10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.945 High
EPSS
Percentile
99.3%
Secunia reports:
A boundary error when processing “div” HTML tags can be exploited
to cause a stack-based buffer overflow via an overly long “id”
parameter.
A boundary error exists when processing overly long links. This can
be exploited to cause a stack-based buffer overflow by tricking the
user into e.g. editing a malicious link.
A boundary error when processing e.g. a “bdo” HTML tag having an
overly long “dir” attribute can be exploited to cause a stack-based
buffer overflow.
A boundary error when processing “input” HTML tags can be
exploited to cause a stack-based buffer overflow via an overly long
e.g. “type” attribute.