source: http://www.securityfocus.com/bid/12023/info
It is reported that pgn2web is susceptible to a buffer overflow vulnerability. This issue is due to a failure of the application to properly bounds check user-supplied data prior to copying it into a fixed-size memory buffer.
This vulnerability allow remote attackers to alter the proper flow of execution of the application, potentially resulting in the execution of attacker-supplied machine code in the context of the application attempting to read malicious PGN files.
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/25023.zip