Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 12 Feb 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Troglobit
Troglobit redir |
|
| Vendors & Products |
Troglobit
Troglobit redir |
Wed, 11 Feb 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Redir 3.3 contains a stack overflow vulnerability in the doproxyconnect() function that allows attackers to crash the application by sending oversized input. Attackers can exploit the sprintf() buffer without proper length checking to overwrite memory and cause a segmentation fault, resulting in program termination. | |
| Title | Redir 3.3 - Denial of Service | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-11T20:37:05.294Z
Reserved: 2026-02-10T18:34:08.319Z
Link: CVE-2020-37182
No data.
Status : Awaiting Analysis
Published: 2026-02-11T21:16:11.677
Modified: 2026-02-12T15:10:37.307
Link: CVE-2020-37182
No data.
OpenCVE Enrichment
Updated: 2026-02-12T10:01:00Z