Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 30 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 30 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Identicalsoftware
Identicalsoftware xwpe |
|
| Vendors & Products |
Identicalsoftware
Identicalsoftware xwpe |
Sat, 28 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | xwpe 1.5.30a-2.1 and prior contains a stack-based buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying overly long input strings that exceed buffer boundaries. Attackers can craft malicious command-line arguments with 262 bytes of junk data followed by shellcode to overwrite the instruction pointer and achieve code execution or denial of service. | |
| Title | xwpe 1.5.30a-2.1 Stack-based Buffer Overflow | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-30T14:53:42.980Z
Reserved: 2026-03-28T11:27:46.362Z
Link: CVE-2016-20037
Updated: 2026-03-30T12:51:14.647Z
Status : Deferred
Published: 2026-03-28T12:15:58.500
Modified: 2026-05-01T15:21:32.393
Link: CVE-2016-20037
No data.
OpenCVE Enrichment
Updated: 2026-03-30T06:59:27Z