# CVE-2017-15950
PoC exploit for vulnerability CVE-2017-15950 SyncBreeze XML Parser and/or Sync functionality Stack-Based Buffer Overflow.
## Usage
When running the XML payload generator, the script will output a XML file **xplSyncBreeze.xml** containing the payload to import using SyncBreeze.
```bash
python3 payloadgenerator_XML_CVE-2017-15950.py
```
When running the default payload generator, the script will output a TXT file **POCPayload.txt** containing the payload to insert into Sync functionality Destination PATH or Source PATH fields.
```bash
python3 payloadgenerator_CVE-2017-15950.py
```
## Acknowledgments
Exploits developed with Filipe Oliveira and Toronto Garcez.
[4.0K] /data/pocs/07cf132fbd1a9361879e537b413b55d4ac4eeb36
├── [ 34K] LICENSE
├── [4.3K] payloadgenerator_CVE-2017-15950.py
├── [3.6K] payloadgenerator_XML_CVE-2017-15950.py
└── [ 690] README.md
0 directories, 4 files