On 09.05.25 11:52, Shang-Hung, Wan wrote:

Hello Shang-Hung,

as you've noticed I've took my web page offline: running a web server carrying a vulnerable cgi script is probably not the best idea. ;-)

There is a comment [1] that stated that he contacted the author
John, and he said version 1.75 in the source code is just a mistake,
it’s indeed version 1.77.

Yes, I've seen that. However I'm wondering, why they did not publish the "fixed" source code.

About the article you mentioned from cve[.]news, I checked it and
found it’s totally nonsense, since:

1. The vulnerable code it mentioned even doesn’t exist in MimeTex


Yes, correct. However I thought it could be some kind of sample code, which do not literally have to appear in the source code...although not even the function names appears. I'm not good at coding.

3. It can’t even distinguish the vulnerability type

Yes, I was wondering about this too: why they mixed the two CVE's.


Since I don’t want to expose too much information to public about the exploit

I've seen three links to youtube published in the CVE reports. Youtube forced me to login however the videos are still not accessible. Maybe this explains my dumb questions.


Hilmar
--
Testmail

Attachment: OpenPGP_signature.asc
Description: OpenPGP digital signature

Reply via email to