CVE-2020-37121

CODE::BLOCKS 16.01 contains a buffer overflow vulnerability that allows attackers to execute arbitrary code by overwriting Structured Exception Handler with crafted Unicode characters. Attackers can create a malicious M3U playlist file with 536 bytes of buffer and shellcode to trigger remote code execution.
Configurations

No configuration.

History

15 Apr 2026, 00:35

Type Values Removed Values Added
Summary
  • (es) CODE::BLOCKS 16.01 contiene una vulnerabilidad de desbordamiento de búfer que permite a los atacantes ejecutar código arbitrario sobrescribiendo Structured Exception Handler con caracteres Unicode manipulados. Los atacantes pueden crear un archivo de lista de reproducción M3U malicioso con 536 bytes de búfer y shellcode para desencadenar la ejecución remota de código.

05 Feb 2026, 22:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 9.8
v2 : unknown
v3 : 5.5

05 Feb 2026, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-05 17:16

Updated : 2026-04-15 00:35


NVD link : CVE-2020-37121

Mitre link : CVE-2020-37121

CVE.ORG link : CVE-2020-37121


JSON object : View

Products Affected

No product.

CWE
CWE-121

Stack-based Buffer Overflow