Advertisement






Maxpatrol 8 / Xspider Denial Of Service

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2021090114

Below is a copy:

Maxpatrol 8 / Xspider Denial Of Service
# Exploit Title: Positive Technologies Maxpatrol 8 & Xspider Remote DoS (Force clients disconect)
# Date: 2020-08-20
# Exploit Author: AsCiI
# Vendor Homepage: https://www.ptsecurity.com/
#
# Affected Positive Technologies Maxpatrol 8 & Xspider Scanners
# Vulnerability reported in 09.2020. No reply from vendor. Tested on the newest release in 08.2020 probably bug not fixed

# MP8&Xspider uses 2002 default port for client connections.
# 1. Connect to server with MP8 client
# 2. Go to any browser (I've used Chrome) on https://[server]:2002
# 3. Press f5 endlessly
# 4. It takes 1-4 munutes to crash MP8
# As 1 guess, every connection get randomly generated ID
# When there to much connections, you've got a chance to get 
# present ID for a new connection.

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.