Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2019-25357

Summary
Assigner-VulnCheck
Assigner Org ID-83251b91-4cc7-4094-a5c7-464a1b83ea10
Published At-18 Feb, 2026 | 21:55
Updated At-18 Feb, 2026 | 21:55
Rejected At-
Credits

Control Center PRO 6.2.9 - Local Stack Based BufferOverflow

Control Center PRO 6.2.9 contains a stack-based buffer overflow vulnerability in the user creation module's username field that allows attackers to overwrite Structured Exception Handler (SEH). Attackers can craft a malicious payload exceeding 664 bytes to inject shellcode and potentially execute arbitrary code on vulnerable Windows systems.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:VulnCheck
Assigner Org ID:83251b91-4cc7-4094-a5c7-464a1b83ea10
Published At:18 Feb, 2026 | 21:55
Updated At:18 Feb, 2026 | 21:55
Rejected At:
▼CVE Numbering Authority (CNA)
Control Center PRO 6.2.9 - Local Stack Based BufferOverflow

Control Center PRO 6.2.9 contains a stack-based buffer overflow vulnerability in the user creation module's username field that allows attackers to overwrite Structured Exception Handler (SEH). Attackers can craft a malicious payload exceeding 664 bytes to inject shellcode and potentially execute arbitrary code on vulnerable Windows systems.

Affected Products
Vendor
WEBGATE Inc.
Product
Control Center PRO
Versions
Affected
  • 6.2.9
Problem Types
TypeCWE IDDescription
CWECWE-121Stack-based Buffer Overflow
Type: CWE
CWE ID: CWE-121
Description: Stack-based Buffer Overflow
Metrics
VersionBase scoreBase severityVector
4.08.4HIGH
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
3.18.4HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Version: 4.0
Base score: 8.4
Base severity: HIGH
Vector:
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Version: 3.1
Base score: 8.4
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Samir sanchez garnica @sasaga92
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.exploit-db.com/exploits/47645
exploit
http://www.webgateinc.com/wgi/eng/products/list.php?ec_idx1=P610
product
http://www.webgateinc.com/wgi/eng/products/list.php?ec_idx1=P610&ptype=view&page=&p_idx=90&tab=download&#tabdown
product
https://www.vulncheck.com/advisories/control-center-pro-local-stack-based-bufferoverflow
third-party-advisory
Hyperlink: https://www.exploit-db.com/exploits/47645
Resource:
exploit
Hyperlink: http://www.webgateinc.com/wgi/eng/products/list.php?ec_idx1=P610
Resource:
product
Hyperlink: http://www.webgateinc.com/wgi/eng/products/list.php?ec_idx1=P610&ptype=view&page=&p_idx=90&tab=download&#tabdown
Resource:
product
Hyperlink: https://www.vulncheck.com/advisories/control-center-pro-local-stack-based-bufferoverflow
Resource:
third-party-advisory
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:disclosure@vulncheck.com
Published At:18 Feb, 2026 | 22:16
Updated At:19 Feb, 2026 | 15:53

Control Center PRO 6.2.9 contains a stack-based buffer overflow vulnerability in the user creation module's username field that allows attackers to overwrite Structured Exception Handler (SEH). Attackers can craft a malicious payload exceeding 664 bytes to inject shellcode and potentially execute arbitrary code on vulnerable Windows systems.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.08.4HIGH
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Primary3.18.4HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 4.0
Base score: 8.4
Base severity: HIGH
Vector:
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Primary
Version: 3.1
Base score: 8.4
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-121Primarydisclosure@vulncheck.com
CWE ID: CWE-121
Type: Primary
Source: disclosure@vulncheck.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.webgateinc.com/wgi/eng/products/list.php?ec_idx1=P610disclosure@vulncheck.com
N/A
http://www.webgateinc.com/wgi/eng/products/list.php?ec_idx1=P610&ptype=view&page=&p_idx=90&tab=download&#tabdowndisclosure@vulncheck.com
N/A
https://www.exploit-db.com/exploits/47645disclosure@vulncheck.com
N/A
https://www.vulncheck.com/advisories/control-center-pro-local-stack-based-bufferoverflowdisclosure@vulncheck.com
N/A
Hyperlink: http://www.webgateinc.com/wgi/eng/products/list.php?ec_idx1=P610
Source: disclosure@vulncheck.com
Resource: N/A
Hyperlink: http://www.webgateinc.com/wgi/eng/products/list.php?ec_idx1=P610&ptype=view&page=&p_idx=90&tab=download&#tabdown
Source: disclosure@vulncheck.com
Resource: N/A
Hyperlink: https://www.exploit-db.com/exploits/47645
Source: disclosure@vulncheck.com
Resource: N/A
Hyperlink: https://www.vulncheck.com/advisories/control-center-pro-local-stack-based-bufferoverflow
Source: disclosure@vulncheck.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

87Records found

CVE-2024-39605
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-8.4||HIGH
EPSS-1.97% / 83.21%
||
7 Day CHG~0.00%
Published-11 Nov, 2024 | 14:57
Updated-30 Jan, 2025 | 14:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Delta Electronics DIAScreen Stack-based Buffer Overflow

If an attacker tricks a valid user into running Delta Electronics DIAScreen with a file containing malicious code, a stack-based buffer overflow in BACnetParameter can be exploited, allowing the attacker to remotely execute arbitrary code.

Action-Not Available
Vendor-Delta Electronics, Inc.
Product-diascreenDIAScreendiascreen
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-39880
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-8.4||HIGH
EPSS-0.57% / 67.94%
||
7 Day CHG~0.00%
Published-09 Jul, 2024 | 21:21
Updated-27 Aug, 2025 | 20:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stack-based Buffer Overflow in Delta Electronics CNCSoft-G2

Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerability to execute code in the context of the current process.

Action-Not Available
Vendor-Delta Electronics, Inc.
Product-cncsoft-g2CNCSoft-G2cncsoft-g2
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2019-25360
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-8.4||HIGH
EPSS-Not Assigned
Published-18 Feb, 2026 | 21:55
Updated-19 Feb, 2026 | 15:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Aida64 6.10.5200 - Buffer Overflow

Aida64 Engineer 6.10.5200 contains a buffer overflow vulnerability in the CSV logging configuration that allows attackers to execute malicious code by crafting a specially designed payload. Attackers can exploit the vulnerability by creating a malformed log file with carefully constructed SEH (Structured Exception Handler) overwrite techniques to achieve remote code execution.

Action-Not Available
Vendor-FinalWire Ltd.
Product-Aida64
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2019-25363
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-8.4||HIGH
EPSS-Not Assigned
Published-18 Feb, 2026 | 21:55
Updated-19 Feb, 2026 | 15:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WMV to AVI MPEG DVD WMV Convertor 4.6.1217 - Denial of Service

WMV to AVI MPEG DVD WMV Convertor 4.6.1217 contains a buffer overflow vulnerability that allows attackers to crash the application by providing an oversized license input. Attackers can generate a 6000-byte payload and paste it into the 'License Name and License Code' field to trigger an application crash.

Action-Not Available
Vendor-Alloksoft
Product-WMV to AVI MPEG DVD WMV Convertor
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2019-25365
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-8.4||HIGH
EPSS-Not Assigned
Published-18 Feb, 2026 | 21:55
Updated-19 Feb, 2026 | 15:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ChaosPro 2.0 - Buffer Overflow

ChaosPro 2.0 contains a buffer overflow vulnerability in the configuration file path handling that allows attackers to execute arbitrary code by overwriting the Structured Exception Handler. Attackers can craft a malicious configuration file with carefully constructed payload to overwrite memory and gain remote code execution on vulnerable Windows XP systems.

Action-Not Available
Vendor-Chaospro
Product-ChaosPro
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2024-39354
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-8.4||HIGH
EPSS-0.24% / 46.54%
||
7 Day CHG~0.00%
Published-11 Nov, 2024 | 14:59
Updated-30 Jan, 2025 | 14:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Delta Electronics DIAScreen Stack-based Buffer Overflow

If an attacker tricks a valid user into running Delta Electronics DIAScreen with a file containing malicious code, a stack-based buffer overflow in CEtherIPTagItem can be exploited, allowing the attacker to remotely execute arbitrary code.

