Metrics
Affected Vendors & Products
Thu, 12 Feb 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Feb 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Troglobit
Troglobit redir |
|
| Vendors & Products |
Troglobit
Troglobit redir |
Wed, 11 Feb 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Redir 3.3 contains a stack overflow vulnerability in the doproxyconnect() function that allows attackers to crash the application by sending oversized input. Attackers can exploit the sprintf() buffer without proper length checking to overwrite memory and cause a segmentation fault, resulting in program termination. | |
| Title | Redir 3.3 - Denial of Service | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-12T18:44:35.469Z
Reserved: 2026-02-10T18:34:08.319Z
Link: CVE-2020-37182
Updated: 2026-02-12T18:44:31.094Z
Status : Awaiting Analysis
Published: 2026-02-11T21:16:11.677
Modified: 2026-02-12T15:10:37.307
Link: CVE-2020-37182
No data.