Known Exploited Vulnerabilities Buffer Overflow Capability Group

All Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
CVE-2023-7024 Google Chromium WebRTC Heap Buffer Overflow Vulnerability primary_impact T1574 Hijack Execution Flow
Comments
This heap buffer overflow vulnerability is exploited by a remote attacker via a crafted HTML page. This vulnerability has been leveraged by the NSO group to enable remote code execution within a browser's WebRTC component to install the spyware Pegasus on victim endpoints.
References
CVE-2023-7024 Google Chromium WebRTC Heap Buffer Overflow Vulnerability exploitation_technique T1189 Drive-by Compromise
Comments
This heap buffer overflow vulnerability is exploited by a remote attacker via a crafted HTML page. This vulnerability has been leveraged by the NSO group to enable remote code execution within a browser's WebRTC component to install the spyware Pegasus on victim endpoints.
References
CVE-2023-6549 Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability primary_impact T1499 Endpoint Denial of Service
Comments
This buffer overflow vulnerability can be exploited to cause a denial of service.
References
CVE-2023-6549 Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability exploitation_technique T1574 Hijack Execution Flow
Comments
This buffer overflow vulnerability can be exploited to cause a denial of service.
References
CVE-2023-5217 Google Chromium libvpx Heap Buffer Overflow Vulnerability primary_impact T1574 Hijack Execution Flow
Comments
This vulnerability was exploited by a remote attacker using a crafted HTML page to trigger a heap buffer overflow in the vp8 encoding of libvpx, leading to heap corruption. This flaw was part of a spyware campaign. The exploitation allowed for program crashes or arbitrary code execution, ultimately resulting in the installation of spyware.
References
CVE-2023-5217 Google Chromium libvpx Heap Buffer Overflow Vulnerability exploitation_technique T1204.001 Malicious Link
Comments
This vulnerability was exploited by a remote attacker using a crafted HTML page to trigger a heap buffer overflow in the vp8 encoding of libvpx, leading to heap corruption. This flaw was part of a spyware campaign. The exploitation allowed for program crashes or arbitrary code execution, ultimately resulting in the installation of spyware.
References
CVE-2023-4966 Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability secondary_impact T1134.001 Token Impersonation/Theft
CVE-2023-4966 Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability primary_impact T1005 Data from Local System
CVE-2023-4966 Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability exploitation_technique T1574 Hijack Execution Flow
CVE-2023-27997 Fortinet FortiOS and FortiProxy SSL-VPN Heap-Based Buffer Overflow Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
This buffer overflow vulnerability allows adversaries to remotely execute arbitrary code via specially crafted requests. Adversaries have been observed adding accounts to config files
References
CVE-2023-27997 Fortinet FortiOS and FortiProxy SSL-VPN Heap-Based Buffer Overflow Vulnerability primary_impact T1136 Create Account
Comments
This buffer overflow vulnerability allows adversaries to remotely execute arbitrary code via specially crafted requests. Adversaries have been observed adding accounts to config files
References
CVE-2023-27997 Fortinet FortiOS and FortiProxy SSL-VPN Heap-Based Buffer Overflow Vulnerability exploitation_technique T1574 Hijack Execution Flow
Comments
This buffer overflow vulnerability allows adversaries to remotely execute arbitrary code via specially crafted requests. Adversaries have been observed adding accounts to config files
References
CVE-2022-42475 Fortinet FortiOS Heap-Based Buffer Overflow Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
CVE-2022-42475 is a remotely-expoitable heap overflow vulnerability. Adversaries have been observed exploiting this vulnerability to deliver malicious software to the target device. This malicious software has observed anti-debugging and command and control capabilities (over HTTP).
References
CVE-2022-42475 Fortinet FortiOS Heap-Based Buffer Overflow Vulnerability secondary_impact T1071.001 Web Protocols
Comments
CVE-2022-42475 is a remotely-expoitable heap overflow vulnerability. Adversaries have been observed exploiting this vulnerability to deliver malicious software to the target device. This malicious software has observed anti-debugging and command and control capabilities (over HTTP).