Action-Not Available
Vendor-Delta Electronics, Inc.
Product-diascreenDIAScreendiascreen
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-37984
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-8.4||HIGH
EPSS-0.75% / 72.70%
||
7 Day CHG-0.48%
Published-09 Jul, 2024 | 17:03
Updated-10 Feb, 2026 | 23:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Secure Boot Security Feature Bypass Vulnerability

Secure Boot Security Feature Bypass Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_10_1809windows_server_2016windows_server_2022_23h2windows_server_2012windows_10_1507windows_11_21h2windows_10_22h2windows_server_2022windows_11_22h2windows_server_2019windows_10_1607windows_11_23h2Windows 11 version 21H2Windows 11 Version 23H2Windows Server 2012 (Server Core installation)Windows 10 Version 1809Windows Server 2022, 23H2 Edition (Server Core installation)Windows 11 version 22H3Windows Server 2016 (Server Core installation)Windows 10 Version 22H2Windows Server 2019Windows Server 2022Windows 10 Version 1607Windows Server 2019 (Server Core installation)Windows Server 2016Windows 11 version 22H2Windows Server 2012 R2Windows 10 Version 1507Windows 10 Version 21H2Windows Server 2012Windows Server 2012 R2 (Server Core installation)
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2024-36600
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.4||HIGH
EPSS-0.08% / 24.02%
||
7 Day CHG~0.00%
Published-14 Jun, 2024 | 00:00
Updated-22 Jan, 2026 | 21:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer Overflow Vulnerability in libcdio 2.2.0 (fixed in 2.3.0) allows an attacker to execute arbitrary code via a crafted ISO 9660 image file.

Action-Not Available
Vendor-n/aGNU
Product-libcdion/alibcdio
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2024-35333
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.4||HIGH
EPSS-0.27% / 49.66%
||
7 Day CHG~0.00%
Published-29 May, 2024 | 15:12
Updated-13 Feb, 2025 | 15:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A stack-buffer-overflow vulnerability exists in the read_charset_decl function of html2xhtml 1.3. This vulnerability occurs due to improper bounds checking when copying data into a fixed-size stack buffer. An attacker can exploit this vulnerability by providing a specially crafted input to the vulnerable function, causing a buffer overflow and potentially leading to arbitrary code execution, denial of service, or data corruption.

Action-Not Available
Vendor-n/ahtml2xhtml_project
Product-n/ahtml2xhtml
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2024-28580
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.4||HIGH
EPSS-0.06% / 17.49%
||
7 Day CHG~0.00%
Published-20 Mar, 2024 | 00:00
Updated-28 Mar, 2025 | 14:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909] allows a local attacker to execute arbitrary code via the ReadData() function when reading images in RAS format.

Action-Not Available
Vendor-freeimage_projectn/afreeimage_project
Product-freeimagen/afreeimage
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2024-28581
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.4||HIGH
EPSS-0.07% / 21.45%
||
7 Day CHG~0.00%
Published-20 Mar, 2024 | 00:00
Updated-28 Mar, 2025 | 14:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909] allows a local attacker to execute arbitrary code via the _assignPixel<>() function when reading images in TARGA format.

Action-Not Available
Vendor-freeimage_projectn/afreeimage_project
Product-freeimagen/afreeimage
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2024-28566
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.4||HIGH
EPSS-0.07% / 22.01%
||
7 Day CHG~0.00%
Published-20 Mar, 2024 | 00:00
Updated-28 Mar, 2025 | 14:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909] allows a local attacker to execute arbitrary code via the AssignPixel() function when reading images in TIFF format.

Action-Not Available
Vendor-freeimage_projectn/afreeimage_project
Product-freeimagen/afreeimage
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2024-28582
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.4||HIGH
EPSS-0.07% / 22.01%
||
7 Day CHG~0.00%
Published-20 Mar, 2024 | 00:00
Updated-28 Mar, 2025 | 14:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909] allows a local attacker to execute arbitrary code via the rgbe_RGBEToFloat() function when reading images in HDR format.

Action-Not Available
Vendor-freeimage_projectn/afreeimage_project
Product-freeimagen/afreeimage
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2019-25332
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-8.4||HIGH
EPSS-0.06% / 19.32%
||
7 Day CHG~0.00%
Published-12 Feb, 2026 | 22:48
Updated-13 Feb, 2026 | 17:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FTP Commander Pro 8.03 - Local Stack Overflow

FTP Commander Pro 8.03 contains a local stack overflow vulnerability that allows attackers to execute arbitrary code by overwriting the EIP register through a custom command input. Attackers can craft a malicious payload of 4108 bytes to overwrite memory and execute shellcode, demonstrating remote code execution potential.

Action-Not Available
Vendor-Internet-Soft
Product-FTP Commander Pro
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2024-21474
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.08% / 24.04%
||
7 Day CHG~0.00%
Published-06 May, 2024 | 14:32
Updated-15 Jan, 2025 | 16:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stack-based Buffer Overflow in PMIC

Memory corruption when size of buffer from previous call is used without validation or re-initialization.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-Snapdragonqca8337_firmwaresnapdragon_x65_5g_modem-rf_system_firmwarewcd9380_firmwareqca6696_firmwareqca6595_firmwarewsa8840_firmwarewcd9385_firmwarefastconnect_6900_firmwaresc8380xp_firmwaresa8530p_firmwarewsa8830_firmwareqam8295p_firmwaresa8540p_firmwarewsa8835_firmwareqca6574au_firmwarefastconnect_7800_firmwarewsa8845h_firmwareqca8081_firmwaresa8295p_firmwarear8035_firmwareqca6698aq_firmware
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2026-24882
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.4||HIGH
EPSS-0.01% / 0.28%
||
7 Day CHG~0.00%
Published-27 Jan, 2026 | 18:40
Updated-06 Feb, 2026 | 17:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon during handling of the PKDECRYPT command for TPM-backed RSA and ECC keys.

Action-Not Available
Vendor-gpg4wingnupgGnuPG
Product-gnupggpg4winGnuPG
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2019-25319
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-8.4||HIGH
EPSS-0.23% / 45.53%
||
7 Day CHG~0.00%
Published-12 Feb, 2026 | 22:48
Updated-13 Feb, 2026 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Domain Quester Pro 6.02 - Stack Overflow (SEH)

Domain Quester Pro 6.02 contains a stack overflow vulnerability that allows remote attackers to execute arbitrary code by overwriting Structured Exception Handler (SEH) registers. Attackers can craft a malicious payload targeting the 'Domain Name Keywords' input field to trigger an access violation and execute a bind shell on port 9999.

Action-Not Available
Vendor-Internet-Soft
Product-Domain Quester Pro
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2019-25321
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-8.4||HIGH
EPSS-0.24% / 46.12%
||
7 Day CHG~0.00%
Published-12 Feb, 2026 | 22:48
Updated-13 Feb, 2026 | 17:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FTP Navigator 8.03 - Stack Overflow (SEH)

FTP Navigator 8.03 contains a stack overflow vulnerability that allows attackers to execute arbitrary code by overwriting Structured Exception Handler (SEH) registers. Attackers can craft a malicious payload that triggers a buffer overflow when pasted into the Custom Command textbox, enabling remote code execution and launching the calculator as proof of concept.

Action-Not Available
Vendor-Softpedia
Product-FTP Navigator
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2019-25331
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-8.4||HIGH
EPSS-0.02% / 3.90%
||
7 Day CHG~0.00%
Published-12 Feb, 2026 | 22:48
Updated-13 Feb, 2026 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
AVS Audio Converter 9.1 - 'Exit folder' Buffer Overflow

AVS Audio Converter 9.1 contains a local buffer overflow vulnerability that allows local attackers to overwrite CPU registers by manipulating the 'Exit folder' input field. Attackers can craft a specially designed text file with 264 bytes of padding followed by register overwrite values to compromise the application and potentially execute arbitrary code.

