HTML2HDML 1.0.3 – File Conversion Buffer Overflow

HTML2HDML 1.0.3 – File Conversion Buffer Overflow

漏洞ID 1054809 漏洞类型
发布时间 2004-12-15 更新时间 2004-12-15
图片[1]-HTML2HDML 1.0.3 – File Conversion Buffer Overflow-安全小百科CVE编号 N/A
图片[2]-HTML2HDML 1.0.3 – File Conversion Buffer Overflow-安全小百科CNNVD-ID N/A
漏洞平台 Multiple CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/25011
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/12003/info

html2hdml is prone to a buffer overflow vulnerability. This issue is exposed when converting HTML files to HDML (Handheld Device Markup Language). Since HTML files may originate from an external or untrusted source, this vulnerability is considered remote in nature.

Successful exploitation may result in execution of arbitrary code in the context of the user running the application. 

https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/25011.zip

相关推荐: WIDZ 1.0/1.5 – Remote Code Execution

WIDZ 1.0/1.5 – Remote Code Execution 漏洞ID 1054123 漏洞类型 发布时间 2003-08-23 更新时间 2003-08-23 CVE编号 N/A CNNVD-ID N/A 漏洞平台 Linux CVSS评分 N/…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享