References
CVE-2022-42475 Fortinet FortiOS Heap-Based Buffer Overflow Vulnerability secondary_impact T1622 Debugger Evasion
Comments
CVE-2022-42475 is a remotely-expoitable heap overflow vulnerability. Adversaries have been observed exploiting this vulnerability to deliver malicious software to the target device. This malicious software has observed anti-debugging and command and control capabilities (over HTTP).
References
CVE-2022-42475 Fortinet FortiOS Heap-Based Buffer Overflow Vulnerability primary_impact T1574 Hijack Execution Flow
Comments
CVE-2022-42475 is a remotely-expoitable heap overflow vulnerability. Adversaries have been observed exploiting this vulnerability to deliver malicious software to the target device. This malicious software has observed anti-debugging and command and control capabilities (over HTTP).
References
CVE-2022-20708 Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
This vulnerability is exploited by bypassing user authentication mechanisms via a lack of proper validation of a user-supplied string before executing a system call. This could grant adversaries root access to execute arbitrary code.
References
CVE-2022-20708 Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability primary_impact T1068 Exploitation for Privilege Escalation
Comments
This vulnerability is exploited by bypassing user authentication mechanisms via a lack of proper validation of a user-supplied string before executing a system call. This could grant adversaries root access to execute arbitrary code.
References
CVE-2022-20703 Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability exploitation_technique T1203 Exploitation for Client Execution
Comments
This Digital Signature Verification Bypass vulnerability is exploited by an unauthenticated, local attacker. The attacker exploits an improper verification of software images that could allow the attacker to install and boot malicious images or execute unsigned binaries.
References
CVE-2022-20701 Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability primary_impact T1203 Exploitation for Client Execution
Comments
This insufficient authorization vulnerability is exploited by a local attacker who has access to low-privileged code where they then execute commands within confd_cli at a higher privilege levels. Performing these commands could grant the local attacker root privileges.
References
CVE-2022-20701 Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability exploitation_technique T1078 Valid Accounts
Comments
This insufficient authorization vulnerability is exploited by a local attacker who has access to low-privileged code where they then execute commands within confd_cli at a higher privilege levels. Performing these commands could grant the local attacker root privileges.
References
CVE-2022-20700 Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
This vulnerability is exploited by a remote attacker who sends specific commands to a Cisco router that does not have sufficient authorization enforcement mechanisms in place. This could allow the remote attacker to gain root privileges and execute arbitrary commands on the system.
References
CVE-2022-20700 Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability primary_impact T1059.004 Unix Shell
Comments
This vulnerability is exploited by a remote attacker who sends specific commands to a Cisco router that does not have sufficient authorization enforcement mechanisms in place. This could allow the remote attacker to gain root privileges and execute arbitrary commands on the system.
References
CVE-2022-20699 Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability primary_impact T1059.004 Unix Shell
Comments
This vulnerability is exploited by a remote, unauthenticated attacker by "sending a specially crafted HTTP request to a vulnerable device that is acting as an SSL VPN Gateway.” This can be performed due to insufficient boundary checks when processing specific HTTP requests. If exploited, this could grant root privileges to the attacker.
References
CVE-2022-20699 Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability exploitation_technique T1133 External Remote Services
Comments
This vulnerability is exploited by a remote, unauthenticated attacker by "sending a specially crafted HTTP request to a vulnerable device that is acting as an SSL VPN Gateway.” This can be performed due to insufficient boundary checks when processing specific HTTP requests. If exploited, this could grant root privileges to the attacker.
References
CVE-2021-22894 Ivanti Pulse Connect Secure Collaboration Suite Buffer Overflow Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
This vulnerability is exploited through a buffer overflow weakness. Remote authenticated attackers leverage this vulnerability to perform arbitrary code execution with root privileges on the Pulse Connect Secure gateway by manipulating input buffers.
References
CVE-2021-22894 Ivanti Pulse Connect Secure Collaboration Suite Buffer Overflow Vulnerability exploitation_technique T1078 Valid Accounts
Comments
This vulnerability is exploited through a buffer overflow weakness. Remote authenticated attackers leverage this vulnerability to perform arbitrary code execution with root privileges on the Pulse Connect Secure gateway by manipulating input buffers.