Action-Not Available
Vendor-AVS4YOU
Product-AVS Audio Converter
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2019-25336
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-8.4||HIGH
EPSS-0.02% / 4.04%
||
7 Day CHG~0.00%
Published-12 Feb, 2026 | 22:48
Updated-13 Feb, 2026 | 17:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SpotAuditor 5.3.2 - 'Base64' Local Buffer Overflow (SEH)

SpotAuditor 5.3.2 contains a local buffer overflow vulnerability in the Base64 Encrypted Password tool that allows attackers to execute arbitrary code by crafting a malicious payload. Attackers can generate a specially crafted Base64 encoded payload to trigger a Structured Exception Handler (SEH) overwrite and execute shellcode on the vulnerable system.

Action-Not Available
Vendor-Nsasoft
Product-Nsauditor SpotAuditor
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2026-0660
Matching Score-4
Assigner-Autodesk
ShareView Details
Matching Score-4
Assigner-Autodesk
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.33%
||
7 Day CHG~0.00%
Published-04 Feb, 2026 | 16:27
Updated-06 Feb, 2026 | 17:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stack Based Buffer Overflow in GIF File Parsing

A maliciously crafted GIF file, when parsed through Autodesk 3ds Max, can cause a Stack-Based Buffer Overflow vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

Action-Not Available
Vendor-Autodesk Inc.
Product-3ds_max3ds Max
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2023-28538
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.03% / 8.50%
||
7 Day CHG~0.00%
Published-05 Sep, 2023 | 06:24
Updated-27 Feb, 2025 | 21:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stack-based Buffer Overflow in WIN Product

Memory corruption in WIN Product while invoking WinAcpi update driver in the UEFI region.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_850_mobile_compute_platform_firmwaresa6150p_firmwaresm6250p_firmwareqcs610qca6431_firmwarewcn3950_firmwaresc8180x\+sdx55sa8150p_firmwareqcs2290qca6595au_firmwaresa6155qca6335csra6620_firmwaresd_675_firmwarecsra6640_firmwareqcs6125_firmwarewcd9371_firmwaresd_8cx_gen2_firmwaresm4125sd720gwcn3950sd_8_gen1_5g_firmwaresd710_firmwaresd460_firmwarequalcomm_robotics_rb3_platform_firmwareqca6574au_firmwarewcd9375_firmwaresa6155_firmwareqca6420snapdragon_xr2\+_gen_1_platformsd680_firmwaresd_8cx_gen2qrb5165m_firmwaresa4155p_firmwareqcs6125sa8155_firmwaresd662_firmwareqca6430wcd9340sd765gsw5100fsm10056_firmwareqca6436sd680sa6155pwcd9341qca6431qca6696_firmwarewcd9371sd750gsd870_firmwarewcn3910_firmwaresd_8cxsa8150pwsa8830_firmwaresd855_firmwaresd865_5g_firmwaresnapdragon_4_gen_1sd712wcn3988sa8195p_firmwarefastconnect_6800_firmwareqcn7606_firmwarewcd9380_firmwaressg2125psw5100psnapdragon_w5\+_gen_1_wearable_platformqca6564ausd670_firmwareqca6574wcd9380qcs410sd690_5g_firmwaresxr1230pqca6430_firmwareqcn9012_firmwarewcd9335_firmwarewcn3980qca6335_firmwareqcm4325_firmwarewcd9340_firmwarewsa8815sd7cwcn3910qca6426_firmwaresd695wcn3980_firmwaresd730snapdragon_xr2\+_gen_1_platform_firmwaresnapdragon_x50_5g_modem-rf_system_firmwareqca6421_firmwaresmart_audio_200_platformsnapdragon_xr2_5g_platformsd678_firmwarefastconnect_6900fastconnect_6900_firmwaresd670smart_audio_200_platform_firmwareqca6564a_firmwarequalcomm_robotics_rb5_platform_firmwareqcm4290_firmwaresd480sd870wsa8832sw5100p_firmwareqcs610_firmwareqsm8250sa6145psd695_firmwareqca6595_firmwaresa8145pqca6391_firmwaresa4150p_firmwarewcd9370_firmwaresdx55sa8155pcsra6640sd675ssg2115p_firmwareqcs8155_firmwaresa4155pqcm2290qsm8250_firmwareqcn7606wsa8830sd678sa8145p_firmwaresxr2230p_firmwaresnapdragon_850_mobile_compute_platformqcs2290_firmwarefsm10056sd7c_firmwaresnapdragon_4_gen_1_firmwareflight_rb5_5g_platformcsra6620flight_rb5_5g_platform_firmwareqcs4290sd765g_firmwareqca6420_firmwaresd690_5gsd730_firmwarewcd9370sd675_firmwaressg2115pqca6564qca6426wcn3990_firmwareqrb5165n_firmwarequalcomm_robotics_rb3_platformsd_8cx_firmwarewcd9385_firmwarewcd9326_firmwarefastconnect_6200sd662qcn9011_firmwaresa8155snapdragon_x55_5g_modem-rf_systemsdx55_firmwareqca6595ausm7250p_firmwareqca6436_firmwareqrb5165nsnapdragon_w5\+_gen_1_wearable_platform_firmwareqca6564au_firmwaresa6155p_firmwareqca6310qcs8155vision_intelligence_300_platform_firmwarewcn3988_firmwaresa6145p_firmwareqca6421sd712_firmwaresm6250sa8195psxr1120wsa8810_firmwarevision_intelligence_400_platformsd765_firmwaresnapdragon_ar2_gen_1_platform_firmwarewcd9326sg4150pwcd9335qca6174a_firmwareqcs4290_firmwarewcd9385sxr2130_firmwarewcd9375sd750g_firmwareaqt1000sc8180x\+sdx55_firmwaresm6250_firmwarevision_intelligence_400_platform_firmwarewsa8815_firmwarewsa8835_firmwaresxr1120_firmwareqca6564asa4150psg4150p_firmwareqcm6125_firmwareqcm4325qcm2290_firmwarewcn3990sd_675sd865_5gfastconnect_6800qca6595qcn9012wsa8835sxr1230p_firmwaresd665_firmwaresd_8_gen1_5gsm6250pssg2125p_firmwaresxr2130qca6574aqca6174aqca6310_firmwareqca6574_firmwaresd855sm4125_firmwaresd665sxr2230psnapdragon_xr2_5g_platform_firmwaresd765qca6574a_firmwarefastconnect_6200_firmwaresd768g_firmwareqrb5165mvision_intelligence_300_platformsnapdragon_x55_5g_modem-rf_system_firmwaresd460qca6391fastconnect_7800aqt1000_firmwareqcm4290wsa8832_firmwaresnapdragon_xr1_platformsd480_firmwareqcn9011qca6574ausa8155p_firmwaresd710wcd9341_firmwarefastconnect_7800_firmwareqcm6125wsa8810snapdragon_ar2_gen_1_platformqca6564_firmwaresd768gqca6696sd845_firmwaresa6150psnapdragon_x50_5g_modem-rf_systemsd845qualcomm_robotics_rb5_platformsm7250psd720g_firmwaresw5100_firmwareqcs410_firmwaresnapdragon_xr1_platform_firmwareSnapdragon
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-7032
Matching Score-4
Assigner-Rockwell Automation
ShareView Details
Matching Score-4
Assigner-Rockwell Automation
CVSS Score-8.4||HIGH
EPSS-0.02% / 5.59%
||
7 Day CHG~0.00%
Published-05 Aug, 2025 | 13:39
Updated-13 Aug, 2025 | 15:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation Stack-based Buffer Overflow In Arena® Simulation

A memory abuse issue exists in the Rockwell Automation Arena® Simulation. A custom file can force Arena Simulation to read and write past the end of memory space. Successful use requires user action, such as opening a bad file or webpage. If used, a threat actor could execute code or disclose information.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-arenaArena® Simulation
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2019-16641
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.4||HIGH
EPSS-0.03% / 8.73%
||
7 Day CHG~0.00%
Published-16 Jul, 2024 | 00:00
Updated-09 Jul, 2025 | 16:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was found on the Ruijie EG-2000 series gateway. There is a buffer overflow in client.so. Consequently, an attacker can use login.php to login to any account, without providing its password. This affects EG-2000SE EG_RGOS 11.1(1)B1.

