7 lines
No EOL
509 B
Text
7 lines
No EOL
509 B
Text
source: https://www.securityfocus.com/bid/11976/info
|
|
|
|
jpegtoavi is prone to a buffer overflow. This issue is exposed when the software handles a malformed file list. As the list originates from an external or untrusted source, this issue is considered remote in nature.
|
|
|
|
If this vulnerability is successfully exploited, it will result in execution of arbitrary code in the context of the user running the application.
|
|
|
|
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24981.zip |