🔐 CVE Alert

CVE-2010-20112

UNKNOWN 0.0

Amlibweb NetOpacs webquery.dll Stack Buffer Overflow

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Amlib’s NetOpacs webquery.dll contains a stack-based buffer overflow vulnerability triggered by improper handling of HTTP GET parameters. Specifically, the application fails to enforce bounds on input supplied to the app parameter, allowing excessive data to overwrite memory structures including the Structured Exception Handler (SEH). Additionally, malformed parameter names followed by an equals sign may result in unintended control flow behavior. This vulnerability is exposed through IIS and affects legacy Windows deployments

CWE CWE-121
Vendor amlib
Product amlibweb library management system
Published Aug 21, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for amlib amlibweb library management system

Be the first to know when new unknown vulnerabilities affecting amlib amlibweb library management system are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

Amlib / Amlibweb Library Management System
*

References

NVD ↗ CVE.org ↗ EPSS Data ↗
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/amlibweb_webquerydll_app.rb exploit-db.com: https://www.exploit-db.com/exploits/16793 fortiguard.com: https://www.fortiguard.com/encyclopedia/ips/24002 advisories.checkpoint.com: https://advisories.checkpoint.com/defense/advisories/public/2013/cpai-2013-1344.html amlib.co.uk: https://www.amlib.co.uk/product/product.aspx?menuId=top_products vulncheck.com: https://www.vulncheck.com/advisories/amlibweb-netopacs-stack-buffer-overflow

Credits

aushack