Action-Not Available
Vendor-n/aRuijie Networks Co., Ltd.
Product-eg-2000se_firmwareeg-2000sen/aeg-2000se_eg_rgos_firmware
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2021-47881
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 4.04%
||
7 Day CHG~0.00%
Published-23 Jan, 2026 | 16:47
Updated-26 Jan, 2026 | 15:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
dataSIMS Avionics ARINC 664-1 - Local Buffer Overflow

dataSIMS Avionics ARINC 664-1 version 4.5.3 contains a local buffer overflow vulnerability that allows attackers to overwrite memory by manipulating the milstd1553result.txt file. Attackers can craft a malicious file with carefully constructed payload and alignment sections to potentially execute arbitrary code on the Windows system.

Action-Not Available
Vendor-Data Device Corporation
Product-dataSIMS Avionics ARINC
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2023-43549
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.10% / 26.49%
||
7 Day CHG~0.00%
Published-04 Mar, 2024 | 10:48
Updated-10 Jan, 2025 | 20:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stack-based Buffer Overflow in WLAN HAL

Memory corruption while processing TPC target power table in FTM TPC.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcn6422ipq8070a_firmwarewcd9385_firmwareipq8070aipq6000qcf8001_firmwaresnapdragon_x75_5g_modem-rf_firmwareqcn9072_firmwaresnapdragon_x65_5g_modem-rf_firmwareqcn6132_firmwareqcc2076immersive_home_326_firmwaresnapdragon_8_gen_2_mobile_firmwareqcn6422_firmwareipq9574_firmwaresc8380xpwcd9395_firmwareqca6698aq_firmwarefastconnect_6900_firmwaresxr2230pqca8085qcf8000fastconnect_6900ipq8078aipq8071a_firmwareqcn9024_firmwaresdx55ipq9008qcn6122_firmwaresd865_5gqcn6432qam8775pqcn9274_firmwareqcn6132qcn9024ssg2115p_firmwareqca8085_firmwareqca6698aqipq6028_firmwareimmersive_home_3210qca8081_firmwarear8035_firmwareqcn6224_firmwareqcn9274snapdragon_x65_5g_modem-rfqcf8000_firmwareipq5332_firmwareipq6018_firmwareqcn9074qcn5022sc8380xp_firmwarecsr8811_firmwaresnapdragon_865\+_5g_mobileqcn6112qca8386ipq9570qca6696_firmwareqcn9013_firmwareqfw7124_firmwareqca6574aipq8076qcn9013qca6554a_firmwaresnapdragon_xr2_5gqca6574_firmwarefastconnect_7800ssg2125p_firmwareqam8255pqcn6024qca6595snapdragon_x75_5g_modem-rfwcn6740snapdragon_870_5g_mobilewcd9390qca6797aq_firmwareqcn6122wsa8810qca6426qcn6432_firmwaresnapdragon_ar2_gen_1sdx65mqca6595au_firmwareqcn9012_firmwarewsa8830_firmwareqcc710ipq6010qcc2076_firmwareqcn5024qca8337_firmwareqca6554aqcn5154_firmwaresnapdragon_865\+_5g_mobile_firmwareqca8084_firmwareqcn5122_firmwarewsa8810_firmwareipq8076_firmwaresdx65m_firmwareqcn5052ipq9008_firmwareqca8082_firmwarewcd9395immersive_home_326wsa8830qca8084sa7255pqcn6112_firmwareqca6564auqam8775p_firmwareqca6426_firmwareqca8081qca8075_firmwareqca6436ipq8078qcc2073fastconnect_6800ipq5302qcn6274wsa8815_firmwareimmersive_home_318ipq5332qca6595aufastconnect_7800_firmwareqcn9072qfw7114snapdragon_8\+_gen_2_mobile_firmwareqcn5164_firmwareipq8174sm8550p_firmwaressg2125psxr1230psnapdragon_865_5g_mobileqcn5052_firmwareqam8650pwcn6740_firmwareqca6574a_firmwaresnapdragon_8_gen_2_mobileqca4024ipq8173_firmwareipq8173qcn5154wcd9390_firmwareqca6436_firmwaressg2115pqcs8550qca6797aqwcd9385wcd9380qcn6412_firmwareqcn9100_firmwareqcn6402_firmwarewsa8815wsa8845ipq5312qam8650p_firmwareipq8078a_firmwareipq9554qcn5122qcn5152_firmwareqca6391qcn9070_firmwareipq5028qca6696qca9888_firmwareqca8075wsa8835qam8255p_firmwareqcf8001qcn9000snapdragon_8_gen_3_mobilesnapdragon_8_gen_3_mobile_firmwareqca6574auwcd9380_firmwaresnapdragon_ar2_gen_1_firmwarewsa8845hqcn9100qcn9012wsa8840ipq8076a_firmwareqcn9022qca0000immersive_home_316_firmwareimmersive_home_216qca6584auqca8386_firmwareipq5312_firmwaresnapdragon_870_5g_mobile_firmwarewcd9340sxr2230p_firmwareqcn9074_firmwareqca4024_firmwareqcn9022_firmwaresxr1230p_firmwareqca6584au_firmwareqcn6224ipq8078_firmwaresa7255p_firmwareipq6000_firmwarewsa8845h_firmwareqcc2073_firmwareipq8071aqcn5022_firmwareqcn6023_firmwareqfw7114_firmwarear8035qcn6402snapdragon_8\+_gen_1_mobile_firmwareipq5028_firmwareqcn9070sg8275pimmersive_home_214_firmwareipq8076aipq5010sg8275p_firmwareqcn5024_firmwareipq5302_firmwareipq8174_firmwaresnapdragon_8_gen_1_mobileqca6564au_firmwareipq6018qcn5152qcn6023immersive_home_214sm8550pipq8072aqca9889_firmwareimmersive_home_3210_firmwaresnapdragon_8_gen_1_mobile_firmwareqcm8550_firmwareqcn6024_firmwarewsa8845_firmwareqfw7124snapdragon_865_5g_mobile_firmwarewsa8832_firmwaresdx55_firmwareipq8072a_firmwareipq5010_firmwareipq9554_firmwareipq6028qcc710_firmwarewcd9340_firmwareqca8082qca9888ipq8074a_firmwareimmersive_home_216_firmwarewsa8832csr8811qcn5164qca6391_firmwareqca6595_firmwareqcn5124fastconnect_6800_firmwareqca6574au_firmwareqca8337immersive_home_318_firmwaresd865_5g_firmwareipq9570_firmwaresd_8_gen1_5gimmersive_home_316fastconnect_6700qcs8550_firmwareqca0000_firmwaresnapdragon_8\+_gen_1_mobileqca6574qcn5124_firmwaresd_8_gen1_5g_firmwaresnapdragon_8\+_gen_2_mobileipq9574qca9889snapdragon_xr2_5g_firmwareqcm8550wsa8835_firmwareipq8074awsa8840_firmwareqcn6274_firmwareqcn6412fastconnect_6700_firmwareipq6010_firmwareqcn9000_firmwareSnapdragonqcn6412_firmwareqca6574a_firmwarewsa8832_firmwareqcn5124_firmwareqcn9024_firmwareqcn9070_firmwarewsa8835_firmwareqcn6422_firmwarecsr8811_firmwaresnapdragon_8_gen_3_mobile_platform_firmwarefastconnect_6700_firmwareipq8076a_firmwareqcn9022_firmwareipq8076_firmwareipq8074a_firmwareqcn6224_firmwareqca8386_firmwareqcn5164_firmwareqcn5052_firmwareimmersive_home_3210_platform_firmwareqca6698aq_firmwareqca8081_firmwareqcn6402_firmwarewcd9385_firmwarefastconnect_7800_firmwarewsa8845h_firmwareqcm8550_firmwareipq8078_firmwaressg2125p_firmwaresnapdragon_x65_5g_modem-rf_system_firmwareqcn6024_firmwareqca6436_firmwareipq8070a_firmwareqca6595_firmwareipq5302_firmwareqca0000_firmwareqcn5152_firmwareqam8650p_firmwareqcn6274_firmwaresa7255p_firmwareqcn6432_firmwareimmersive_home_316_platform_firmwaresnapdragon_8_gen_2_mobile_platform_firmwareqcn5024_firmwareqcc2073_firmwareqca9889_firmwareipq8173_firmwareqcn9012_firmwareipq6018_firmwareqcn9100_firmwareipq9554_firmwarewcd9340_firmwarear8035_firmwareqca8084_firmwarefastconnect_6800_firmwareqcn5022_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarewsa8845_firmwareqcf8001_firmwareqcc710_firmwareqca8075_firmwareqca6574au_firmwareqcf8000_firmwareqcn9274_firmwareipq8071a_firmwareqcn9074_firmwarewcn6740_firmwaresd_8_gen1_5g_firmwareqcn5122_firmwareqcs8550_firmwareipq5312_firmwaresdx65m_firmwareqca6564au_firmwareqca4024_firmwaresnapdragon_xr2_5g_platform_firmwareqcn9000_firmwareqca6696_firmwareimmersive_home_326_platform_firmwareqcn6122_firmwareimmersive_home_318_platform_firmwareqcn9013_firmwareqca8337_firmwareipq6000_firmwareqcn5154_firmwareqca6595au_firmwarewcd9390_firmwaresm8550p_firmwareqca6554a_firmwaresnapdragon_ar2_gen_1_platform_firmwareipq9570_firmwareipq8078a_firmwarewcd9395_firmwaresxr1230p_firmwareqcn9072_firmwareqfw7124_firmwareqca6391_firmwareqcc2076_firmwareipq8174_firmwareipq6010_firmwarefastconnect_6900_firmwarewsa8840_firmwareqca9888_firmwarewcd9380_firmwareqca6584au_firmwareqam8775p_firmwaresnapdragon_8_gen_1_mobile_platform_firmwarewsa8810_firmwareimmersive_home_216_platform_firmwareipq9008_firmwareqfw7114_firmwaresnapdragon_865_5g_mobile_platform_firmwarewsa8830_firmwareqca8085_firmwaresxr2230p_firmwaressg2115p_firmwareqca6574_firmwaresg8275p_firmwareqcn6112_firmwareqcn6023_firmwareipq5028_firmwareipq6028_firmwarewsa8815_firmwareipq8072a_firmwareipq9574_firmwareqca6797aq_firmwareipq5010_firmwaresd865_5g_firmwareqca6426_firmwaresc8380xp_firmwaresdx55_firmwareqca8082_firmwareipq5332_firmwareimmersive_home_214_platform_firmwareqam8255p_firmwareqcn6132_firmware
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-47758
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-8.4||HIGH
EPSS-0.05% / 14.84%
||
7 Day CHG+0.01%
Published-19 May, 2025 | 07:47
Updated-19 May, 2025 | 17:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

