CVE-2020-36965
Buffer Overflow in docPrint Pro 8.0 Enables Remote Code Execution
Publication date: 2026-01-28
Last updated on: 2026-01-28
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| docprint | docprint_pro | 8.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-121 | A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a local buffer overflow in docPrint Pro 8.0's 'Add URL' input field. It allows attackers to execute arbitrary code by overwriting memory. Specifically, attackers can craft a malicious payload that triggers a structured exception handler (SEH) overwrite, enabling them to execute shellcode and gain remote system access.
How can this vulnerability impact me? :
The vulnerability can allow attackers to execute arbitrary code on the affected system, potentially leading to remote system access. This means attackers could take control of the system, compromise data, install malware, or disrupt operations.