References
CVE-2021-21148 Google Chromium V8 Heap Buffer Overflow Vulnerability primary_impact T1203 Exploitation for Client Execution
Comments
CVE-2021-21148 allows an adversary to use JavaScript to exploit the Chromium browser V8 JavaScript engine which allows for a write into the heap.
References
CVE-2021-21148 Google Chromium V8 Heap Buffer Overflow Vulnerability exploitation_technique T1059.007 JavaScript
Comments
CVE-2021-21148 allows an adversary to use JavaScript to exploit the Chromium browser V8 JavaScript engine which allows for a write into the heap.
References
CVE-2021-21017 Adobe Acrobat and Reader Heap-based Buffer Overflow Vulnerability exploitation_technique T1204.002 Malicious File
Comments
This exploit requires a user to open a malicious file. It can then result in execution of arbitrary code which could have any number of impacts.
References
CVE-2020-5735 Amcrest Cameras and NVR Stack-based Buffer Overflow Vulnerability primary_impact T1574 Hijack Execution Flow
Comments
CVE-2020-5735 is a stack-based buffer overflow vulnerability in Amcrest cameras and NVR that allows an authenticated remote attacker to possibly execute unauthorized code over port 37777 and crash the device.
References
CVE-2020-5735 Amcrest Cameras and NVR Stack-based Buffer Overflow Vulnerability secondary_impact T1499 Endpoint Denial of Service
Comments
CVE-2020-5735 is a stack-based buffer overflow vulnerability in Amcrest cameras and NVR that allows an authenticated remote attacker to possibly execute unauthorized code over port 37777 and crash the device.
References
CVE-2020-29557 D-Link DIR-825 R1 Devices Buffer Overflow Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
CVE-2020-29557 is a buffer overflow vulnerability in the web interface allows attackers to achieve pre-authentication remote code execution. Unidentified threat actors are reported to have been actively exploiting it to co-opt them to a Mirai-variant botnet used for carrying out DDoS attacks, merely two days after its public disclosure.
References
CVE-2020-29557 D-Link DIR-825 R1 Devices Buffer Overflow Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
CVE-2020-29557 is a buffer overflow vulnerability in the web interface allows attackers to achieve pre-authentication remote code execution. Unidentified threat actors are reported to have been actively exploiting it to co-opt them to a Mirai-variant botnet used for carrying out DDoS attacks, merely two days after its public disclosure.
References
CVE-2020-29557 D-Link DIR-825 R1 Devices Buffer Overflow Vulnerability secondary_impact T1584.005 Botnet
Comments
CVE-2020-29557 is a buffer overflow vulnerability in the web interface allows attackers to achieve pre-authentication remote code execution. Unidentified threat actors are reported to have been actively exploiting it to co-opt them to a Mirai-variant botnet used for carrying out DDoS attacks, merely two days after its public disclosure.
References
CVE-2018-6789 Exim Buffer Overflow Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
CVE-2018-6789 is a vulnerability in Exim, an open-source mail transfer agent. This vulnerability, identified as an off-by-one buffer overflow, allows attackers to execute arbitrary code remotely by sending specially crafted messages to the SMTP listener.
References
CVE-2018-6789 Exim Buffer Overflow Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
CVE-2018-6789 is a vulnerability in Exim, an open-source mail transfer agent. This vulnerability, identified as an off-by-one buffer overflow, allows attackers to execute arbitrary code remotely by sending specially crafted messages to the SMTP listener.
References
CVE-2015-3113 Adobe Flash Player Heap-Based Buffer Overflow Vulnerability exploitation_technique T1204.002 Malicious File
Comments
This heap-based buffer overflow vulnerability is exploited by having a user open a maliciously-crafted file. In the wild, this exploitation has been used in order to establish command and control (over HTTP) with a target system. The command and control functionality has also been seen to employ debugging/sandboxing evasion.
