Exploit the possiblities
Showing 101 - 125 of 1,938 RSS Feed

Proof of Concept Files

Android Broadcom Wi-Fi Driver Memory Corruption
Posted May 11, 2016
Authored by AbdSec

Android Broadcom Wi-Fi driver memory corruption proof of concept exploit.

tags | exploit, proof of concept
advisories | CVE-2016-0801
MD5 | 225cdfa780cf529ef6e597c18f9da528
Wireshark dissect_2008_16_security_4 Buffer Overflow
Posted May 1, 2016
Authored by Google Security Research, mjurczyk

The included proof of concept causes a crash due to a stack-based buffer overflow in Wireshark in dissect_2008_16_security_4.

tags | exploit, overflow, proof of concept
systems | linux
MD5 | c80ce6da69df2c0aa0946e7bc39e72f2
Yasr 0.6.9-5 Buffer Overflow
Posted Apr 26, 2016
Authored by Juan Sacco

Yasr console screen reader version 0.6.9-5 proof of concept buffer overflow exploit.

tags | exploit, overflow, proof of concept
MD5 | 0c29a4801678f46ec428371630318ae6
RATS 2.3 Crash Proof Of Concept
Posted Apr 25, 2016
Authored by David Silveiro

Rough Auditing Tool for Security (RATS) version 2.3 crash proof of concept code that results in a denial of service.

tags | exploit, denial of service, proof of concept
MD5 | f920ad889b61ec1bb93b3dbc8f4da9c6
IBM Java Issue 70 Bad Patch
Posted Apr 12, 2016
Authored by Adam Gowdiak | Site security-explorations.com

The patch for Issue 70 in IBM Java discovered by Security Explorations in 2013 was found to be faulty. Included are the full report and a proof of concept.

tags | exploit, java, proof of concept
systems | linux
advisories | CVE-2013-5456
MD5 | 0d5c6c7e0a9744495ab910305201e727
Xion Audio Player 1.5 Denial Of Service
Posted Apr 1, 2016
Authored by Charley Celice

Xion Audio Player versions 1.5 build 160 and below local proof of concept crash exploit.

tags | exploit, denial of service, local, proof of concept
MD5 | 45b6768d8cf6e6bcf96cbfc7d0019c7c
Windows Kernel NtGdiGetTextExtentExW Out-Of-Bounds Memory Read
Posted Mar 31, 2016
Authored by Google Security Research, hawkes

The included proof of concept crashes Windows 7 with special pool enabled on win32k.sys. The crash is due to accessing memory past the end of a buffer.

tags | exploit, proof of concept
systems | linux, windows, 7
advisories | CVE-2016-0093
MD5 | e05989cd4b370bea012d96b631c5ffc0
Android ih264d_process_intra_mb Memory Corruption
Posted Mar 31, 2016
Authored by Google Security Research, natashenka

The included proof of concept causes a crash in ih264d_process_intra_mb in avc parsing, likely due to incorrect bounds checking in one of the memcpy or memset calls in the method.

tags | exploit, proof of concept
systems | linux
MD5 | a4df13bd861ddd22c72fd635514ea67a
Apple Quicktime FPX / PSD File Parsing Memory Corruption
Posted Mar 30, 2016
Authored by Francis Provencher

Apple Quicktime versions prior to 7.7.79.80.95 suffer from .fpx and .psd file parsing memory corruption vulnerabilities. Multiple proof of concepts included.

tags | exploit, vulnerability, proof of concept
systems | linux, apple
advisories | CVE-2016-1767, CVE-2016-1768, CVE-2016-1769
MD5 | 3c5a29ece12ebdfba29f33d2077a59cd
Wildfly Filter Restriction Bypass / Information Disclosure
Posted Mar 21, 2016
Authored by Tal Solomon

Wildfly versions prior to 10.0.0.Final, including 9.0.2.Final, and 8.2.1.Final suffer from a WEB-INF and META-INF information disclosure issue via a filter restriction bypass vulnerability. Video included showing the proof of concept.

