source: https://www.securityfocus.com/bid/11976/info
jpegtoavi is prone to a buffer overflow. This issue is exposed when the software handles a malformed file list. As the list originates from an external or untrusted source, this issue is considered remote in nature.
If this vulnerability is successfully exploited, it will result in execution of arbitrary code in the context of the user running the application.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24981.zip