exploit the possibilities
Showing 101 - 125 of 2,164 RSS Feed

Proof of Concept Files

AnMing MP3 CD Burner 2.0 Denial Of Service
Posted Apr 25, 2019
Authored by Achilles

AnMing MP3 CD Burner version 2.0 denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
MD5 | 024d0566053378f92fe0dda13a47472a
Google Chrome 73.0.3683.103 V8 JavaScript Engine Denial Of Service
Posted Apr 22, 2019
Authored by Bogdan Kurinnoy

Google Chrome version 73.0.3683.103 V8 JavaScript Engine out-of-memory in invalid table size denial of service proof of concept exploit.

tags | exploit, denial of service, javascript, proof of concept
MD5 | 5b21bbbc8965966812bc51d2fe34bb3f
Ease Audio Converter 5.30 Denial Of Service
Posted Apr 22, 2019
Authored by Achilles

Ease Audio Converter version 5.30 .mp4 denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
MD5 | 3941c264054fddc13021529d5bcc2391
Netwide Assembler (NASM) 2.14rc15 Null Pointer Dereference
Posted Apr 18, 2019
Authored by Fakhri Zulkifli

Netwide Assembler (NASM) version 2.14rc15 null pointer dereference proof of concept exploit.

tags | exploit, proof of concept
advisories | CVE-2018-16517
MD5 | c9178a3a96fda40a13f7581eef7e69fc
ImageTragick ImageMagick Proof Of Concepts
Posted Apr 2, 2019
Authored by Ian Foster

Aptly named ImageTragick, this archive holds various proof of concept exploits for a code execution vulnerability in ImageMagick.

tags | exploit, code execution, proof of concept
advisories | CVE-2016-3714
MD5 | 95961e24ebf2b999f5c7a8f097e77cb7
Microsoft Windows Win32k CVE-2019-0808 Local Privilege Escalation
Posted Mar 27, 2019
Authored by ze0r

Microsoft Windows Win32k local privilege escalation proof of concept exploit.

tags | exploit, local, proof of concept
systems | windows
advisories | CVE-2019-0808
MD5 | 54d60becfca69a9adfa1742ac481ac3e
Sony PlayStation 4 WebKit Code Execution
Posted Mar 8, 2019
Authored by Specter

Sony PlayStation 4 (PS4) versions prior to 6.20 webkit code execution proof of concept exploit.

tags | exploit, code execution, proof of concept
advisories | CVE-2018-4441
MD5 | 64b616b09a63dc016eada1c0c7754a6c
RealTerm Serial Terminal 2.0.0.70 Echo Port Buffer Overflow
Posted Mar 6, 2019
Authored by Matteo Malvica, Hodorsec, Alejandra Sanchez

RealTerm Serial Terminal version 2.0.0.70 suffers from an echo port buffer overflow vulnerability. Modifications to the original proof of concept include the fact that it uses a larger payload size for shellcode due to different jump offsets and filters the bad character 0x3a as this is the character for port which causes an error ":".

tags | exploit, overflow, shellcode, proof of concept
MD5 | 9b31bdb38b680b223198f700a17dcfa6
Raisecom XPON ISCOMHT803G-U_2.0.0_140521_R4.1.47.002 Remote Code Execution
Posted Mar 5, 2019
Authored by Jameel Nabbo

Raisecom XPON ISCOMHT803G-U_2.0.0_140521_R4.1.47.002 remote code execution proof of concept exploit.

tags | exploit, remote, code execution, proof of concept
advisories | CVE-2019-7385
MD5 | 3aee84bd66a663648cc9a1aadcd3d032
Microsoft Edge Chakra 1.11.4 Type Confusion
Posted Mar 4, 2019
Authored by Fahad Aid Alharbi

Microsoft Edge Chakra version 1.11.4 read permission via type confusion proof of concept exploit.

tags | exploit, proof of concept
advisories | CVE-2019-0539
MD5 | fdfbeed046784671787a8891b3bcd7f8
Drupal 8.6.9 REST Remote Code Execution
Posted Feb 25, 2019
Authored by leonjza

Drupal versions 8.6.9 and below REST service remote code execution proof of concept exploit.

tags | exploit, remote, code execution, proof of concept
advisories | CVE-2019-6340
MD5 | 4986eea49c4c20d968ca236b18bdcac1
Exploitation Framework For STMicroelectronics DVB Chipsets
Posted Feb 20, 2019
Authored by Adam Gowdiak | Site security-explorations.com

A multitude of security issues exist within STMicroelectronics DVB chipsets including, but not limited to credential leakage, buffer overflow, and data leaks. This is the full release of both the whitepaper and dozens of proof of concept details.

tags | exploit, overflow, proof of concept
MD5 | 36463dd0c95db85c29e0f6e7d4033996
Memu Play 6.0.7 Privilege Escalation
Posted Feb 20, 2019
Authored by Alejandra Sanchez

Memu Play version 6.0.7 privilege escalation proof of concept exploit.

tags | exploit, proof of concept
MD5 | 2f26018a6ea0589879b43a7afef1a851
snapd 2.37 (Ubuntu) dirty_sock Local Privilege Escalation
Posted Feb 13, 2019
Authored by Chris Moberly