References
CVE-2015-3113 Adobe Flash Player Heap-Based Buffer Overflow Vulnerability secondary_impact T1622 Debugger Evasion
Comments
This heap-based buffer overflow vulnerability is exploited by having a user open a maliciously-crafted file. In the wild, this exploitation has been used in order to establish command and control (over HTTP) with a target system. The command and control functionality has also been seen to employ debugging/sandboxing evasion.
References
CVE-2015-3113 Adobe Flash Player Heap-Based Buffer Overflow Vulnerability secondary_impact T1497 Virtualization/Sandbox Evasion
Comments
This heap-based buffer overflow vulnerability is exploited by having a user open a maliciously-crafted file. In the wild, this exploitation has been used in order to establish command and control (over HTTP) with a target system. The command and control functionality has also been seen to employ debugging/sandboxing evasion.
References
CVE-2015-3113 Adobe Flash Player Heap-Based Buffer Overflow Vulnerability primary_impact T1071.001 Web Protocols
Comments
This heap-based buffer overflow vulnerability is exploited by having a user open a maliciously-crafted file. In the wild, this exploitation has been used in order to establish command and control (over HTTP) with a target system. The command and control functionality has also been seen to employ debugging/sandboxing evasion.
References
CVE-2013-0641 Adobe Reader Buffer Overflow Vulnerability exploitation_technique T1204.002 Malicious File
Comments
This buffer overflow vulnerability is exploited via malicious-crafted pdf files delivered via targeted emails. Adversaries use this exploit to deliver a remote administration tool with the goal of data exfiltration.
References
CVE-2013-0641 Adobe Reader Buffer Overflow Vulnerability secondary_impact T1048 Exfiltration Over Alternative Protocol
Comments
This buffer overflow vulnerability is exploited via malicious-crafted pdf files delivered via targeted emails. Adversaries use this exploit to deliver a remote administration tool with the goal of data exfiltration.
References
CVE-2013-0641 Adobe Reader Buffer Overflow Vulnerability primary_impact T1105 Ingress Tool Transfer
Comments
This buffer overflow vulnerability is exploited via malicious-crafted pdf files delivered via targeted emails. Adversaries use this exploit to deliver a remote administration tool with the goal of data exfiltration.
References
CVE-2010-2883 Adobe Acrobat and Reader Stack-Based Buffer Overflow Vulnerability exploitation_technique T1204.002 Malicious File
Comments
This vulnerability is exploited by the user opening a malicious pdf file to achieve arbitrary code execution.
References
CVE-2010-2883 Adobe Acrobat and Reader Stack-Based Buffer Overflow Vulnerability secondary_impact T1059 Command and Scripting Interpreter
Comments
This vulnerability is exploited by the user opening a malicious pdf file to achieve arbitrary code execution.
References
CVE-2010-2883 Adobe Acrobat and Reader Stack-Based Buffer Overflow Vulnerability primary_impact T1027 Obfuscated Files or Information
Comments
This vulnerability is exploited by the user opening a malicious pdf file to achieve arbitrary code execution.
References
CVE-2007-5659 Adobe Acrobat and Reader Buffer Overflow Vulnerability exploitation_technique T1204.002 Malicious File
Comments
This vulnerability is exploited via a malicious PDF file in order to execute arbitrary code.
References
CVE-2025-24993 Microsoft Windows NTFS Heap-Based Buffer Overflow Vulnerability exploitation_technique T1068 Exploitation for Privilege Escalation
Comments
This heap-based buffer overflow vulnerability in Windows NTFS allows an attacker to elevate to SYSTEM-level privileges. This vulnerability can be exploited via malicious virtual hard disk (VHD) files that can be mounted by a system user, leading to code execution.
References
CVE-2025-24993 Microsoft Windows NTFS Heap-Based Buffer Overflow Vulnerability exploitation_technique T1204 User Execution
Comments
This heap-based buffer overflow vulnerability in Windows NTFS allows an attacker to elevate to SYSTEM-level privileges. This vulnerability can be exploited via malicious virtual hard disk (VHD) files that can be mounted by a system user, leading to code execution.
