EXPLOITDB-EDB-19392
EXPLOITDB python WORKING POC
Exploit for CVE-2011-4220
- SlimPDF Reader - DoS/Code Injection
AI Analysis
This exploit generates a malformed PDF file with a large buffer overflow payload followed by a 'startxref' string, targeting a memory corruption vulnerability in Able2Extract and Able2Extract Server v6.0. The PoC is designed to crash the application, demonstrating the vulnerability.
Attack Type
DoS
Complexity
trivial
Reliability
reliable
MITRE ATT&CK
Click anywhere or press Esc to close