V-SFT v6.2.5.0 and earlier contains an issue with stack-based buffer overflow in VS6File!CTxSubFile::get_ProgramFile_name function. Opening specially crafted V7 or V8 files may lead to crash, information disclosure, and arbitrary code execution.

Action-Not Available
Vendor-Fuji Electric Co., Ltd.
Product-monitouch_v-sftV-SFT
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-21632
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.05% / 16.68%
||
7 Day CHG~0.00%
Published-06 Jun, 2023 | 07:39
Updated-02 Aug, 2024 | 09:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stack-based Buffer Overflow in Automotive GPU

Memory corruption in Automotive GPU while querying a gsl memory node.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6564au_firmwareqca6584ausa6155p_firmwaresa6150p_firmwaresa8145p_firmwaremsm8996au_firmwareapq8064au_firmwareqca6698aqqca6595qca6564ausa8155_firmwaresnapdragon_820_automotive_platform_firmwareqca6574ausa6145p_firmwaresa8155p_firmwaremsm8996auqca6564a_firmwaresa8195psa8540p_firmwaresa8150p_firmwareqca6595au_firmwaresa6155sa6155psa8540psa8295p_firmwareqca6574aqca6698aq_firmwaresa6145pqca6584au_firmwareqca6696_firmwareqca6595_firmwaresa8145pqca6696qam8295psa9000papq8064ausa8150psa6150psa8155pqam8295p_firmwaresa8155qca6574a_firmwaresa9000p_firmwareqca6574au_firmwaresa8195p_firmwareqca6595ausa6155_firmwareqca6564asnapdragon_820_automotive_platformsa8295pSnapdragon
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-40516
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-3.85% / 87.93%
||
7 Day CHG~0.00%
Published-06 Jan, 2023 | 05:02
Updated-09 Apr, 2025 | 14:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stack-based buffer overflow in Core

