Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 30 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 30 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Iselect
Iselect iselect |
|
| Vendors & Products |
Iselect
Iselect iselect |
Sat, 28 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | iSelect 1.4.0-2+b1 contains a local buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an oversized value to the -k/--key parameter. Attackers can craft a malicious argument containing a NOP sled, shellcode, and return address to overflow a 1024-byte stack buffer and gain code execution with user privileges. | |
| Title | iSelect 1.4.0-2+b1 Local Buffer Overflow via key parameter | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-30T14:21:39.496Z
Reserved: 2026-03-28T11:41:04.200Z
Link: CVE-2016-20048
Updated: 2026-03-30T14:21:29.551Z
Status : Deferred
Published: 2026-03-28T12:16:01.210
Modified: 2026-05-01T15:21:32.393
Link: CVE-2016-20048
No data.
OpenCVE Enrichment
Updated: 2026-03-30T06:59:17Z