EXPLOITDB-EDB-19392

EXPLOITDB python WORKING POC
Exploit for CVE-2011-4220 - SlimPDF Reader - DoS/Code Injection
AI Analysis

This exploit generates a malformed PDF file with a large buffer overflow payload followed by a 'startxref' string, targeting a memory corruption vulnerability in Able2Extract and Able2Extract Server v6.0. The PoC is designed to crash the application, demonstrating the vulnerability.

Attack Type
DoS
Complexity
trivial
Reliability
reliable
MITRE ATT&CK
T1203 - Exploitation for Client Execution
Loading exploit code...
Download ZIP Password: eip
Source
Platform Exploitdb
Type dos
Platform windows
Language python
Vulnerability
CVE-2011-4220
SlimPDF Reader - DoS/Code Injection