tags | exploit, web, proof of concept, bypass, info disclosure
systems | linux
advisories | CVE-2016-0793
MD5 | 552cf1689a4ca3d334fbbb88f6f4b414
Oracle Java Security Fix Bypass
Posted Mar 11, 2016
Authored by Adam Gowdiak | Site security-explorations.com

Security Explorations has released details and a proof of concept to bypass a broken security fix found in the Oracle Java SE fix from September, 2013.

tags | exploit, java, proof of concept
systems | linux
advisories | CVE-2013-5838
MD5 | 369b993c622ffb5038ab3ff0a3006afc
PuTTY / PSCP 0.66 Buffer Overflow
Posted Mar 11, 2016
Authored by oststrom

PuTTY / PSCP versions 0.66 and below suffer from a buffer overflow vulnerability. Proof of concept code included.

tags | exploit, overflow, proof of concept
systems | linux
advisories | CVE-2016-2563
MD5 | c5b8e728b962930bf0eae0a769870df8
GpicView 0.2.5 Buffer Overflow
Posted Feb 29, 2016
Authored by David Silveiro

GpicView version 0.2.5 buffer overflow crash proof of concept exploit.

tags | exploit, overflow, proof of concept
MD5 | 5904a127e7670c9e654d95baa5d95ed3
Core FTP Server 1.2 Buffer Overflow
Posted Feb 23, 2016
Authored by INSECT.B

Core FTP Server version 1.2 buffer overflow proof of concept exploit.

tags | exploit, overflow, proof of concept
MD5 | 6c9e003125e6fe84ce006abc7a63f8bd
STIMS Cutter 1.1.3.20 SEH Overwrite Buffer Overflow
Posted Feb 19, 2016
Authored by Shantanu Khandelwal

STIMS Cutter version 1.1.3.20 overflow proof of concept with SEH overwrite.

tags | exploit, overflow, proof of concept
MD5 | ce278106f77ad4800d23ea3041f0990e
CJExploiter 1.0.0
Posted Feb 18, 2016
Authored by Farzin

CJExploiter is a drag and drop ClickJacking exploit development assistance tool. First open the "index.html" with your browser locally and enter target URL and click on "View Site". You can dynamically create your own inputs. Finally by clicking the "Exploit It" button you can see the proof of concept.

tags | tool, proof of concept
systems | unix
MD5 | 96e52b02022b5e8833c2248ad07b0b24
Adobe Flash Sound.loadPCMFromByteArray Dangling Pointer
Posted Feb 17, 2016
Authored by Google Security Research, natashenka

There is a dangling pointer that can be read, but not written to in loadPCMFromByteArray. A proof of concept is included.

tags | exploit, proof of concept
systems | linux
advisories | CVE-2016-0984
MD5 | d9a96009aa0e74c0fb2788f487ab68dd
glibc getaddrinfo Stack-Based Buffer Overflow
Posted Feb 17, 2016
Authored by Fermin J. Serna, Kevin Stadmeyer | Site googleonlinesecurity.blogspot.com

glibc reserves 2048 bytes in the stack through alloca() for the DNS answer at _nss_dns_gethostbyname4_r() for hosting responses to a DNS query. Later on, at send_dg() and send_vc(), if the response is larger than 2048 bytes, a new buffer is allocated from the heap and all the information (buffer pointer, new buffer size and response size) is updated. Under certain conditions a mismatch between the stack buffer and the new heap allocation will happen. The final effect is that the stack buffer will be used to store the DNS response, even though the response is larger than the stack buffer and a heap buffer was allocated. This behavior leads to the stack buffer overflow. Included in this archive is a copy of the Google Security blog post and proof of concept code that demonstrates the vulnerability.

tags | exploit, overflow, proof of concept
systems | linux
advisories | CVE-2015-7547
MD5 | 5ca816f1d5b6f51ee9db2cab14ca2a96
Network Scanner 4.0.0.0 SEH Crash Proof Of Concept
Posted Feb 15, 2016
Authored by INSECT.B

