Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 31 Dec 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cobiansoft reflector
|
|
| CPEs | cpe:2.3:a:cobiansoft:reflector:0.9.93:rc1:*:*:*:*:*:* | |
| Vendors & Products |
Cobiansoft reflector
|
Tue, 23 Dec 2025 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cobiansoft
Cobiansoft cobian Reflector |
|
| Vendors & Products |
Cobiansoft
Cobiansoft cobian Reflector |
Mon, 22 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 22 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Cobian Reflector 0.9.93 RC1 contains a denial of service vulnerability that allows attackers to crash the application by overflowing the password input field. Attackers can paste a large 8000-byte buffer into the password field to trigger an application crash during SFTP task configuration. | |
| Title | Cobian Reflector 0.9.93 RC1 Local Denial of Service via Password Field | |
| Weaknesses | CWE-120 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-12-22T22:05:37.321Z
Reserved: 2025-12-21T19:48:13.435Z
Link: CVE-2022-50689
Updated: 2025-12-22T22:00:21.206Z
Status : Analyzed
Published: 2025-12-22T22:15:59.607
Modified: 2025-12-31T17:53:24.480
Link: CVE-2022-50689
No data.
OpenCVE Enrichment
Updated: 2025-12-23T22:40:09Z