exploit-db-mirror/platforms/windows/dos/22518.html
Offensive Security fffbf04102 Updated
2013-12-03 19:44:07 +00:00

9 lines
No EOL
447 B
HTML
Executable file

source: http://www.securityfocus.com/bid/7402/info
The 'shlwapi.dll' dynamic link library causes a calling application to fail when it attempts to render certain malformed HTML tags. This appears to be due to an attempt to perform a string comparison where one of the strings is a null pointer. It has been reported that this vulnerability could not be exploited to cause code execution.
<html>
<form>
<input type crash>
</form>
</html>