Memory corruption in Core due to stack-based buffer overflow.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresd_8cx_gen3_firmwaresa6150p_firmwaresm6250p_firmwareqcs610qca8337qca6431_firmwarewcd9360_firmwaresdx65qca4024_firmwarewcn3950_firmwaresa8150p_firmwareqcs2290qca6595au_firmwaresa6155qca6335csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwaresa415mwcn3998wcd9371_firmwareqam8295pwcn3950qcn6024_firmwaresd720gsm4125sd_8cx_gen2_firmwareqca8386_firmwaresd_8_gen1_5g_firmwareqca8084_firmwareqsm8350_firmwaresd710_firmwareqsm8350sd460_firmwaresm7315_firmwarewcn7850qca6574au_firmwarewcd9375_firmwareqca8081_firmwarewcn3998_firmwaresa6155_firmwareqca6420wcd9360sd680_firmwarewcn3999sd_8cx_gen2qrb5165_firmwareqrb5165m_firmwaresa4155p_firmwaresa8155_firmwareqca4004_firmwareipq6010sd662_firmwareqcs405qca6430wcd9306_firmwarewcd9340sd765gsw5100fsm10056_firmwaresd680qca6436wcn6851sa6155pqcs603_firmwarewcn7851_firmwarewcd9341qca6431qca6696_firmwarewcd9371sd870_firmwaresd750gipq9008_firmwarewcn3910_firmwaresxr2150p_firmwaresd_8cxsa8150pqca4004wsa8830_firmwaresd855_firmwaresd660sd865_5g_firmwaresd712wcn3988sd660_firmwarewcn7850_firmwaresa8195p_firmwareqcn5121sm8475qcn5022_firmwareqcn7606_firmwarewcn6750_firmwaresa8295p_firmwarewcn3991qca8337_firmwarewcd9380_firmwaresw5100pqca8084qca6564ausdx55m_firmwarewcn6856_firmwareipq9008sd670_firmwareqca6574csr8811_firmwarewcd9380qcs410sd690_5g_firmwaresdx50m_firmwaresdx24_firmwareqca8072_firmwareqcn9012_firmwareqca6430_firmwareqcn9274_firmwareqcn5052_firmwarewcd9335_firmwarewcn3980qca6335_firmwareipq6018_firmwareqcs605wcd9340_firmwarewsa8815wcn6850sd7cwcn3910qca6320qca6426_firmwareqca9984ipq6028sd835qcn9024ipq9574_firmwarewcn3980_firmwaresd730sdx55mqcc5100_firmwaresa8295pqca6421_firmwarewcn6740_firmwaresd678_firmwarear8031_firmwareqrb5165wcn6851_firmwareqcs603sd670qcn9024_firmwareqca6564a_firmwareqcm4290_firmwaresd870wcn6855qcn5121_firmwaresw5100p_firmwaresa8540pqcs610_firmwareqsm8250sa6145pipq6018sdxr1ar8031qca6595_firmwareqcs405_firmwaresa8145pmdm9205_firmwareqca6391_firmwaresa4150p_firmwareqca4024wcd9370_firmwaresd780g_firmwaresdx55sd888_firmwareqcn5021_firmwaresa8155pcsra6640sd675qcs8155_firmwaresa4155psxr2150par8035_firmwareqsm8250_firmwareqcn7606qcm2290wcn3991_firmwaremdm9150_firmwarewsa8830sd678qcn9070sa8145p_firmwareqcs2290_firmwarefsm10056sd7c_firmwarecsrb31024csra6620qca8082qcn9072qca8386qcs4290sd765g_firmwareqca6420_firmwareqca6390_firmwaresd690_5gipq6000sd730_firmwarewcd9370sd675_firmwareqcn5152_firmwareqca6564qca6426wcn3990_firmwareqrb5165n_firmwareqcn9000_firmwareqca9984_firmwareqca9377sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcd9326_firmwaresd662qam8295p_firmwareqcn9011_firmwaresa8155qca8082_firmwareqca6320_firmwaresa9000p_firmwareqcn5122_firmwaresdx55_firmwareqca6595auqcn6023_firmwarewcn3999_firmwaresm7250p_firmwareqca6436_firmwareqrb5165nwcd9306sd778gqca6564au_firmwaresa6155p_firmwareqca6310qcn9274qcs8155wcn7851sa515m_firmwareqcs6490sdxr2_5gqcn5052sa415m_firmwarewcn3988_firmwareqcn9074sa6145p_firmwareqca6421qca8085sd778g_firmwaresm6250sa8195psd712_firmwarewsa8810_firmwaresd765_firmwarewcd9326wcd9335qca8081qcn6023qca6174a_firmwareqcs4290_firmwarewcd9385qca8085_firmwareqcs6490_firmwaresd_8cx_gen3qca6390wcd9375sd750g_firmwareaqt1000ar8035csr8811sm6250_firmwarewsa8815_firmwaresd888_5g_firmwareqcm6490wcn6850_firmwarewsa8835_firmwareqcx315qca6564asa4150pqca8072qcm2290_firmwarewcn3990qcn9000sd_675sd780gsd865_5gqca6595qcc5100sdx24qcn9012sd888wsa8835qcx315_firmwaresa8540p_firmwaresd888_5gsm6250pqca8075_firmwaresc8180xqca6574aipq6005_firmwarewcn6855_firmwareqca6174asm7325pqca6310_firmwarewcn6750mdm9205sa9000pqca6574_firmwaresa515msd855sm4125_firmwaresm7325p_firmwaresd765qca6574a_firmwareqcn5021qcn5152sd768g_firmwareqrb5165msd850_firmwaresm7315sd460qca6391sdxr1_firmwareipq6005aqt1000_firmwaresdx65_firmwareqcm4290csrb31024_firmwareqcm6490_firmwaresdx50mqcn9070_firmwareipq6028_firmwareqcn9011sc8180x_firmwareqca6574ausd710sa8155p_firmwareqcn5122ipq9574wcd9341_firmwarewsa8810mdm9150wcn6856qcn5022sd835_firmwareqca6564_firmwaresd768gipq6010_firmwarewcn6740qca6696sd845_firmwaresa6150pqca8075qcn9022_firmwareqcn6024qcn9022sd845qcn9072_firmwaresm7250pipq6000_firmwaresd720g_firmwaresw5100_firmwareqcn9074_firmwareqcs410_firmwaresd850Snapdragon
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-40517
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.11% / 28.97%
||
7 Day CHG~0.00%
Published-06 Jan, 2023 | 05:02
Updated-09 Apr, 2025 | 14:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stack based buffer overflow in Core

Memory corruption in core due to stack-based buffer overflow

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresd_8cx_gen3_firmwaresa6150p_firmwaresm6250p_firmwareqcs610qca8337qca6431_firmwarewcd9360_firmwaresdx65qca4024_firmwarewcn3950_firmwaresa8150p_firmwareqcs2290qca6595au_firmwaresa6155qca6335csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwaresa415mwcn3998wcd9371_firmwareqam8295pwcn3950qcn6024_firmwaresd720gsm4125sd_8cx_gen2_firmwareqca8386_firmwareqca8084_firmwareqsm8350_firmwaresd710_firmwareqsm8350sd460_firmwaresm7315_firmwareqca6574au_firmwarewcd9375_firmwareqca8081_firmwarewcn3998_firmwaresa6155_firmwareqca6420wcd9360sd680_firmwarewcn3999sd_8cx_gen2qrb5165_firmwareqrb5165m_firmwaresa4155p_firmwaresa8155_firmwareqca4004_firmwareipq6010sd662_firmwareqcs405qca6430wcd9306_firmwarewcd9340sd765gsw5100fsm10056_firmwaresd680qca6436wcn6851sa6155pqcs603_firmwarewcd9341qca6431qca6696_firmwarewcd9371sd870_firmwaresd750gipq9008_firmwarewcn3910_firmwaresxr2150p_firmwaresd_8cxsa8150pqca4004wsa8830_firmwaresd855_firmwaresd660sd865_5g_firmwaresd712wcn3988sd660_firmwaresa8195p_firmwareqcn5121qcn5022_firmwareqcn7606_firmwarewcn6750_firmwaresa8295p_firmwarewcn3991qca8337_firmwarewcd9380_firmwaresw5100pqca8084qca6564ausdx55m_firmwarewcn6856_firmwareipq9008sd670_firmwareqca6574csr8811_firmwarewcd9380qcs410sd690_5g_firmwaresdx50m_firmwaresdx24_firmwareqca8072_firmwareqcn9012_firmwareqca6430_firmwareqcn9274_firmwareqcn5052_firmwarewcd9335_firmwarewcn3980qca6335_firmwareipq6018_firmwareqcs605wcd9340_firmwarewsa8815wcn6850sd7cwcn3910qca6320qca6426_firmwareqca9984ipq6028sd835qcn9024ipq9574_firmwarewcn3980_firmwaresd730sdx55mqcc5100_firmwaresa8295pqca6421_firmwarewcn6740_firmwaresd678_firmwarear8031_firmwareqrb5165wcn6851_firmwareqcs603sd670qcn9024_firmwareqca6564a_firmwareqcm4290_firmwaresd870wcn6855qcn5121_firmwaresw5100p_firmwaresa8540pqcs610_firmwareqsm8250sa6145pipq6018sdxr1ar8031qca6595_firmwareqcs405_firmwaresa8145pmdm9205_firmwareqca6391_firmwaresa4150p_firmwareqca4024wcd9370_firmwaresd780g_firmwaresdx55sd888_firmwareqcn5021_firmwaresa8155pcsra6640sd675qcs8155_firmwaresa4155psxr2150par8035_firmwareqsm8250_firmwareqcn7606qcm2290wcn3991_firmwaremdm9150_firmwarewsa8830sd678qcn9070sa8145p_firmwareqcs2290_firmwarefsm10056sd7c_firmwarecsrb31024csra6620qca8082qcn9072qca8386qcs4290sd765g_firmwareqca6420_firmwareqca6390_firmwaresd690_5gipq6000sd730_firmwarewcd9370sd675_firmwareqcn5152_firmwareqca6564qca6426wcn3990_firmwareqrb5165n_firmwareqcn9000_firmwareqca9984_firmwareqca9377sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcd9326_firmwaresd662qam8295p_firmwareqcn9011_firmwaresa8155qca8082_firmwareqca6320_firmwaresa9000p_firmwareqcn5122_firmwaresdx55_firmwareqca6595auqcn6023_firmwarewcn3999_firmwaresm7250p_firmwareqca6436_firmwareqrb5165nwcd9306sd778gqca6564au_firmwaresa6155p_firmwareqca6310qcn9274qcs8155sa515m_firmwareqcs6490sdxr2_5gqcn5052sa415m_firmwarewcn3988_firmwareqcn9074sa6145p_firmwareqca6421qca8085sd778g_firmwaresm6250sa8195psd712_firmwarewsa8810_firmwaresd765_firmwarewcd9326wcd9335qca8081qcn6023qca6174a_firmwareqcs4290_firmwarewcd9385qca8085_firmwareqcs6490_firmwaresd_8cx_gen3qca6390wcd9375sd750g_firmwareaqt1000ar8035csr8811sm6250_firmwarewsa8815_firmwaresd888_5g_firmwareqcm6490wcn6850_firmwarewsa8835_firmwareqcx315qca6564asa4150pqca8072qcm2290_firmwarewcn3990qcn9000sd_675sd780gsd865_5gqca6595qcc5100sdx24qcn9012sd888wsa8835qcx315_firmwaresa8540p_firmwaresd888_5gsm6250pqca8075_firmwaresc8180xqca6574aipq6005_firmwarewcn6855_firmwareqca6174asm7325pqca6310_firmwarewcn6750mdm9205sa9000pqca6574_firmwaresa515msd855sm4125_firmwaresm7325p_firmwaresd765qca6574a_firmwareqcn5021qcn5152sd768g_firmwareqrb5165msd850_firmwaresm7315sd460qca6391sdxr1_firmwareipq6005aqt1000_firmwaresdx65_firmwareqcm4290csrb31024_firmwareqcm6490_firmwaresdx50mqcn9070_firmwareipq6028_firmwareqcn9011sc8180x_firmwareqca6574ausd710sa8155p_firmwareqcn5122ipq9574wcd9341_firmwarewsa8810mdm9150wcn6856qcn5022sd835_firmwareqca6564_firmwaresd768gipq6010_firmwarewcn6740qca6696sd845_firmwaresa6150pqca8075qcn9022_firmwareqcn6024qcn9022sd845qcn9072_firmwaresm7250pipq6000_firmwaresd720g_firmwaresw5100_firmwareqcn9074_firmwareqcs410_firmwaresd850Snapdragon
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2012-10057
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-8.4||HIGH
EPSS-1.92% / 83.02%
||
7 Day CHG~0.00%
Published-13 Aug, 2025 | 20:35
Updated-14 Aug, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Lattice Semiconductor ispVM System 18.0.2 XCF File Handling Buffer Overflow

