Known Exploited Vulnerabilities Buffer Overflow Capability Group

All Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
CVE-2010-2883 Adobe Acrobat and Reader Stack-Based Buffer Overflow Vulnerability secondary_impact T1059 Command and Scripting Interpreter
Comments
This vulnerability is exploited by the user opening a malicious pdf file to achieve arbitrary code execution.
References
CVE-2010-2883 Adobe Acrobat and Reader Stack-Based Buffer Overflow Vulnerability primary_impact T1027 Obfuscated Files or Information
Comments
This vulnerability is exploited by the user opening a malicious pdf file to achieve arbitrary code execution.
References
CVE-2021-21148 Google Chromium V8 Heap Buffer Overflow Vulnerability exploitation_technique T1059.007 JavaScript
Comments
CVE-2021-21148 allows an adversary to use JavaScript to exploit the Chromium browser V8 JavaScript engine which allows for a write into the heap.
References
CVE-2021-21148 Google Chromium V8 Heap Buffer Overflow Vulnerability primary_impact T1203 Exploitation for Client Execution
Comments
CVE-2021-21148 allows an adversary to use JavaScript to exploit the Chromium browser V8 JavaScript engine which allows for a write into the heap.
References
CVE-2020-5735 Amcrest Cameras and NVR Stack-based Buffer Overflow Vulnerability primary_impact T1574 Hijack Execution Flow
Comments
CVE-2020-5735 is a stack-based buffer overflow vulnerability in Amcrest cameras and NVR that allows an authenticated remote attacker to possibly execute unauthorized code over port 37777 and crash the device.
References
CVE-2020-5735 Amcrest Cameras and NVR Stack-based Buffer Overflow Vulnerability secondary_impact T1499 Endpoint Denial of Service
Comments
CVE-2020-5735 is a stack-based buffer overflow vulnerability in Amcrest cameras and NVR that allows an authenticated remote attacker to possibly execute unauthorized code over port 37777 and crash the device.
References
CVE-2007-5659 Adobe Acrobat and Reader Buffer Overflow Vulnerability exploitation_technique T1204.002 Malicious File
Comments
This vulnerability is exploited via a malicious PDF file in order to execute arbitrary code.
References
CVE-2021-21017 Adobe Acrobat and Reader Heap-based Buffer Overflow Vulnerability exploitation_technique T1204.002 Malicious File
Comments
This exploit requires a user to open a malicious file. It can then result in execution of arbitrary code which could have any number of impacts.
References
CVE-2010-2883 Adobe Acrobat and Reader Stack-Based Buffer Overflow Vulnerability exploitation_technique T1204.002 Malicious File
Comments
This vulnerability is exploited by the user opening a malicious pdf file to achieve arbitrary code execution.
References
CVE-2013-0641 Adobe Reader Buffer Overflow Vulnerability secondary_impact T1048 Exfiltration Over Alternative Protocol
Comments
This buffer overflow vulnerability is exploited via malicious-crafted pdf files delivered via targeted emails. Adversaries use this exploit to deliver a remote administration tool with the goal of data exfiltration.
References
CVE-2013-0641 Adobe Reader Buffer Overflow Vulnerability primary_impact T1105 Ingress Tool Transfer
Comments
This buffer overflow vulnerability is exploited via malicious-crafted pdf files delivered via targeted emails. Adversaries use this exploit to deliver a remote administration tool with the goal of data exfiltration.
References
CVE-2013-0641 Adobe Reader Buffer Overflow Vulnerability exploitation_technique T1204.002 Malicious File
Comments
This buffer overflow vulnerability is exploited via malicious-crafted pdf files delivered via targeted emails. Adversaries use this exploit to deliver a remote administration tool with the goal of data exfiltration.
References
CVE-2015-3113 Adobe Flash Player Heap-Based Buffer Overflow Vulnerability secondary_impact T1622 Debugger Evasion
Comments
This heap-based buffer overflow vulnerability is exploited by having a user open a maliciously-crafted file. In the wild, this exploitation has been used in order to establish command and control (over HTTP) with a target system. The command and control functionality has also been seen to employ debugging/sandboxing evasion.
