Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
jpegtoavi Buffer Overflow Vulnerability - exploit.company
header-logo
Suggest Exploit
vendor:
jpegtoavi
by:
7.5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: jpegtoavi
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

jpegtoavi Buffer Overflow Vulnerability

jpegtoavi is prone to a buffer overflow vulnerability when handling a malformed file list. This vulnerability can be exploited remotely to execute arbitrary code in the context of the user running the application.

Mitigation:

Apply vendor-supplied patches or upgrades to address this vulnerability. Avoid opening files from untrusted or unknown sources.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/11976/info

jpegtoavi is prone to a buffer overflow. This issue is exposed when the software handles a malformed file list. As the list originates from an external or untrusted source, this issue is considered remote in nature.

If this vulnerability is successfully exploited, it will result in execution of arbitrary code in the context of the user running the application. 

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24981.zip