html2xhtml v1.3 was discovered to contain an Out-Of-Bounds read in the function static void elm_close(tree_node_t *nodo) at procesador.c. This vulnerability allows attackers to access sensitive files or cause a Denial of Service (DoS) via a crafted html file.
References
Link | Resource |
---|---|
https://github.com/jfisteus/html2xhtml/issues/19 | Exploit Issue Tracking Third Party Advisory |
https://github.com/jfisteus/html2xhtml/issues/19 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 07:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/jfisteus/html2xhtml/issues/19 - Exploit, Issue Tracking, Third Party Advisory |
09 Nov 2022, 17:16
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://github.com/jfisteus/html2xhtml/issues/19 - Exploit, Issue Tracking, Third Party Advisory | |
CPE | cpe:2.3:a:html2xhtml_project:html2xhtml:1.3:*:*:*:*:*:*:* | |
CWE | CWE-125 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
08 Nov 2022, 15:19
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-11-08 15:15
Updated : 2025-05-01 19:15
NVD link : CVE-2022-44311
Mitre link : CVE-2022-44311
CVE.ORG link : CVE-2022-44311
JSON object : View
Products Affected
html2xhtml_project
- html2xhtml
CWE
CWE-125
Out-of-bounds Read