References
CVE-2015-3113 Adobe Flash Player Heap-Based Buffer Overflow Vulnerability secondary_impact T1497 Virtualization/Sandbox Evasion
Comments
This heap-based buffer overflow vulnerability is exploited by having a user open a maliciously-crafted file. In the wild, this exploitation has been used in order to establish command and control (over HTTP) with a target system. The command and control functionality has also been seen to employ debugging/sandboxing evasion.
References
CVE-2015-3113 Adobe Flash Player Heap-Based Buffer Overflow Vulnerability primary_impact T1071.001 Web Protocols
Comments
This heap-based buffer overflow vulnerability is exploited by having a user open a maliciously-crafted file. In the wild, this exploitation has been used in order to establish command and control (over HTTP) with a target system. The command and control functionality has also been seen to employ debugging/sandboxing evasion.
References
CVE-2015-3113 Adobe Flash Player Heap-Based Buffer Overflow Vulnerability exploitation_technique T1204.002 Malicious File
Comments
This heap-based buffer overflow vulnerability is exploited by having a user open a maliciously-crafted file. In the wild, this exploitation has been used in order to establish command and control (over HTTP) with a target system. The command and control functionality has also been seen to employ debugging/sandboxing evasion.
References
CVE-2018-6789 Exim Buffer Overflow Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
CVE-2018-6789 is a vulnerability in Exim, an open-source mail transfer agent. This vulnerability, identified as an off-by-one buffer overflow, allows attackers to execute arbitrary code remotely by sending specially crafted messages to the SMTP listener.
References
CVE-2018-6789 Exim Buffer Overflow Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
CVE-2018-6789 is a vulnerability in Exim, an open-source mail transfer agent. This vulnerability, identified as an off-by-one buffer overflow, allows attackers to execute arbitrary code remotely by sending specially crafted messages to the SMTP listener.
References
CVE-2020-29557 D-Link DIR-825 R1 Devices Buffer Overflow Vulnerability secondary_impact T1584.005 Botnet
Comments
CVE-2020-29557 is a buffer overflow vulnerability in the web interface allows attackers to achieve pre-authentication remote code execution. Unidentified threat actors are reported to have been actively exploiting it to co-opt them to a Mirai-variant botnet used for carrying out DDoS attacks, merely two days after its public disclosure.
References
CVE-2020-29557 D-Link DIR-825 R1 Devices Buffer Overflow Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
CVE-2020-29557 is a buffer overflow vulnerability in the web interface allows attackers to achieve pre-authentication remote code execution. Unidentified threat actors are reported to have been actively exploiting it to co-opt them to a Mirai-variant botnet used for carrying out DDoS attacks, merely two days after its public disclosure.
References
CVE-2020-29557 D-Link DIR-825 R1 Devices Buffer Overflow Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
CVE-2020-29557 is a buffer overflow vulnerability in the web interface allows attackers to achieve pre-authentication remote code execution. Unidentified threat actors are reported to have been actively exploiting it to co-opt them to a Mirai-variant botnet used for carrying out DDoS attacks, merely two days after its public disclosure.
References
CVE-2022-42475 Fortinet FortiOS Heap-Based Buffer Overflow Vulnerability secondary_impact T1071.001 Web Protocols
Comments
CVE-2022-42475 is a remotely-expoitable heap overflow vulnerability. Adversaries have been observed exploiting this vulnerability to deliver malicious software to the target device. This malicious software has observed anti-debugging and command and control capabilities (over HTTP).
References
CVE-2022-42475 Fortinet FortiOS Heap-Based Buffer Overflow Vulnerability secondary_impact T1622 Debugger Evasion
Comments
CVE-2022-42475 is a remotely-expoitable heap overflow vulnerability. Adversaries have been observed exploiting this vulnerability to deliver malicious software to the target device. This malicious software has observed anti-debugging and command and control capabilities (over HTTP).
References
CVE-2022-42475 Fortinet FortiOS Heap-Based Buffer Overflow Vulnerability primary_impact T1574 Hijack Execution Flow
Comments
CVE-2022-42475 is a remotely-expoitable heap overflow vulnerability. Adversaries have been observed exploiting this vulnerability to deliver malicious software to the target device. This malicious software has observed anti-debugging and command and control capabilities (over HTTP).
References
CVE-2022-42475 Fortinet FortiOS Heap-Based Buffer Overflow Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
CVE-2022-42475 is a remotely-expoitable heap overflow vulnerability. Adversaries have been observed exploiting this vulnerability to deliver malicious software to the target device. This malicious software has observed anti-debugging and command and control capabilities (over HTTP).
