cve-2019-0708-exp icon indicating copy to clipboard operation
cve-2019-0708-exp copied to clipboard

Broken after 6th packet sent

Open piaolin opened this issue 5 years ago • 4 comments

1st packet sent 470 Initial PDU sent 3rd packet sent 4th packet sent 5th packet sent 6th packet sent xx:xx:xx:xx............................. Traceback (most recent call last): File "2.py", line 380, in received_data = s.recv(1024) ConnectionResetError: [WinError 10054]

piaolin avatar May 21 '19 04:05 piaolin

CVE-2019-0708 QQgroup 330974540

yiwind1314 avatar May 22 '19 05:05 yiwind1314

CVE-2019-0708 QQgroup 330974540

what?

Jaky5155 avatar May 22 '19 07:05 Jaky5155

第一包发送 470 初始PDU发送 第3包发送 第4包发送 第5包发送 第6包发送 xx:xx:xx:xx ........................ ..... 回溯(最近一次调用最后一次): 文件“2.py”,第380行,在 received_data = s.recv(1024) ConnectionResetError:[WinError 10054]

Updated

Jaky5155 avatar May 22 '19 07:05 Jaky5155

what is the channum argument and how to run this exploit ? and where i will change the shellcode ??>>>>

zablah avatar May 23 '19 14:05 zablah