References
CVE-2025-24993 Microsoft Windows NTFS Heap-Based Buffer Overflow Vulnerability exploitation_technique T1203 Exploitation for Client Execution
Comments
This heap-based buffer overflow vulnerability in Windows NTFS allows an attacker to elevate to SYSTEM-level privileges. This vulnerability can be exploited via malicious virtual hard disk (VHD) files that can be mounted by a system user, leading to code execution.
References
CVE-2025-24993 Microsoft Windows NTFS Heap-Based Buffer Overflow Vulnerability primary_impact T1055 Process Injection
Comments
This heap-based buffer overflow vulnerability in Windows NTFS allows an attacker to elevate to SYSTEM-level privileges. This vulnerability can be exploited via malicious virtual hard disk (VHD) files that can be mounted by a system user, leading to code execution.
References
CVE-2025-24993 Microsoft Windows NTFS Heap-Based Buffer Overflow Vulnerability secondary_impact T1565 Data Manipulation
Comments
This heap-based buffer overflow vulnerability in Windows NTFS allows an attacker to elevate to SYSTEM-level privileges. This vulnerability can be exploited via malicious virtual hard disk (VHD) files that can be mounted by a system user, leading to code execution.
References
CVE-2025-21333 Microsoft Windows Hyper-V NT Kernel Integration VSP Heap-based Buffer Overflow Vulnerability exploitation_technique T1068 Exploitation for Privilege Escalation
Comments
This vulnerability, if exploited, would allow an adversary to obtain SYSTEM-level privileges, resulting in total system compromise.
References
CVE-2025-21333 Microsoft Windows Hyper-V NT Kernel Integration VSP Heap-based Buffer Overflow Vulnerability primary_impact T1003 OS Credential Dumping
Comments
This vulnerability, if exploited, would allow an adversary to obtain SYSTEM-level privileges, resulting in total system compromise.
References
CVE-2025-21418 Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability exploitation_technique T1068 Exploitation for Privilege Escalation
Comments
Exploiting this buffer overflow vulnerability could lead to an adversary gaining elevated privileges on the machine, leading to the potential for process injection using malicious code, as well as data loss.
References
CVE-2025-21418 Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability primary_impact T1055 Process Injection
Comments
Exploiting this buffer overflow vulnerability could lead to an adversary gaining elevated privileges on the machine, leading to the potential for process injection using malicious code, as well as data loss.
References
CVE-2025-21418 Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability primary_impact T1005 Data from Local System
Comments
Exploiting this buffer overflow vulnerability could lead to an adversary gaining elevated privileges on the machine, leading to the potential for process injection using malicious code, as well as data loss.
References
CVE-2025-22457 Ivanti Connect Secure, Policy Secure, and ZTA Gateways Stack-Based Buffer Overflow Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
Ivanti Connect Secure, Pulse Connect Secure, Ivanti Policy Secure, and ZTA Gateways products running old versions are susceptible to a stack-based buffer overflow exploit that can lead to remote code execution. The patched versions of each product that remove this vulnerability are as follows: Ivanti Connect Secure (22.7R2.6), Pulse Connect Secure (22.7R2.6), Ivanti Policy Secure (22.7R1.4), and ZTA Gateways (22.8R2.2).
References
CVE-2025-22457 Ivanti Connect Secure, Policy Secure, and ZTA Gateways Stack-Based Buffer Overflow Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
Ivanti Connect Secure, Pulse Connect Secure, Ivanti Policy Secure, and ZTA Gateways products running old versions are susceptible to a stack-based buffer overflow exploit that can lead to remote code execution. The patched versions of each product that remove this vulnerability are as follows: Ivanti Connect Secure (22.7R2.6), Pulse Connect Secure (22.7R2.6), Ivanti Policy Secure (22.7R1.4), and ZTA Gateways (22.8R2.2).
References
CVE-2025-0282 Ivanti Connect Secure, Policy Secure, and ZTA Gateways Stack-Based Buffer Overflow Vulnerability exploitation_technique T1595 Active Scanning
Comments
This vulnerability in Ivanti products is version-specific, requiring any reconaissance efforts to return the exact version before exploiting. If exploited, attackers may gain the ability to execute arbitrary code and harvest credentials from the compromised device. Additionally, they may perform internal reconaissance to find additional devices on the network to compromise.
