No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 30 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 30 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ekg
Ekg ekg Gadu |
|
| Vendors & Products |
Ekg
Ekg ekg Gadu |
Sat, 28 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | EKG Gadu 1.9~pre+r2855-3+b1 contains a local buffer overflow vulnerability in the username handling that allows local attackers to execute arbitrary code by supplying an oversized username string. Attackers can trigger the overflow in the strlcpy function by passing a crafted buffer exceeding 258 bytes to overwrite the instruction pointer and execute shellcode with user privileges. | |
| Title | EKG Gadu 1.9 Local Buffer Overflow via Username Parameter | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-30T17:30:50.428Z
Reserved: 2026-03-28T11:40:17.377Z
Link: CVE-2016-20047
Updated: 2026-03-30T17:30:35.847Z
Status : Awaiting Analysis
Published: 2026-03-28T12:16:01.013
Modified: 2026-03-30T13:26:07.647
Link: CVE-2016-20047
No data.
OpenCVE Enrichment
Updated: 2026-03-30T06:59:18Z