{"id":3829,"date":"2015-04-17T23:03:33","date_gmt":"2015-04-17T21:03:33","guid":{"rendered":"https:\/\/www.customprotocol.com\/?p=3829"},"modified":"2015-04-17T23:03:33","modified_gmt":"2015-04-17T21:03:33","slug":"encore-un-nouvel-exploit-trouve-en-3-50","status":"publish","type":"post","link":"https:\/\/www.customprotocol.com\/encore-un-nouvel-exploit-trouve-en-3-50\/","title":{"rendered":"[Vita] Encore un nouvel exploit trouv\u00e9 en 3.50&#8239;!"},"content":{"rendered":"<p style=\"text-align: justify;\">Apr\u00e8s l'apparition de <a title=\"TUTO&nbsp;-&nbsp;Utiliser l\u2019exploit impatchable \u201cWorld of Pool\u201d de Qwikrazor87 (ARK-2)\" href=\"https:\/\/www.customprotocol.com\/underground\/tuto-utiliser-exploit-impatchable-qwikrazor87-firmware-3-36-3-50\/\" target=\"_blank\" rel=\"noopener noreferrer\">l'<em>exploit impatchable<\/em><\/a> il y a quelques jours et plus r\u00e9cemment de <a title=\"[Vita] Qwikrazor87 annonce un nouvel exploit pour 3.50\u2026\" href=\"https:\/\/www.customprotocol.com\/underground\/vita-qwikrazor87-annonce-un-nouvel-exploit-pour-3-50\/\" target=\"_blank\" rel=\"noopener noreferrer\">l'annonce de l'\u00e9laboration\u00a0d'un\u00a0<em>exploit usermode<\/em><\/a> sur un jeu qualifi\u00e9 de\u00a0<em>hunting game<\/em> et disponible uniquement sur le sol am\u00e9ricain, c'est au tour d'un d\u00e9veloppeur japonais de d\u00e9couvrir <strong>une nouvelle faille<\/strong> dans un jeu japonais cette fois-ci (logique).<\/p>\n<figure id=\"attachment_2253\" aria-describedby=\"caption-attachment-2253\" style=\"width: 550px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.customprotocol.com\/medias\/2015\/02\/VHBLVignette.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2253\" src=\"https:\/\/www.customprotocol.com\/medias\/2015\/02\/VHBLVignette-1024x576.png\" alt=\"Le VHBL sera ex\u00e9cutable en 3.50 et inf\u00e9rieurs pour ceux qui auraient loup\u00e9 le dernier exploit\" width=\"550\" height=\"309\" srcset=\"https:\/\/www.customprotocol.com\/medias\/2015\/02\/VHBLVignette-1024x576.png 1024w, https:\/\/www.customprotocol.com\/medias\/2015\/02\/VHBLVignette-300x169.png 300w, https:\/\/www.customprotocol.com\/medias\/2015\/02\/VHBLVignette-768x432.png 768w, https:\/\/www.customprotocol.com\/medias\/2015\/02\/VHBLVignette-370x208.png 370w, https:\/\/www.customprotocol.com\/medias\/2015\/02\/VHBLVignette-270x152.png 270w, https:\/\/www.customprotocol.com\/medias\/2015\/02\/VHBLVignette-570x321.png 570w, https:\/\/www.customprotocol.com\/medias\/2015\/02\/VHBLVignette-740x416.png 740w, https:\/\/www.customprotocol.com\/medias\/2015\/02\/VHBLVignette.png 1920w, https:\/\/www.customprotocol.com\/medias\/2015\/02\/VHBLVignette-300x169@2x.png 600w, https:\/\/www.customprotocol.com\/medias\/2015\/02\/VHBLVignette-768x432@2x.png 1536w\" sizes=\"auto, (max-width: 550px) 100vw, 550px\" \/><\/a><figcaption id=\"caption-attachment-2253\" class=\"wp-caption-text\">Le VHBL sera ex\u00e9cutable en 3.50 et inf\u00e9rieurs pour ceux qui auraient loup\u00e9 le dernier exploit<\/figcaption><\/figure>\n<p style=\"text-align: justify;\">Ainsi,\u00a0<a title=\"Twitter de patchouli\" href=\"https:\/\/twitter.com\/karehaani\" target=\"_blank\" rel=\"noopener noreferrer\"><em>patchouli<\/em><\/a> \u00e9paul\u00e9 par le c\u00e9l\u00e8bre\u00a0<a title=\"Twitter de 173210\" href=\"https:\/\/twitter.com\/173210\" target=\"_blank\" rel=\"noopener noreferrer\"><em>173210<\/em><\/a>, cherche\u00a0actuellement \u00e0 porter le programme\u00a0<strong>VHBL<\/strong> sur les PS Vita en\u00a0<em>firmware<\/em> 3.50 voire le dernier\u00a0<em>kernel exploit<\/em>. Comme d'habitude, cela prendra la forme d'une\u00a0<em>ninja release<\/em>, mais\u00a0je ne peux pas encore pr\u00e9dire s'il fera l'objet d'un\u00a0<em>mail<\/em> sur\u00a0<strong>Custom Protocol\u00a0<\/strong>: le jeu exploit\u00e9 est en r\u00e9alit\u00e9\u00a0disponible sur plusieurs march\u00e9s en ligne de\u00a0<em>Sony<\/em>, mais n'a pas encore \u00e9t\u00e9 test\u00e9 sur ces versions.<\/p>\n<p style=\"text-align: justify;\">Quoiqu'il en soit, restez \u00e0 l'\u00e9coute, je veillerais \u00e0 vous informer de toutes les\u00a0<em>news<\/em> \u00e0 ce sujet&#8239;!