Network Scanner version 4.0.0.0 SEH crash proof of concept exploit.

tags | exploit, proof of concept
MD5 | fb160e57dfefe27495d8dfea5297e7bc
Adobe Photoshop CC 16.1.1 / Bridge CC 6.1.1 Memory Corruption
Posted Feb 12, 2016
Authored by Francis Provencher

Adobe Photoshop CC versions 16.1.1 (2015.1.1) and below and Bridge CC versions 6.1.1 and below suffer from multiple memory corruption vulnerabilities. Proof of concept files included.

tags | exploit, vulnerability, proof of concept
systems | linux
advisories | CVE-2016-0951, CVE-2016-0952, CVE-2016-0953
MD5 | b3e490463576d3b4ad4537389f6f3139
Microsoft Windows WebDAV BSoD Proof Of Concept
Posted Feb 12, 2016
Authored by koczkatamas

Microsoft Windows WebDAV blue screen of death denial of service proof of concept exploit that leverages the vulnerability outlined in MS16-016.

tags | exploit, denial of service, proof of concept
systems | windows
advisories | CVE-2016-0051
MD5 | 423f7cd1a32ca960ef14733ee2dd7b65
Samsung Galaxy S6 Android.media.process Face Recognition Memory Corruption
Posted Feb 7, 2016
Authored by Google Security Research, natashenka

This proof of concept file causes memory corruption when it is scanned by the face recognition library in android.media.process.

tags | exploit, proof of concept
systems | linux
MD5 | dea9ba225479ebfa9d3367b39aa8f9a6
Android Libstagefright Tag Parsing Heap Buffer Overflow
Posted Jan 27, 2016
Authored by Google Security Research, scvitti

This proof of concept demonstrates the Android Libstagefright heap buffer overflow that occurs due to an integer overflow in MP3 ID3 tag parsing.

tags | exploit, overflow, proof of concept
systems | linux
advisories | CVE-2015-6604
MD5 | ff9b3227da297d81a6576c0ad5330a06
Adobe Flash Stage Setting Use-After-Free
Posted Jan 9, 2016
Authored by Google Security Research, mjurczyk

Proof of concept code that demonstrates a use-after-free when setting stage in Adobe Flash.

tags | exploit, proof of concept
systems | linux
advisories | CVE-2015-8634
MD5 | 12a73f95928808527a6b1a814379fd1a
Microsoft Windows Kernel Win32k!OffsetChildren Null Pointer Dereference
Posted Dec 18, 2015
Authored by Nils, Google Security Research

This proof of concept exploit triggers a null pointer vulnerability in OffsetChildren on Windows 7 32-bit. By mapping the null page an attacker can leverage this vulnerability to write to an arbitrary address.

tags | exploit, arbitrary, proof of concept
systems | linux, windows, 7
advisories | CVE-2015-6171
MD5 | 22fc86d3464aaadd67a48f82e434c1c1
Page 5 of 78
Back34567Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

February 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    15 Files
  • 2
    Feb 2nd
    15 Files
  • 3
    Feb 3rd
    15 Files
  • 4
    Feb 4th
    13 Files
  • 5
    Feb 5th
    16 Files
  • 6
    Feb 6th
    15 Files
  • 7
    Feb 7th
    15 Files
  • 8
    Feb 8th
    15 Files
  • 9
    Feb 9th
    18 Files
  • 10
    Feb 10th
    8 Files
  • 11
    Feb 11th
    8 Files
  • 12
    Feb 12th
    17 Files
  • 13
    Feb 13th
    15 Files
  • 14
    Feb 14th
    15 Files
  • 15
    Feb 15th
    17 Files
  • 16
    Feb 16th
    18 Files
  • 17
    Feb 17th
    37 Files
  • 18
    Feb 18th
    2 Files
  • 19
    Feb 19th
    16 Files
  • 20
    Feb 20th
    16 Files
  • 21
    Feb 21st
    15 Files
  • 22
    Feb 22nd
    16 Files
  • 23
    Feb 23rd
    31 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close