从提供的网页截图中,可以提取到以下关于漏洞的关键信息,使用简洁的Markdown进行返回: 漏洞标题: - Prime95 Version 29.8 build 6 - Buffer Overflow (SEH) 漏洞编号: - EDB-ID: 47802 作者: - Author: STRESSER - Exploit Author: Achilles 类型: - Type: LOCAL 平台和日期: - Platform: WINDOWS - Date: 2019-12-23 验证状态: - EDB Verified: ✗ 漏洞应用: - Vulnerable App: Prime95 Version 29.8 build 6 漏洞详情: - Vulnerable Homepage: https://www.mersenne.org - Software Link: http://www.mersenne.org/ftp_root/gimps/p95v298b6.win32.zip - Tested on: Windows 7 x64 利用步骤: 1. Run python code: Prime95.py 2. Open EVIL.txt and copy content to Clipboard 3. Open Prime95.exe go to PrimeNet 4. Paste the Content of EVIL.txt into the field "Optional User ID and Optional Computer Name" 5. Click Connection Paste the Content of EVIL.txt into the field "Optional proxy Host" 6. Press ok Twice and you will have a bind shell port 3110 7. Greetings go:XiDreamzzXi,Metatron