Lattice Semiconductor ispVM System v18.0.2 contains a buffer overflow vulnerability in its handling of .xcf project files. When parsing the version attribute of the ispXCF XML tag, the application fails to properly validate input length, allowing a specially crafted file to overwrite memory on the stack. This can result in arbitrary code execution under the context of the user who opens the file. The vulnerability is triggered locally by opening a malicious .xcf file and does not require elevated privileges.

Action-Not Available
Vendor-Lattice Semiconductor
Product-ispVM System
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-61856
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-8.4||HIGH
EPSS-0.03% / 8.05%
||
7 Day CHG~0.00%
Published-10 Oct, 2025 | 10:19
Updated-27 Oct, 2025 | 18:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A stack-based buffer overflow vulnerability exists in VS6ComFile!CV7BaseMap::WriteV7DataToRom of V-SFT v6.2.7.0 and earlier. Opening specially crafted V-SFT files may lead to information disclosure, affected system's abnormal end (ABEND), and arbitrary code execution.

Action-Not Available
Vendor-Hakko Electronics Co., Ltd.Fuji Electric Co., Ltd.
Product-monitouch_v-sftV-SFT
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-60692
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.4||HIGH
EPSS-0.02% / 4.83%
||
7 Day CHG~0.00%
Published-13 Nov, 2025 | 00:00
Updated-17 Nov, 2025 | 19:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A stack-based buffer overflow vulnerability exists in the libshared.so library of Cisco Linksys E1200 v2 routers (Firmware E1200_v2.0.11.001_us.tar.gz). The functions get_mac_from_ip and get_ip_from_mac use sscanf with overly permissive "%100s" format specifiers to parse entries from /proc/net/arp into fixed-size buffers (v6: 50 bytes, v7 sub-arrays: 50 bytes). This allows local attackers controlling the contents of /proc/net/arp to overflow stack buffers, leading to memory corruption, denial of service, or potential arbitrary code execution.

Action-Not Available
Vendor-n/aLinksys Holdings, Inc.
Product-e1200_firmwaree1200n/a
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-60696
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.4||HIGH
EPSS-0.02% / 4.83%
||
7 Day CHG~0.00%
Published-13 Nov, 2025 | 00:00
Updated-08 Dec, 2025 | 14:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A stack-based buffer overflow vulnerability exists in the makeRequest.cgi binary of Linksys RE7000 routers (Firmware FW_v2.0.15_211230_1012). The arplookup function parses lines from /proc/net/arp using sscanf("%16s ... %18s ..."), storing results into buffers v6 (12 bytes) and v7 (20 bytes). Since the format specifiers allow up to 16 and 18 bytes respectively, oversized input can overflow the buffers, resulting in stack corruption. Local attackers controlling /proc/net/arp contents can exploit this issue to cause denial of service or potentially execute arbitrary code.

Action-Not Available
Vendor-n/aLinksys Holdings, Inc.
Product-re7000re7000_firmwaren/a
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-58776
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-8.4||HIGH
EPSS-0.03% / 6.65%
||
7 Day CHG~0.00%
Published-02 Oct, 2025 | 05:50
Updated-02 Oct, 2025 | 19:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

KV Studio versions 12.23 and prior contain a stack-based buffer overflow vulnerability. If the product uses a specially crafted file, arbitrary code may be executed on the affected product.

Action-Not Available
Vendor-KEYENCE CORPORATION
Product-KV STUDIO
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-58775
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-8.4||HIGH
EPSS-0.03% / 6.65%
||
7 Day CHG~0.00%
Published-02 Oct, 2025 | 05:50
Updated-02 Oct, 2025 | 19:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

KV STUDIO and VT5-WX15/WX12 contain a stack-based buffer overflow vulnerability. If the product uses a specially crafted file, arbitrary code may be executed on the affected product.

Action-Not Available
Vendor-KEYENCE CORPORATION
Product-KV STUDIOVT5-WX15/WX12
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-54526
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-8.4||HIGH
EPSS-0.02% / 5.91%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 21:37
Updated-12 Nov, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Fuji Electric Monitouch V-SFT-6 Stack-based Buffer Overflow

Fuji Electric Monitouch V-SFT-6 is vulnerable to a stack-based buffer overflow while processing a specially crafted project file, which may allow an attacker to execute arbitrary code.

Action-Not Available
Vendor-Fuji Electric Co., Ltd.
Product-monitouch_v-sftMonitouch V-SFT-6
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2020-37095
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-8.4||HIGH
EPSS-0.16% / 36.97%
||
7 Day CHG-0.23%
Published-06 Feb, 2026 | 23:14
Updated-17 Feb, 2026 | 17:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cyberoam Authentication Client 2.1.2.7 - Buffer Overflow (SEH)

Cyberoam Authentication Client 2.1.2.7 contains a buffer overflow vulnerability that allows remote attackers to execute arbitrary code by overwriting Structured Exception Handler (SEH) memory. Attackers can craft a malicious input in the 'Cyberoam Server Address' field to trigger a bind TCP shell on port 1337 with system-level access.

Action-Not Available
Vendor-Cyberoam
Product-Cyberoam Authentication Client
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2020-37142
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-8.4||HIGH
EPSS-0.06% / 19.32%
||
7 Day CHG~0.00%
Published-05 Feb, 2026 | 16:13
Updated-05 Feb, 2026 | 20:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
10-Strike Network Inventory Explorer 8.54 - 'Add' Local Buffer Overflow (SEH)

10-Strike Network Inventory Explorer 8.54 contains a structured exception handler buffer overflow vulnerability that allows attackers to execute arbitrary code by overwriting SEH records. Attackers can craft a malicious payload targeting the 'Computer' parameter during the 'Add' function to trigger remote code execution.

