Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 04 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 04 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cloudme
Cloudme cloudme |
|
| Vendors & Products |
Cloudme
Cloudme cloudme |
Tue, 03 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | CloudMe 1.11.2 contains a buffer overflow vulnerability that allows remote attackers to execute arbitrary code through crafted network packets. Attackers can exploit the vulnerability by sending a specially crafted payload to the CloudMe service running on port 8888, enabling remote code execution. | |
| Title | CloudMe 1.11.2 - Buffer Overflow (SEH,DEP,ASLR) | |
| Weaknesses | CWE-120 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-04T19:07:57.680Z
Reserved: 2026-02-01T13:16:06.484Z
Link: CVE-2020-37070
Updated: 2026-02-04T19:07:50.723Z
Status : Awaiting Analysis
Published: 2026-02-03T22:16:22.137
Modified: 2026-02-04T16:33:44.537
Link: CVE-2020-37070
No data.
OpenCVE Enrichment
Updated: 2026-02-04T12:05:37Z