Show filters
59 Total Results
Displaying 1-10 of 59
Sort by:
Attacker Value
High
CVE-2020-5344
Disclosure Date: March 26, 2020 (last updated February 21, 2025)
Dell EMC iDRAC7, iDRAC8 and iDRAC9 versions prior to 2.65.65.65, 2.70.70.70, 4.00.00.00 contain a stack-based buffer overflow vulnerability. An unauthenticated remote attacker may exploit this vulnerability to crash the affected process or execute arbitrary code on the system by sending specially crafted input data.
2
Attacker Value
High
CVE-2020-10924
Disclosure Date: July 28, 2020 (last updated February 21, 2025)
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the UPnP service, which listens on TCP port 5000 by default. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length, stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9643.
1
Attacker Value
Very High
CVE-2020-14511
Disclosure Date: July 15, 2020 (last updated February 21, 2025)
Malicious operation of the crafted web browser cookie may cause a stack-based buffer overflow in the system web server on the EDR-G902 and EDR-G903 Series Routers (versions prior to 5.4).
0
Attacker Value
Low
CVE-2020-7065
Disclosure Date: March 17, 2020 (last updated February 21, 2025)
In PHP versions 7.3.x below 7.3.16 and 7.4.x below 7.4.4, while using mb_strtolower() function with UTF-32LE encoding, certain invalid strings could cause PHP to overwrite stack-allocated buffer. This could lead to memory corruption, crashes and potentially code execution.
0
Attacker Value
Unknown
CVE-2020-25844
Disclosure Date: December 31, 2020 (last updated February 22, 2025)
The digest generation function of NHIServiSignAdapter has not been verified for parameter’s length, which leads to a stack overflow loophole. Remote attackers can use the leak to execute code without privilege.
0
Attacker Value
Unknown
CVE-2020-7845
Disclosure Date: December 27, 2020 (last updated February 22, 2025)
Spamsniper 5.0 ~ 5.2.7 contain a stack-based buffer overflow vulnerability caused by improper boundary checks when parsing MAIL FROM command. It leads remote attacker to execute arbitrary code via crafted packet.
0
Attacker Value
Unknown
CVE-2020-7837
Disclosure Date: December 16, 2020 (last updated February 22, 2025)
An issue was discovered in ML Report Program. There is a stack-based buffer overflow in function sub_41EAF0 at MLReportDeamon.exe. The function will call vsprintf without checking the length of strings in parameters given by attacker. And it finally leads to a stack-based buffer overflow via access to crafted web page. This issue affects: Infraware ML Report 2.19.312.0000.
0
Attacker Value
Unknown
CVE-2020-25177
Disclosure Date: December 01, 2020 (last updated February 22, 2025)
WECON PLC Editor Versions 1.3.8 and prior has a stack-based buffer overflow vulnerability has been identified that may allow arbitrary code execution.
0
Attacker Value
Unknown
CVE-2020-25189
Disclosure Date: November 21, 2020 (last updated February 22, 2025)
The affected product is vulnerable to three stack-based buffer overflows, which may allow an unauthenticated attacker to remotely execute arbitrary code on the IP150 (firmware versions 5.02.09).
0
Attacker Value
Unknown
CVE-2020-25159
Disclosure Date: November 19, 2020 (last updated February 22, 2025)
499ES EtherNet/IP (ENIP) Adaptor Source Code is vulnerable to a stack-based buffer overflow, which may allow an attacker to send a specially crafted packet that may result in a denial-of-service condition or code execution.
0