&nbsp;\ud83d\ude42<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mais \u00e7a n'en finit plus&#8239;! *o*<\/p>\n","protected":false},"author":481,"featured_media":3451,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,29,30],"tags":[],"plateformes":[854],"genres":[952,1158],"developpeurs":[1186,1381],"editeurs":[1380,1015],"types":[859],"sources":[1378,1379],"class_list":["post-3829","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-news-underground","category-underground","plateformes-ps-vita","genres-exploits-vita","genres-vhbl","developpeurs-1186","developpeurs-patchouli","editeurs-patchouli","editeurs-wololo","types-hack-vita","sources-httpgamegaz-com","sources-httpwololo-net20150417new-ps-vita-epsp-exploit-for-fw-3-50-on-its-way-jp-psn"],"yoast_head":"\n<title>[Vita] Encore un nouvel exploit trouv\u00e9 en 3.50 ! - Custom Protocol<\/title>\n<meta name=\"description\" content=\"Mais \u00e7a n&#039;en finit plus ! *o*\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.customprotocol.com\/encore-un-nouvel-exploit-trouve-en-3-50\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"[Vita] Encore un nouvel exploit trouv\u00e9 en 3.50 ! - Custom Protocol\" \/>\n<meta property=\"og:description\" content=\"Mais \u00e7a n&#039;en finit plus ! *o*\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.customprotocol.com\/encore-un-nouvel-exploit-trouve-en-3-50\/\" \/>\n<meta property=\"og:site_name\" content=\"Custom Protocol\" \/>\n<meta property=\"article:published_time\" content=\"2015-04-17T21:03:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.customprotocol.com\/medias\/2015\/03\/vhbl-firmware-3.50-compatible-exploit-usermode-trouve.png\" \/>\n\t<meta property=\"og:image:width\" content=\"887\" \/>\n\t<meta property=\"og:image:height\" content=\"386\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Wirus\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/HackerGen\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Wirus\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimation du temps de lecture\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.customprotocol.com\/encore-un-nouvel-exploit-trouve-en-3-50\/\",\"url\":\"https:\/\/www.customprotocol.com\/encore-un-nouvel-exploit-trouve-en-3-50\/\",\"name\":\"[Vita] Encore un nouvel exploit trouv\u00e9 en 3.50 ! - Custom Protocol\",\"isPartOf\":{\"@id\":\"https:\/\/www.customprotocol.com\/#website\"},\"datePublished\":\"2015-04-17T21:03:33+00:00\",\"dateModified\":\"2015-04-17T21:03:33+00:00\",\"author\":{\"@id\":\"https:\/\/www.customprotocol.com\/#\/schema\/person\/e2f5c3e6cbb948e59756b98bed512cf9\"},\"description\":\"Mais \u00e7a n'en finit plus ! *o*\",\"breadcrumb\":{\"@id\":\"https:\/\/www.customprotocol.com\/encore-un-nouvel-exploit-trouve-en-3-50\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.customprotocol.com\/encore-un-nouvel-exploit-trouve-en-3-50\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.customprotocol.com\/encore-un-nouvel-exploit-trouve-en-3-50\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.customprotocol.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"[Vita] Encore un nouvel exploit trouv\u00e9 en 3.50&#8239;!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.customprotocol.com\/#website\",\"url\":\"https:\/\/www.customprotocol.com\/\",\"name\":\"Custom Protocol\",\"description\":\"Site d&#039;hack-tualit\u00e9 et de tutoriels sur la customisation de consoles et appareils (homebrews, plugins, \u00e9mulation...)\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.customprotocol.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.customprotocol.com\/#\/schema\/person\/e2f5c3e6cbb948e59756b98bed512cf9\",\"name\":\"Wirus\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\/\/www.customprotocol.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ff65bb0fba0be9639885c04a3ed7d8a895a98260fc23f283286dc9cf20bf3871?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ff65bb0fba0be9639885c04a3ed7d8a895a98260fc23f283286dc9cf20bf3871?s=96&d=mm&r=g\",\"caption\":\"Wirus\"},\"description\":\"Avez-vous d\u00e9j\u00e0 vu un gentil virus ? Maintenant, oui.