Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 05 Mar 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Yahoo
Yahoo messenger |
|
| CPEs | cpe:2.3:a:yahoo:messenger:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Yahoo
Yahoo messenger |
Fri, 30 Jan 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:inbit:inbit_messenger:*:*:*:*:*:*:*:* |
Wed, 14 Jan 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 14 Jan 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Inbit
Inbit inbit Messenger |
|
| Vendors & Products |
Inbit
Inbit inbit Messenger |
Tue, 13 Jan 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Inbit Messenger versions 4.6.0 to 4.9.0 contain a remote stack-based buffer overflow vulnerability that allows unauthenticated attackers to execute arbitrary code by sending malformed network packets. Attackers can craft a specially designed payload targeting the messenger's network handler to overwrite the Structured Exception Handler (SEH) and execute shellcode on vulnerable Windows systems. | |
| Title | Inbit Messenger 4.9.0 - Unauthenticated Remote SEH Overflow | |
| Weaknesses | CWE-121 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-05T01:29:41.232Z
Reserved: 2026-01-10T01:51:52.983Z
Link: CVE-2023-54330
Updated: 2026-01-14T15:47:14.644Z
Status : Analyzed
Published: 2026-01-13T23:16:00.163
Modified: 2026-01-30T15:48:11.273
Link: CVE-2023-54330
No data.
OpenCVE Enrichment
Updated: 2026-01-14T10:49:01Z