Skip to content

Instantly share code, notes, and snippets.

# Exploit Title: MaxTime Database Editor 1.9 Authentication Bypass
# Google Dork: N/A
# Date: 07/09/2024
# Exploit Author: Andrew Lemon/Red Threat https://redthreatsec.com
# Vendor Homepage: https://www.q-free.com
# Software Link: N/A
# Version: 1.9.x
# Tested on: (Intelight x-1) Linux 3.14.57
# CVE : CVE-2024-38944
## Vulnerability Description
#Creston rave mode
# instructions
1. Create a SIMPL Windows Program:
• Start by creating a new SIMPL Windows program file.
2. Add a Touch Panel or Button Interface:
• Add a touch panel or a control interface to your program. This is where you will place your “Rave Mode” button.
3. Add the SIMPL+ Module:
• Import the SIMPL+ module you created into your SIMPL Windows program.