Spotim 2.2 name denial of service Vulnerability / Exploit
/
/
/
Exploits / Vulnerability Discovered : 2020-01-06 |
Type : dos |
Platform : windows
[+] Code ...
# Exploit Title: SpotIM 2.2 - 'Name' Denial Of Service
# Exploit Author : Ismail Tasdelen
# Exploit Date: 2020-01-06
# Vendor Homepage : http://www.nsauditor.com/
# Link Software : http://www.nsauditor.com/downloads/spotim_setup.exe
# Tested on OS: Windows 10
# CVE : N/A
'''
Proof of Concept (PoC):
=======================
1.Download and install SpotIM
2.Run the python operating script that will create a file (poc.txt)
3.Run the software "Register -> Enter Registration Code
4.Copy and paste the characters in the file (poc.txt)
5.Paste the characters in the field 'Name' and click on 'Ok'
6.SpotIM Crashed
'''