References
CVE-2023-27997 Fortinet FortiOS and FortiProxy SSL-VPN Heap-Based Buffer Overflow Vulnerability primary_impact T1136 Create Account
Comments
This buffer overflow vulnerability allows adversaries to remotely execute arbitrary code via specially crafted requests. Adversaries have been observed adding accounts to config files
References
CVE-2023-27997 Fortinet FortiOS and FortiProxy SSL-VPN Heap-Based Buffer Overflow Vulnerability exploitation_technique T1574 Hijack Execution Flow
Comments
This buffer overflow vulnerability allows adversaries to remotely execute arbitrary code via specially crafted requests. Adversaries have been observed adding accounts to config files
References
CVE-2023-27997 Fortinet FortiOS and FortiProxy SSL-VPN Heap-Based Buffer Overflow Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
This buffer overflow vulnerability allows adversaries to remotely execute arbitrary code via specially crafted requests. Adversaries have been observed adding accounts to config files
References
CVE-2023-6549 Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability primary_impact T1499 Endpoint Denial of Service
Comments
This buffer overflow vulnerability can be exploited to cause a denial of service.
References
CVE-2023-6549 Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability exploitation_technique T1574 Hijack Execution Flow
Comments
This buffer overflow vulnerability can be exploited to cause a denial of service.
References
CVE-2023-4966 Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability secondary_impact T1134.001 Token Impersonation/Theft
CVE-2023-4966 Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability primary_impact T1005 Data from Local System
CVE-2023-4966 Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability exploitation_technique T1574 Hijack Execution Flow
CVE-2022-20699 Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability primary_impact T1059.004 Unix Shell
Comments
This vulnerability is exploited by a remote, unauthenticated attacker by "sending a specially crafted HTTP request to a vulnerable device that is acting as an SSL VPN Gateway.” This can be performed due to insufficient boundary checks when processing specific HTTP requests. If exploited, this could grant root privileges to the attacker.
References
CVE-2022-20699 Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability exploitation_technique T1133 External Remote Services
Comments
This vulnerability is exploited by a remote, unauthenticated attacker by "sending a specially crafted HTTP request to a vulnerable device that is acting as an SSL VPN Gateway.” This can be performed due to insufficient boundary checks when processing specific HTTP requests. If exploited, this could grant root privileges to the attacker.
References
CVE-2022-20700 Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability primary_impact T1059.004 Unix Shell
Comments
This vulnerability is exploited by a remote attacker who sends specific commands to a Cisco router that does not have sufficient authorization enforcement mechanisms in place. This could allow the remote attacker to gain root privileges and execute arbitrary commands on the system.
References
CVE-2022-20700 Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
This vulnerability is exploited by a remote attacker who sends specific commands to a Cisco router that does not have sufficient authorization enforcement mechanisms in place. This could allow the remote attacker to gain root privileges and execute arbitrary commands on the system.
References
CVE-2022-20701 Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability primary_impact T1203 Exploitation for Client Execution
Comments
This insufficient authorization vulnerability is exploited by a local attacker who has access to low-privileged code where they then execute commands within confd_cli at a higher privilege levels. Performing these commands could grant the local attacker root privileges.
References
CVE-2022-20701 Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability exploitation_technique T1078 Valid Accounts
Comments
This insufficient authorization vulnerability is exploited by a local attacker who has access to low-privileged code where they then execute commands within confd_cli at a higher privilege levels. Performing these commands could grant the local attacker root privileges.
References
CVE-2022-20708 Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability primary_impact T1068 Exploitation for Privilege Escalation
Comments
This vulnerability is exploited by bypassing user authentication mechanisms via a lack of proper validation of a user-supplied string before executing a system call. This could grant adversaries root access to execute arbitrary code.
References
CVE-2022-20708 Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
This vulnerability is exploited by bypassing user authentication mechanisms via a lack of proper validation of a user-supplied string before executing a system call. This could grant adversaries root access to execute arbitrary code.
References
CVE-2022-20703 Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability exploitation_technique T1203 Exploitation for Client Execution
Comments
This Digital Signature Verification Bypass vulnerability is exploited by an unauthenticated, local attacker. The attacker exploits an improper verification of software images that could allow the attacker to install and boot malicious images or execute unsigned binaries.
