An issue in HTACG HTML Tidy v5.7.28 allows attacker to execute arbitrary code via the -g option of the CleanNode() function in gdoc.c.
References
Link | Resource |
---|---|
https://github.com/htacg/tidy-html5/issues/946 | Exploit Patch |
Configurations
Configuration 1 (hide)
AND |
|
History
28 Feb 2023, 16:36
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://github.com/htacg/tidy-html5/issues/946 - Exploit, Patch | |
CPE | cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:a:htacg:tidy:5.7.28:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CWE | CWE-416 |
17 Feb 2023, 19:07
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-02-17 18:15
Updated : 2024-02-04 23:14
NVD link : CVE-2021-33391
Mitre link : CVE-2021-33391
CVE.ORG link : CVE-2021-33391
JSON object : View
Products Affected
htacg
- tidy
linux
- linux_kernel
CWE
CWE-416
Use After Free