source: https://www.securityfocus.com/bid/12000/info
o3read is prone to a buffer overflow vulnerability. This issue is exposed when the program parses HTML content during file format conversion. This issue is considered to be remote in nature since it is possible that files may originate from an external or untrusted source.
Successful exploitation will result in code execution with the privileges of the user running the application.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25010.zip