nd
    16 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    11 Files
  • 6
    Oct 6th
    6 Files
  • 7
    Oct 7th
    2 Files
  • 8
    Oct 8th
    1 Files
  • 9
    Oct 9th
    13 Files
  • 10
    Oct 10th
    16 Files
  • 11
    Oct 11th
    15 Files
  • 12
    Oct 12th
    23 Files
  • 13
    Oct 13th
    13 Files
  • 14
    Oct 14th
    12 Files
  • 15
    Oct 15th
    2 Files
  • 16
    Oct 16th
    16 Files
  • 17
    Oct 17th
    16 Files
  • 18
    Oct 18th
    15 Files
  • 19
    Oct 19th
    10 Files
  • 20
    Oct 20th
    7 Files
  • 21
    Oct 21st
    4 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close