Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 29 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 29 Jan 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Verypdf
Verypdf docprint Pro |
|
| Vendors & Products |
Verypdf
Verypdf docprint Pro |
Wed, 28 Jan 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | docPrint Pro 8.0 contains a local buffer overflow vulnerability in the 'Add URL' input field that allows attackers to execute arbitrary code by overwriting memory. Attackers can craft a malicious payload that triggers a structured exception handler (SEH) overwrite to execute shellcode and gain remote system access. | |
| Title | docPrint Pro 8.0 - 'Add URL' Buffer Overflow (SEH Egghunter) | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-01-29T18:12:24.683Z
Reserved: 2026-01-27T15:47:07.998Z
Link: CVE-2020-36965
Updated: 2026-01-28T18:59:28.641Z
Status : Deferred
Published: 2026-01-28T18:16:46.807
Modified: 2026-04-15T00:35:42.020
Link: CVE-2020-36965
No data.
OpenCVE Enrichment
Updated: 2026-01-29T09:09:20Z