CVE tracker
303 subscribers
4.32K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2020-37129 - Memu Play 7.1.3 - Insecure Folder Permissions

CVE ID : CVE-2020-37129
Published : Feb. 5, 2026, 4:13 p.m. | 27 minutes ago
Description : Memu Play 7.1.3 contains an insecure folder permissions vulnerability that allows low-privileged users to modify the MemuService.exe executable. Attackers can replace the service executable with a malicious file during system restart to gain SYSTEM-level privileges by exploiting unrestricted file modification permissions.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2020-37130 - Nsauditor 3.2.0.0 - 'Name' Denial of Service

CVE ID : CVE-2020-37130
Published : Feb. 5, 2026, 4:13 p.m. | 27 minutes ago
Description : Nsauditor 3.2.0.0 contains a denial of service vulnerability in the registration name input field that allows attackers to crash the application. Attackers can create a malicious payload of 1000 bytes of repeated characters to trigger an application crash when pasted into the registration name field.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2020-37131 - Product Key Explorer 4.2.2.0 - 'Key' Denial of Service

CVE ID : CVE-2020-37131
Published : Feb. 5, 2026, 4:13 p.m. | 27 minutes ago
Description : Nsauditor Product Key Explorer 4.2.2.0 contains a denial of service vulnerability that allows local attackers to crash the application by inputting a specially crafted registration key. Attackers can generate a payload of 1000 bytes of repeated characters and paste it into the 'Key' input field to trigger the application crash.
Severity: 6.7 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2020-37132 - UltraVNC Launcher 1.2.4.0 - 'Password' Denial of Service

CVE ID : CVE-2020-37132
Published : Feb. 5, 2026, 4:13 p.m. | 27 minutes ago
Description : UltraVNC Launcher 1.2.4.0 contains a denial of service vulnerability in its password configuration properties that allows local attackers to crash the application. Attackers can paste an overly long 300-character string into the password field to trigger an application crash and prevent normal launcher functionality.
Severity: 6.7 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2020-37133 - UltraVNC Launcher 1.2.4.0 - 'RepeaterHost' Denial of Service

CVE ID : CVE-2020-37133
Published : Feb. 5, 2026, 4:13 p.m. | 27 minutes ago
Description : UltraVNC Launcher 1.2.4.0 contains a denial of service vulnerability in the Repeater Host configuration field that allows attackers to crash the application. Attackers can paste an overly long string of 300 characters into the Repeater Host property to trigger an application crash.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2020-37134 - UltraVNC Viewer 1.2.4.0 - 'VNCServer' Denial of Service

CVE ID : CVE-2020-37134
Published : Feb. 5, 2026, 4:13 p.m. | 27 minutes ago
Description : UltraVNC Viewer 1.2.4.0 contains a denial of service vulnerability that allows attackers to crash the application by manipulating VNC Server input. Attackers can generate a malformed 256-byte payload and paste it into the VNC Server connection dialog to trigger an application crash.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2020-37136 - ZOC Terminal v7.25.5 - 'Private key file' Denial of Service

CVE ID : CVE-2020-37136
Published : Feb. 5, 2026, 4:13 p.m. | 27 minutes ago
Description : ZOC Terminal 7.25.5 contains a denial of service vulnerability in the private key file input field that allows attackers to crash the application. Attackers can overwrite the private key file input with a 2000-byte buffer, causing the application to become unresponsive when attempting to create SSH key files.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2020-37137 - PHP-Fusion 9.03.50 - 'panels.php' Eval Injection

CVE ID : CVE-2020-37137
Published : Feb. 5, 2026, 4:13 p.m. | 27 minutes ago
Description : PHP-Fusion 9.03.50 contains a remote code execution vulnerability in the 'add_panel_form()' function that allows attackers to execute arbitrary code through an eval() function with unsanitized POST data. Attackers can exploit the vulnerability by sending crafted panel_content POST parameters to the panels.php administration endpoint to execute malicious code.
Severity: 8.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2020-37138 - 10-Strike Network Inventory Explorer 9.03 - 'Read from File' Buffer Overflow (SEH)(ROP)

CVE ID : CVE-2020-37138
Published : Feb. 5, 2026, 4:13 p.m. | 27 minutes ago
Description : 10-Strike Network Inventory Explorer 9.03 contains a buffer overflow vulnerability in the file import functionality that allows remote attackers to execute arbitrary code. Attackers can craft a malicious text file with carefully constructed payload to trigger a stack-based buffer overflow and bypass data execution prevention through a ROP chain.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2020-37139 - Odin Secure FTP Expert 7.6.3 - 'Site Info' Denial of Service

CVE ID : CVE-2020-37139
Published : Feb. 5, 2026, 4:13 p.m. | 27 minutes ago
Description : Odin Secure FTP Expert 7.6.3 contains a local denial of service vulnerability that allows attackers to crash the application by manipulating site information fields. Attackers can generate a buffer overflow by pasting 108 bytes of repeated characters into connection fields, causing the application to crash.
Severity: 8.4 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2020-37140 - Everest 5.50.2100 - 'Open File' Denial of Service

CVE ID : CVE-2020-37140
Published : Feb. 5, 2026, 4:13 p.m. | 27 minutes ago
Description : Everest, later referred to as AIDA64, 5.50.2100 contains a denial of service vulnerability that allows local attackers to crash the application by manipulating file open functionality. Attackers can generate a 450-byte buffer of repeated characters and paste it into the file open dialog to trigger an application crash.
Severity: 5.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2020-37142 - 10-Strike Network Inventory Explorer 8.54 - 'Add' Local Buffer Overflow (SEH)

