CVE-2020-37221
Atomic Alarm Clock 6.3 Stack Overflow via SEH Unicode
CVSS Score
8.4
EPSS Score
0.0%
EPSS Percentile
0th
Atomic Alarm Clock 6.3 contains a stack overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious string to the display name textbox in the Time Zones Clock configuration. Attackers can craft a buffer with structured exception handling overwrite and encoded shellcode to bypass SafeSEH protections and execute arbitrary commands with application privileges.
| CWE | CWE-121 |
| Vendor | drive-software |
| Product | atomic alarm clock |
| Published | May 13, 2026 |
| Last Updated | May 13, 2026 |
Stay Ahead of the Next One
Get instant alerts for drive-software atomic alarm clock
Be the first to know when new high vulnerabilities affecting drive-software atomic alarm clock are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
Drive-software / Atomic Alarm Clock
6.3
References
Credits
Bobby Cooke