\",\"sameAs\":[\"https:\/\/hackergen.com\",\"https:\/\/twitter.com\/https:\/\/twitter.com\/HackerGen\",\"https:\/\/www.youtube.com\/user\/Wirusalization\"],\"url\":\"https:\/\/www.customprotocol.com\/auteur\/wirus\/\"}]}<\/script>\n","yoast_head_json":{"title":"[Vita] Encore un nouvel exploit trouv\u00e9 en 3.50 ! - Custom Protocol","description":"Mais \u00e7a n'en finit plus ! *o*","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.customprotocol.com\/encore-un-nouvel-exploit-trouve-en-3-50\/","og_locale":"fr_CA","og_type":"article","og_title":"[Vita] Encore un nouvel exploit trouv\u00e9 en 3.50 ! - Custom Protocol","og_description":"Mais \u00e7a n'en finit plus ! *o*","og_url":"https:\/\/www.customprotocol.com\/encore-un-nouvel-exploit-trouve-en-3-50\/","og_site_name":"Custom Protocol","article_published_time":"2015-04-17T21:03:33+00:00","og_image":[{"width":887,"height":386,"url":"https:\/\/www.customprotocol.com\/medias\/2015\/03\/vhbl-firmware-3.50-compatible-exploit-usermode-trouve.png","type":"image\/png"}],"author":"Wirus","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/HackerGen","twitter_misc":{"\u00c9crit par":"Wirus","Estimation du temps de lecture":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.customprotocol.com\/encore-un-nouvel-exploit-trouve-en-3-50\/","url":"https:\/\/www.customprotocol.com\/encore-un-nouvel-exploit-trouve-en-3-50\/","name":"[Vita] Encore un nouvel exploit trouv\u00e9 en 3.50 ! - Custom Protocol","isPartOf":{"@id":"https:\/\/www.customprotocol.com\/#website"},"datePublished":"2015-04-17T21:03:33+00:00","dateModified":"2015-04-17T21:03:33+00:00","author":{"@id":"https:\/\/www.customprotocol.com\/#\/schema\/person\/e2f5c3e6cbb948e59756b98bed512cf9"},"description":"Mais \u00e7a n'en finit plus ! *o*","breadcrumb":{"@id":"https:\/\/www.customprotocol.com\/encore-un-nouvel-exploit-trouve-en-3-50\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.customprotocol.com\/encore-un-nouvel-exploit-trouve-en-3-50\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.customprotocol.com\/encore-un-nouvel-exploit-trouve-en-3-50\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.customprotocol.com\/"},{"@type":"ListItem","position":2,"name":"[Vita] Encore un nouvel exploit trouv\u00e9 en 3.50&#8239;!"}]},{"@type":"WebSite","@id":"https:\/\/www.customprotocol.com\/#website","url":"https:\/\/www.customprotocol.com\/","name":"Custom Protocol","description":"Site d&#039;hack-tualit\u00e9 et de tutoriels sur la customisation de consoles et appareils (homebrews, plugins, \u00e9mulation...)","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.customprotocol.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-CA"},{"@type":"Person","@id":"https:\/\/www.customprotocol.com\/#\/schema\/person\/e2f5c3e6cbb948e59756b98bed512cf9","name":"Wirus","image":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.customprotocol.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ff65bb0fba0be9639885c04a3ed7d8a895a98260fc23f283286dc9cf20bf3871?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ff65bb0fba0be9639885c04a3ed7d8a895a98260fc23f283286dc9cf20bf3871?s=96&d=mm&r=g","caption":"Wirus"},"description":"Avez-vous d\u00e9j\u00e0 vu un gentil virus ? Maintenant, oui.","sameAs":["https:\/\/hackergen.com","https:\/\/twitter.com\/https:\/\/twitter.com\/HackerGen","https:\/\/www.youtube.com\/user\/Wirusalization"],"url":"https:\/\/www.customprotocol.com\/auteur\/wirus\/"}]}},"_links":{"self":[{"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/posts\/3829","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/users\/481"}],"replies":[{"embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/comments?post=3829"}],"version-history":[{"count":0,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/posts\/3829\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/media\/3451"}],"wp:attachment":[{"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/media?parent=3829"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/categories?post=3829"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/tags?post=3829"},{"taxonomy":"plateformes","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/plateformes?post=3829"},{"taxonomy":"genres","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/genres?post=3829"},{"taxonomy":"developpeurs","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/developpeurs?post=3829"},{"taxonomy":"editeurs","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/editeurs?post=3829"},{"taxonomy":"types","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/types?post=3829"},{"taxonomy":"sources","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/sources?post=3829"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}