CVE ID : CVE-2020-37142
Published : Feb. 5, 2026, 4:13 p.m. | 27 minutes ago
Description : 10-Strike Network Inventory Explorer 8.54 contains a structured exception handler buffer overflow vulnerability that allows attackers to execute arbitrary code by overwriting SEH records. Attackers can craft a malicious payload targeting the 'Computer' parameter during the 'Add' function to trigger remote code execution.
Severity: 8.4 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2020-37143 - ProficySCADA for iOS 5.0.25920 - 'Password' Denial of Service

CVE ID : CVE-2020-37143
Published : Feb. 5, 2026, 4:13 p.m. | 27 minutes ago
Description : ProficySCADA for iOS 5.0.25920 contains a denial of service vulnerability that allows attackers to crash the application by manipulating the password input field. Attackers can overwrite the password field with 257 bytes of repeated characters to trigger an application crash and prevent successful authentication.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2020-37144 - Exagate Sysguard 6001 - Cross-Site Request Forgery (Add Admin)

CVE ID : CVE-2020-37144
Published : Feb. 5, 2026, 4:13 p.m. | 27 minutes ago
Description : Exagate SYSGuard 6001 contains a cross-site request forgery vulnerability that allows attackers to create unauthorized admin accounts through a crafted HTML form. Attackers can trick users into submitting a malicious form to /kulyon.php that adds a new user with administrative privileges without the victim's consent.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2020-37145 - HRSALE 1.1.8 - Cross-Site Request Forgery (Add Admin)

CVE ID : CVE-2020-37145
Published : Feb. 5, 2026, 4:13 p.m. | 27 minutes ago
Description : HRSALE 1.1.8 contains a cross-site request forgery vulnerability that allows attackers to add unauthorized administrative users through the employee registration form. Attackers can craft a malicious HTML page with hidden form fields to trick authenticated administrators into creating new user accounts with elevated privileges.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2020-37149 - Edimax Technology EW-7438RPn-v3 Mini 1.27 - Cross-Site Request Forgery (CSRF) to Command Execution

CVE ID : CVE-2020-37149
Published : Feb. 5, 2026, 4:13 p.m. | 27 minutes ago
Description : Edimax EW-7438RPn-v3 Mini 1.27 is vulnerable to cross-site request forgery (CSRF) that can lead to command execution. An attacker can trick an authenticated user into submitting a crafted form to the /goform/mp endpoint, resulting in arbitrary command execution on the device with the user's privileges.
Severity: 8.1 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2020-37150 - Edimax Technology EW-7438RPn-v3 Mini 1.27 - Unauthorized Access: Wi-Fi Password Disclosure

CVE ID : CVE-2020-37150
Published : Feb. 5, 2026, 4:13 p.m. | 27 minutes ago
Description : Edimax EW-7438RPn-v3 Mini 1.27 allows unauthenticated attackers to access the /wizard_reboot.asp page in unsetup mode, which discloses the Wi-Fi SSID and security key. Attackers can retrieve the wireless password by sending a GET request to this endpoint, exposing sensitive information without authentication.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2020-37152 - PHP-Fusion 9.03.50 panels.php - Cross-Site Scripting (XSS)

CVE ID : CVE-2020-37152
Published : Feb. 5, 2026, 4:13 p.m. | 27 minutes ago
Description : PHP-Fusion 9.03.50 panels.php is vulnerable to cross-site scripting (XSS) via the 'panel_content' POST parameter. The application fails to properly sanitize user input before rendering it in the browser, allowing attackers to inject arbitrary JavaScript. This can be exploited by submitting crafted input to the 'panel_content' field in panels.php, resulting in execution of malicious scripts in the context of the affected site.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2020-37148 - P5 FNIP-8x16A/FNIP-4xSH 1.0.20, 1.0.11 - Stored Cross-Site Scripting (XSS)

CVE ID : CVE-2020-37148
Published : Feb. 5, 2026, 4:14 p.m. | 26 minutes ago
Description : P5 FNIP-8x16A/FNIP-4xSH versions 1.0.20 and 1.0.11 suffer from a stored cross-site scripting vulnerability. Input passed to several GET/POST parameters is not properly sanitized before being returned to the user, allowing attackers to execute arbitrary HTML and script code in a user's browser session in the context of the affected site. This can be exploited by submitting crafted input to the label modification functionality, such as the 'lab4' parameter in config.html.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2020-37151 - phpMyChat Plus 1.98 'deluser.php' SQL Injection

CVE ID : CVE-2020-37151
Published : Feb. 5, 2026, 4:15 p.m. | 25 minutes ago
Description : phpMyChat Plus 1.98 contains a SQL injection vulnerability in the deluser.php page through the pmc_username parameter that allows attackers to manipulate database queries. Attackers can exploit boolean-based, error-based, and time-based blind SQL injection techniques to extract sensitive database information by crafting malicious payloads in the username field.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-68721 - Axigen Mail Server SSL Certificate Access Control Bypass

CVE ID : CVE-2025-68721
Published : Feb. 5, 2026, 4:15 p.m. | 25 minutes ago
Description : Axigen Mail Server before 10.5.57 contains an improper access control vulnerability in the WebAdmin interface. A delegated admin account with zero permissions can bypass access control checks and gain unauthorized access to the SSL Certificates management endpoint (page=sslcerts). This allows the attacker to view, download, upload, and delete SSL certificate files, despite lacking the necessary privileges to access the Security & Filtering section.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...