Remote Desktop Audit 2.3.0.157 contains a buffer overflow vulnerability that allows attackers to execute arbitrary code during the Add Computers Wizard file import process. Attackers can craft a malicious payload file to trigger a structured exception handler (SEH) bypass and execute shellcode when importing computer lists.
Metrics
Affected Vendors & Products
References
History
Wed, 04 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lizardsystems
Lizardsystems remote Desktop Audit |
|
| Vendors & Products |
Lizardsystems
Lizardsystems remote Desktop Audit |
Tue, 03 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Remote Desktop Audit 2.3.0.157 contains a buffer overflow vulnerability that allows attackers to execute arbitrary code during the Add Computers Wizard file import process. Attackers can craft a malicious payload file to trigger a structured exception handler (SEH) bypass and execute shellcode when importing computer lists. | |
| Title | Remote Desktop Audit 2.3.0.157 - Buffer Overflow (SEH) | |
| Weaknesses | CWE-120 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-02-03T22:01:41.869Z
Updated: 2026-02-04T16:34:22.458Z
Reserved: 2026-02-01T13:16:06.485Z
Link: CVE-2020-37074
No data.
Status : Awaiting Analysis
Published: 2026-02-03T22:16:22.803
Modified: 2026-02-04T16:33:44.537
Link: CVE-2020-37074
No data.