Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 04 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 04 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cloudme
Cloudme cloudme |
|
| Vendors & Products |
Cloudme
Cloudme cloudme |
Tue, 03 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | CloudMe 1.11.2 contains a buffer overflow vulnerability that allows remote attackers to execute arbitrary code through crafted network packets. Attackers can exploit the vulnerability by sending a specially crafted payload to the CloudMe service running on port 8888, enabling remote code execution. | |
| Title | CloudMe 1.11.2 - Buffer Overflow (SEH,DEP,ASLR) | |
| Weaknesses | CWE-120 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-04T19:07:57.680Z
Reserved: 2026-02-01T13:16:06.484Z
Link: CVE-2020-37070
Updated: 2026-02-04T19:07:50.723Z
Status : Deferred
Published: 2026-02-03T22:16:22.137
Modified: 2026-04-15T00:35:42.020
Link: CVE-2020-37070
No data.
OpenCVE Enrichment
Updated: 2026-02-04T12:05:37Z