References
CVE-2021-22894 Ivanti Pulse Connect Secure Collaboration Suite Buffer Overflow Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
This vulnerability is exploited through a buffer overflow weakness. Remote authenticated attackers leverage this vulnerability to perform arbitrary code execution with root privileges on the Pulse Connect Secure gateway by manipulating input buffers.
References
CVE-2021-22894 Ivanti Pulse Connect Secure Collaboration Suite Buffer Overflow Vulnerability exploitation_technique T1078 Valid Accounts
Comments
This vulnerability is exploited through a buffer overflow weakness. Remote authenticated attackers leverage this vulnerability to perform arbitrary code execution with root privileges on the Pulse Connect Secure gateway by manipulating input buffers.
References
CVE-2023-5217 Google Chromium libvpx Heap Buffer Overflow Vulnerability primary_impact T1574 Hijack Execution Flow
Comments
This vulnerability was exploited by a remote attacker using a crafted HTML page to trigger a heap buffer overflow in the vp8 encoding of libvpx, leading to heap corruption. This flaw was part of a spyware campaign. The exploitation allowed for program crashes or arbitrary code execution, ultimately resulting in the installation of spyware.
References
CVE-2023-5217 Google Chromium libvpx Heap Buffer Overflow Vulnerability exploitation_technique T1204.001 Malicious Link
Comments
This vulnerability was exploited by a remote attacker using a crafted HTML page to trigger a heap buffer overflow in the vp8 encoding of libvpx, leading to heap corruption. This flaw was part of a spyware campaign. The exploitation allowed for program crashes or arbitrary code execution, ultimately resulting in the installation of spyware.
References
CVE-2023-7024 Google Chromium WebRTC Heap Buffer Overflow Vulnerability primary_impact T1574 Hijack Execution Flow
Comments
This heap buffer overflow vulnerability is exploited by a remote attacker via a crafted HTML page. This vulnerability has been leveraged by the NSO group to enable remote code execution within a browser's WebRTC component to install the spyware Pegasus on victim endpoints.
References
CVE-2023-7024 Google Chromium WebRTC Heap Buffer Overflow Vulnerability exploitation_technique T1189 Drive-by Compromise
Comments
This heap buffer overflow vulnerability is exploited by a remote attacker via a crafted HTML page. This vulnerability has been leveraged by the NSO group to enable remote code execution within a browser's WebRTC component to install the spyware Pegasus on victim endpoints.
References

Capabilities

Capability ID Capability Name Number of Mappings
CVE-2010-2883 Adobe Acrobat and Reader Stack-Based Buffer Overflow Vulnerability 3
CVE-2018-6789 Exim Buffer Overflow Vulnerability 2
CVE-2023-27997 Fortinet FortiOS and FortiProxy SSL-VPN Heap-Based Buffer Overflow Vulnerability 3
CVE-2007-5659 Adobe Acrobat and Reader Buffer Overflow Vulnerability 1
CVE-2022-20699 Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability 2
CVE-2022-20700 Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability 2
CVE-2022-20708 Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability 2
CVE-2020-29557 D-Link DIR-825 R1 Devices Buffer Overflow Vulnerability 3
CVE-2021-21017 Adobe Acrobat and Reader Heap-based Buffer Overflow Vulnerability 1
CVE-2022-42475 Fortinet FortiOS Heap-Based Buffer Overflow Vulnerability 4
CVE-2022-20703 Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability 1
CVE-2020-5735 Amcrest Cameras and NVR Stack-based Buffer Overflow Vulnerability 2
CVE-2021-21148 Google Chromium V8 Heap Buffer Overflow Vulnerability 2
CVE-2022-20701 Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability 2
CVE-2023-6549 Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability 2
CVE-2015-3113 Adobe Flash Player Heap-Based Buffer Overflow Vulnerability 4
CVE-2021-22894 Ivanti Pulse Connect Secure Collaboration Suite Buffer Overflow Vulnerability 2
CVE-2013-0641 Adobe Reader Buffer Overflow Vulnerability 3
CVE-2023-4966 Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability 3
CVE-2023-7024 Google Chromium WebRTC Heap Buffer Overflow Vulnerability 2
CVE-2023-5217 Google Chromium libvpx Heap Buffer Overflow Vulnerability 2