References
CVE-2025-0282 Ivanti Connect Secure, Policy Secure, and ZTA Gateways Stack-Based Buffer Overflow Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
This vulnerability in Ivanti products is version-specific, requiring any reconaissance efforts to return the exact version before exploiting. If exploited, attackers may gain the ability to execute arbitrary code and harvest credentials from the compromised device. Additionally, they may perform internal reconaissance to find additional devices on the network to compromise.
References
CVE-2025-0282 Ivanti Connect Secure, Policy Secure, and ZTA Gateways Stack-Based Buffer Overflow Vulnerability primary_impact T1055 Process Injection
Comments
This vulnerability in Ivanti products is version-specific, requiring any reconaissance efforts to return the exact version before exploiting. If exploited, attackers may gain the ability to execute arbitrary code and harvest credentials from the compromised device. Additionally, they may perform internal reconaissance to find additional devices on the network to compromise.
References
CVE-2025-0282 Ivanti Connect Secure, Policy Secure, and ZTA Gateways Stack-Based Buffer Overflow Vulnerability primary_impact T1003 OS Credential Dumping
Comments
This vulnerability in Ivanti products is version-specific, requiring any reconaissance efforts to return the exact version before exploiting. If exploited, attackers may gain the ability to execute arbitrary code and harvest credentials from the compromised device. Additionally, they may perform internal reconaissance to find additional devices on the network to compromise.
References
CVE-2025-0282 Ivanti Connect Secure, Policy Secure, and ZTA Gateways Stack-Based Buffer Overflow Vulnerability secondary_impact T1046 Network Service Discovery
Comments
This vulnerability in Ivanti products is version-specific, requiring any reconaissance efforts to return the exact version before exploiting. If exploited, attackers may gain the ability to execute arbitrary code and harvest credentials from the compromised device. Additionally, they may perform internal reconaissance to find additional devices on the network to compromise.
References
CVE-2025-0282 Ivanti Connect Secure, Policy Secure, and ZTA Gateways Stack-Based Buffer Overflow Vulnerability secondary_impact T1018 Remote System Discovery
Comments
This vulnerability in Ivanti products is version-specific, requiring any reconaissance efforts to return the exact version before exploiting. If exploited, attackers may gain the ability to execute arbitrary code and harvest credentials from the compromised device. Additionally, they may perform internal reconaissance to find additional devices on the network to compromise.
References
CVE-2025-6543 Citrix NetScaler ADC and Gateway Buffer Overflow Vulnerability exploitation_technique T1203 Exploitation for Client Execution
Comments
An unprivileged attacker can leverage this buffer overflow vulnerability, leading to a denial of service attack. No public exploits of this vulnerability exist, and information from Citrix is limited.
References
CVE-2025-6543 Citrix NetScaler ADC and Gateway Buffer Overflow Vulnerability primary_impact T1498 Network Denial of Service
Comments
An unprivileged attacker can leverage this buffer overflow vulnerability, leading to a denial of service attack, and potentially remote code execution. No public exploits of this vulnerability exist, and information from Citrix is limited.
References
CVE-2025-6543 Citrix NetScaler ADC and Gateway Buffer Overflow Vulnerability secondary_impact T1059 Command and Scripting Interpreter
Comments
An unprivileged attacker can leverage this buffer overflow vulnerability, leading to a denial of service attack, and potentially remote code execution. No public exploits of this vulnerability exist, and information from Citrix is limited.
References
CVE-2025-42599 Qualitia Active! Mail Stack-Based Buffer Overflow Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
This stack-based buffer overflow vulnerability in Active! mail allows an unauthenticated attacker to achieve remote code execution, as well as execute a denial of service attack by crashing the server.
References
CVE-2025-42599 Qualitia Active! Mail Stack-Based Buffer Overflow Vulnerability exploitation_technique T1588.006 Vulnerabilities
Comments
This stack-based buffer overflow vulnerability in Active! mail allows an unauthenticated attacker to achieve remote code execution, as well as execute a denial of service attack by crashing the server.
