Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 30 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 30 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Trn
Trn threaded Usenet News Reader |
|
| Vendors & Products |
Trn
Trn threaded Usenet News Reader |
Sat, 28 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | TRN 3.6-23 contains a stack buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an oversized argument to the application. Attackers can craft a malicious command-line argument with 156 bytes of padding followed by a return address to overwrite the instruction pointer and execute shellcode with user privileges. | |
| Title | TRN 3.6-23 Stack Buffer Overflow Local Code Execution | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-30T14:24:29.229Z
Reserved: 2026-03-28T11:34:09.816Z
Link: CVE-2016-20042
Updated: 2026-03-30T14:24:20.303Z
Status : Deferred
Published: 2026-03-28T12:16:00.057
Modified: 2026-05-01T15:21:32.393
Link: CVE-2016-20042
No data.
OpenCVE Enrichment
Updated: 2026-03-30T06:59:23Z