This exploit bypasses access control checks to use a restricted API function (POST /v2/snaps) of the local snapd service. This allows the installation of arbitrary snaps. Snaps in "devmode" bypass the sandbox and may include an "install hook" that is run in the context of root at install time. dirty_sockv2 leverages the vulnerability to install an empty "devmode" snap including a hook that adds a new user to the local system. This user will have permissions to execute sudo commands. As opposed to version one, this does not require the SSH service to be running. It will also work on newer versions of Ubuntu with no Internet connection at all, making it resilient to changes and effective in restricted environments. This exploit should also be effective on non-Ubuntu systems that have installed snapd but that do not support the "create-user" API due to incompatible Linux shell syntax. Some older Ubuntu systems (like 16.04) may not have the snapd components installed that are required for sideloading. If this is the case, this version of the exploit may trigger it to install those dependencies. During that installation, snapd may upgrade itself to a non-vulnerable version. Testing shows that the exploit is still successful in this scenario. This is the second of two proof of concepts related to this issue. Versions below 2.37.1 are affected.

tags | exploit, arbitrary, shell, local, root, proof of concept
systems | linux, ubuntu
advisories | CVE-2019-7304
MD5 | e9db49ddfa940a474a61af831e403fe3
snapd 2.37 (Ubuntu) dirty_sock Local Privilege Escalation
Posted Feb 13, 2019
Authored by Chris Moberly

This exploit bypasses access control checks to use a restricted API function (POST /v2/create-user) of the local snapd service. This queries the Ubuntu SSO for a username and public SSH key of a provided email address, and then creates a local user based on these value. Successful exploitation for this version requires an outbound Internet connection and an SSH service accessible via localhost. This is one of two proof of concepts related to this issue. Versions below 2.37.1 are affected.

tags | exploit, local, proof of concept
systems | linux, ubuntu
advisories | CVE-2019-7304
MD5 | 0dcbfdab6f37dbe3458ba63c7f68ffc7
runc Host Command Execution
Posted Feb 13, 2019
Authored by FEEXD

runc versions prior to 1.0-rc6 (Docker < 18.09.2 host command execution proof of concept exploit.

tags | exploit, proof of concept
advisories | CVE-2019-5736
MD5 | 4c9bbc256e33551d234d6062a2f9d9a8
River Past Audio Converter 7.7.16 Denial Of Service
Posted Feb 6, 2019
Authored by Achilles

River Past Audio Converter version 7.7.16 denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
MD5 | 02b6fb485b21ee34945ef72cb05ca9e1
Device Monitoring Studio 8.10.00.8925 Denial Of Service
Posted Feb 6, 2019
Authored by Victor Mondragon

Device Monitoring Studio version 8.10.00.8925 denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
MD5 | 8e87f007e01aa3082e704d734b2d9e09
LibSSH 0.7.6 / 0.8.4 Unauthorized Access
Posted Feb 3, 2019
Authored by JAS502N

LibSSH versions 0.7.6 and 0.8.4 unauthorized access proof of concept exploit.

tags | exploit, proof of concept
advisories | CVE-2018-10933
MD5 | b72473cb445228a611c955229548f5aa
Remote Process Explorer 1.0.0.16 Denial Of Service
Posted Feb 2, 2019
Authored by Rafael Pedrero

Remote Process Explorer version 1.0.0.16 denial of service proof of concept exploit with SEH overwrite.

tags | exploit, remote, denial of service, proof of concept
MD5 | c6545e34b4b586d8d94e80af7c754321
FlexHEX 2.46 Denial Of Service
Posted Feb 1, 2019
Authored by Rafael Pedrero

FlexHEX version 2.46 denial of service proof of concept exploit with SEH overwrite.

tags | exploit, denial of service, proof of concept
MD5 | c88caddada53e191e4cd6969d144f8d1
Advanced Host Monitor 11.90 Beta Denial Of Service
Posted Feb 1, 2019
Authored by Luis Martinez

Advanced Host Monitor version 11.90 Beta registration number denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
MD5 | 9b45d9752d7336e436b882a3ea7ee9e0
Advanced File Manager 3.4.1 Denial Of Service
Posted Jan 30, 2019
Authored by Rafael Pedrero

Advanced File Manager version 3.4.1 denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
MD5 | bdf06eb3f4224acb235334304ae28ef1
IP-Tools 2.50 Denial Of Service
Posted Jan 30, 2019
Authored by Rafael Pedrero

IP-Tools version 2.50 denial of service SEH overwrite proof of concept exploit.

tags | exploit, denial of service, proof of concept
MD5 | c16d7e82936663bab7dd19978c93e5f9
Necrosoft DIG 0.4 Denial Of Service
Posted Jan 30, 2019
Authored by Rafael Pedrero

Necrosoft DIG version 0.4 denial of service SEH overwrite proof of concept exploit.

tags | exploit, denial of service, proof of concept
MD5 | 31a32a06eac7e6728d0a318e795237ec
Page 5 of 87
Back34567Next

File Archive:

April 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    60 Files
  • 2
    Apr 2nd
    20 Files
  • 3
    Apr 3rd
    10 Files
  • 4
    Apr 4th
    0 Files
  • 5
    Apr 5th
    0 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    0 Files
  • 9
    Apr 9th
    0 Files
  • 10
    Apr 10th
    0 Files
  • 11
    Apr 11th
    0 Files
  • 12
    Apr 12th
    0 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    0 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close