References
CVE-2025-42599 Qualitia Active! Mail Stack-Based Buffer Overflow Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
This stack-based buffer overflow vulnerability in Active! mail allows an unauthenticated attacker to achieve remote code execution, as well as execute a denial of service attack by crashing the server.
References
CVE-2025-42599 Qualitia Active! Mail Stack-Based Buffer Overflow Vulnerability primary_impact T1499 Endpoint Denial of Service
Comments
This stack-based buffer overflow vulnerability in Active! mail allows an unauthenticated attacker to achieve remote code execution, as well as execute a denial of service attack by crashing the server.
References
CVE-2025-32756 Fortinet Multiple Products Stack-Based Buffer Overflow Vulnerability exploitation_technique T1133 External Remote Services
Comments
Attackers use a Python script (publicly available or custom) to send a malformed POST request, triggering a buffer overflow. From there, they execute remote code and malicious payloads (i.e. malware), harvest credentials, move laterally over the network, erase logs to avoid detection, and exfiltrate data over C2.
References
CVE-2025-32756 Fortinet Multiple Products Stack-Based Buffer Overflow Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
Attackers use a Python script (publicly available or custom) to send a malformed POST request, triggering a buffer overflow. From there, they execute remote code and malicious payloads (i.e. malware), harvest credentials, move laterally over the network, erase logs to avoid detection, and exfiltrate data over C2.
References
CVE-2025-32756 Fortinet Multiple Products Stack-Based Buffer Overflow Vulnerability secondary_impact T1608.001 Upload Malware
Comments
Attackers use a Python script (publicly available or custom) to send a malformed POST request, triggering a buffer overflow. From there, they execute remote code and malicious payloads (i.e. malware), harvest credentials, move laterally over the network, erase logs to avoid detection, and exfiltrate data over C2.
References
CVE-2025-32756 Fortinet Multiple Products Stack-Based Buffer Overflow Vulnerability secondary_impact T1003 OS Credential Dumping
Comments
Attackers use a Python script (publicly available or custom) to send a malformed POST request, triggering a buffer overflow. From there, they execute remote code and malicious payloads (i.e. malware), harvest credentials, move laterally over the network by scanning for other devices, erase logs to avoid detection, and exfiltrate data over C2.
References
CVE-2025-32756 Fortinet Multiple Products Stack-Based Buffer Overflow Vulnerability secondary_impact T1046 Network Service Discovery
Comments
Attackers use a Python script (publicly available or custom) to send a malformed POST request, triggering a buffer overflow. From there, they execute remote code and malicious payloads (i.e. malware), harvest credentials, move laterally over the network by scanning for other devices, erase logs to avoid detection, and exfiltrate data over C2.
References
CVE-2025-32756 Fortinet Multiple Products Stack-Based Buffer Overflow Vulnerability secondary_impact T1070.004 File Deletion
Comments
Attackers use a Python script (publicly available or custom) to send a malformed POST request, triggering a buffer overflow. From there, they execute remote code and malicious payloads (i.e. malware), harvest credentials, move laterally over the network by scanning for other devices, erase logs to avoid detection, and exfiltrate data over C2.
References
CVE-2025-32756 Fortinet Multiple Products Stack-Based Buffer Overflow Vulnerability secondary_impact T1041 Exfiltration Over C2 Channel
Comments
Attackers use a Python script (publicly available or custom) to send a malformed POST request, triggering a buffer overflow. From there, they execute remote code and malicious payloads (i.e. malware), harvest credentials, move laterally over the network by scanning for other devices, erase logs to avoid detection, and exfiltrate data over C2.
References
CVE-2025-32706 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability exploitation_technique T1068 Exploitation for Privilege Escalation
Comments
Attackers have exploited this heap-based buffer overflow vulnerability to escalate their privileges to SYSTEM-level, allowing them to execute arbitrary code, disable security tools, deploy malicious payloads, and extract credentials from memory.