Action-Not Available
Vendor-10-Strike Software
Product-Network Inventory Explorer
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2020-37159
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-8.4||HIGH
EPSS-0.08% / 23.36%
||
7 Day CHG-0.10%
Published-06 Feb, 2026 | 23:14
Updated-17 Feb, 2026 | 16:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cuckoo Clock 5.0 - Buffer Overflow

Parallaxis Cuckoo Clock 5.0 contains a buffer overflow vulnerability that allows attackers to execute arbitrary code by overwriting memory registers in the alarm scheduling feature. Attackers can craft a malicious payload exceeding 260 bytes to overwrite EIP and EBP, enabling shellcode execution with potential remote code execution.

Action-Not Available
Vendor-Parallaxis
Product-Cuckoo Clock
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2020-37001
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-8.4||NONE
EPSS-0.02% / 3.90%
||
7 Day CHG~0.00%
Published-29 Jan, 2026 | 14:28
Updated-29 Jan, 2026 | 16:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Frigate Professional 3.36.0.9 - 'Pack File' Buffer Overflow (SEH Egghunter)

Frigate Professional 3.36.0.9 contains a local buffer overflow vulnerability in the Pack File feature that allows attackers to execute arbitrary code by overflowing the 'Archive To' input field. Attackers can craft a malicious payload that overwrites the Structured Exception Handler (SEH) and uses an egghunter technique to execute a reverse shell payload.

Action-Not Available
Vendor-Frigate3
Product-Frigate Professional
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2020-36971
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-8.4||HIGH
EPSS-0.02% / 3.90%
||
7 Day CHG~0.00%
Published-28 Jan, 2026 | 17:35
Updated-29 Jan, 2026 | 16:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Nidesoft 3GP Video Converter 2.6.18 - Local Stack Buffer Overflow

Nidesoft 3GP Video Converter 2.6.18 contains a local stack buffer overflow vulnerability in the license registration parameter. Attackers can craft a malicious payload and paste it into the 'License Code' field to execute arbitrary code on the system.

Action-Not Available
Vendor-Nidesoft
Product-Nidesoft 3GP Video Converter
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2020-37000
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-8.4||NONE
EPSS-0.13% / 32.95%
||
7 Day CHG~0.00%
Published-29 Jan, 2026 | 14:28
Updated-29 Jan, 2026 | 16:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Free MP3 CD Ripper 2.8 - Stack Buffer Overflow (SEH + Egghunter)

Free MP3 CD Ripper 2.8 contains a stack buffer overflow vulnerability that allows remote attackers to execute arbitrary code by crafting a malicious WAV file with oversized payload. Attackers can leverage a specially crafted exploit file with shellcode, SEH bypass, and egghunter technique to achieve remote code execution on vulnerable Windows systems.

Action-Not Available
Vendor-Cleanersoft Software
Product-Free MP3 CD Ripper
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2020-37013
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-8.4||NONE
EPSS-0.02% / 4.04%
||
7 Day CHG~0.00%
Published-29 Jan, 2026 | 14:28
Updated-29 Jan, 2026 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Audio Playback Recorder 3.2.2 - Local Buffer Overflow (SEH)

Audio Playback Recorder 3.2.2 contains a local buffer overflow vulnerability in the eject and registration parameters that allows attackers to execute arbitrary code. Attackers can craft malicious payloads and overwrite Structured Exception Handler (SEH) to execute shellcode when pasting specially crafted input into the application's input fields.

Action-Not Available
Vendor-Tucows Inc.
Product-Audio Playback Recorder
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2020-36967
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-8.4||HIGH
EPSS-0.31% / 53.90%
||
7 Day CHG~0.00%
Published-28 Jan, 2026 | 17:35
Updated-29 Jan, 2026 | 19:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Zortam Mp3 Media Studio 27.60 - Remote Code Execution (SEH)

Zortam Mp3 Media Studio 27.60 contains a buffer overflow vulnerability in the library creation file selection process that allows remote code execution. Attackers can craft a malicious text file with shellcode to trigger a structured exception handler (SEH) overwrite and execute arbitrary commands on the target system.

Action-Not Available
Vendor-Zortam.com
Product-Zortam Mp3 Media Studio
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2014-125114
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-8.4||HIGH
EPSS-19.70% / 95.28%
||
7 Day CHG~0.00%
Published-25 Jul, 2025 | 15:52
Updated-29 Jul, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
i-Ftp 2.20 Schedule.xml Stack-Based Buffer Overflow

A stack-based buffer overflow vulnerability exists in i-Ftp version 2.20 due to improper handling of the Time attribute within Schedule.xml. By placing a specially crafted Schedule.xml file in the i-Ftp application directory, a remote attacker can trigger a buffer overflow during scheduled download parsing, potentially leading to arbitrary code execution or a crash.

Action-Not Available
Vendor-i-Ftp
Product-i-Ftp
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-20
Improper Input Validation
CVE-2020-37176
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-8.4||HIGH
EPSS-0.07% / 20.90%
||
7 Day CHG~0.00%
Published-11 Feb, 2026 | 20:36
Updated-13 Feb, 2026 | 17:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Torrent 3GP Converter 1.51 - Stack Overflow (SEH)

Torrent 3GP Converter 1.51 contains a stack overflow vulnerability that allows attackers to execute arbitrary code by overwriting Structured Exception Handler (SEH) registers. Attackers can craft a malicious payload targeting the application's registration dialog to trigger code execution and open the calculator through carefully constructed buffer overflow techniques.

Action-Not Available
Vendor-Torrentrockyou
Product-Torrent 3GP Converter
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2020-37183
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-8.4||HIGH
EPSS-0.07% / 20.90%
||
7 Day CHG~0.00%
Published-11 Feb, 2026 | 20:37
Updated-12 Feb, 2026 | 15:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Allok RM RMVB to AVI MPEG DVD Converter 3.6.1217 - Stack Overflow (SEH)

Allok RM RMVB to AVI MPEG DVD Converter 3.6.1217 contains a stack overflow vulnerability that allows attackers to execute arbitrary code by overwriting Structured Exception Handler (SEH) registers. Attackers can craft a malicious payload in the License Name input field to trigger a buffer overflow and execute system commands like calc.exe.

Action-Not Available
Vendor-Allok Soft
Product-Allok RM RMVB to AVI MPEG DVD Converter
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2020-36961
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-8.4||HIGH
EPSS-0.23% / 45.53%
||
7 Day CHG~0.00%
Published-28 Jan, 2026 | 17:35
Updated-29 Jan, 2026 | 18:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
10-Strike Network Inventory Explorer 8.65 - Buffer Overflow (SEH)

10-Strike Network Inventory Explorer 8.65 contains a buffer overflow vulnerability in exception handling that allows remote attackers to execute arbitrary code. Attackers can craft a malicious file with 209 bytes of padding and a specially constructed Structured Exception Handler to trigger code execution.

Action-Not Available
Vendor-10-Strike Software
Product-Network Inventory Explorer
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2020-37066
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-8.4||HIGH
EPSS-0.07% / 20.47%
||
7 Day CHG~0.00%
Published-03 Feb, 2026 | 22:01
Updated-04 Feb, 2026 | 20:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
GoldWave 5.70 – Buffer Overflow (SEH Unicode)

GoldWave 5.70 contains a buffer overflow vulnerability that allows attackers to execute arbitrary code by crafting malicious input in the File Open URL dialog. Attackers can generate a specially crafted text file with Unicode-encoded shellcode to trigger a stack-based overflow and execute commands when the file is opened.

Action-Not Available
Vendor-GoldWave
Product-GoldWave
CWE ID-CWE-121
Stack-based Buffer Overflow
  • Previous
  • 1
  • 2
  • Next
Details not found