References
CVE-2025-32706 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability exploitation_technique T1059 Command and Scripting Interpreter
Comments
Attackers have exploited this heap-based buffer overflow vulnerability to escalate their privileges to SYSTEM-level, allowing them to execute arbitrary code, disable security tools, deploy malicious payloads, and extract credentials from memory.
References
CVE-2025-32706 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability primary_impact T1543 Create or Modify System Process
Comments
Attackers have exploited this heap-based buffer overflow vulnerability to escalate their privileges to SYSTEM-level, allowing them to execute arbitrary code, disable security tools, deploy malicious payloads, and extract credentials from memory.
References
CVE-2025-32706 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability primary_impact T1003.001 LSASS Memory
Comments
Attackers have exploited this heap-based buffer overflow vulnerability to escalate their privileges to SYSTEM-level, allowing them to execute arbitrary code, disable security tools, deploy malicious payloads, and extract credentials from memory.
References
CVE-2025-32706 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability primary_impact T1608.001 Upload Malware
Comments
Attackers have exploited this heap-based buffer overflow vulnerability to escalate their privileges to SYSTEM-level, allowing them to execute arbitrary code, disable security tools, deploy malicious payloads, and extract credentials from memory.
References

Capabilities

Capability ID Capability Name Number of Mappings
CVE-2013-0641 Adobe Reader Buffer Overflow Vulnerability 3
CVE-2010-2883 Adobe Acrobat and Reader Stack-Based Buffer Overflow Vulnerability 3
CVE-2022-20708 Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability 2
CVE-2025-22457 Ivanti Connect Secure, Policy Secure, and ZTA Gateways Stack-Based Buffer Overflow Vulnerability 2
CVE-2023-5217 Google Chromium libvpx Heap Buffer Overflow Vulnerability 2
CVE-2022-42475 Fortinet FortiOS Heap-Based Buffer Overflow Vulnerability 4
CVE-2025-24993 Microsoft Windows NTFS Heap-Based Buffer Overflow Vulnerability 5
CVE-2022-20703 Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability 1
CVE-2023-4966 Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability 3
CVE-2025-32706 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability 5
CVE-2025-0282 Ivanti Connect Secure, Policy Secure, and ZTA Gateways Stack-Based Buffer Overflow Vulnerability 6
CVE-2023-27997 Fortinet FortiOS and FortiProxy SSL-VPN Heap-Based Buffer Overflow Vulnerability 3
CVE-2020-5735 Amcrest Cameras and NVR Stack-based Buffer Overflow Vulnerability 2
CVE-2007-5659 Adobe Acrobat and Reader Buffer Overflow Vulnerability 1
CVE-2021-21017 Adobe Acrobat and Reader Heap-based Buffer Overflow Vulnerability 1
CVE-2023-6549 Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability 2
CVE-2025-6543 Citrix NetScaler ADC and Gateway Buffer Overflow Vulnerability 3
CVE-2022-20700 Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability 2
CVE-2018-6789 Exim Buffer Overflow Vulnerability 2
CVE-2015-3113 Adobe Flash Player Heap-Based Buffer Overflow Vulnerability 4
CVE-2020-29557 D-Link DIR-825 R1 Devices Buffer Overflow Vulnerability 3
CVE-2022-20701 Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability 2
CVE-2023-7024 Google Chromium WebRTC Heap Buffer Overflow Vulnerability 2
CVE-2025-21418 Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability 3
CVE-2025-32756 Fortinet Multiple Products Stack-Based Buffer Overflow Vulnerability 7
CVE-2025-42599 Qualitia Active! Mail Stack-Based Buffer Overflow Vulnerability 4
CVE-2021-21148 Google Chromium V8 Heap Buffer Overflow Vulnerability 2
CVE-2021-22894 Ivanti Pulse Connect Secure Collaboration Suite Buffer Overflow Vulnerability 2
CVE-2022-20699 Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability 2
CVE-2025-21333 Microsoft Windows Hyper-V NT Kernel Integration VSP Heap-based Buffer Overflow Vulnerability 2