cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2020-17529,https://securityvulnerability.io/vulnerability/CVE-2020-17529,Apache NuttX (incubating) Out of Bound Write from invalid fragmentation offset value specified in the IP header,Out-of-bounds Write vulnerability in TCP Stack of Apache NuttX (incubating) versions up to and including 9.1.0 and 10.0.0 allows attacker to corrupt memory by supplying and invalid fragmentation offset value specified in the IP header. This is only impacts builds with both CONFIG_EXPERIMENTAL and CONFIG_NET_TCP_REASSEMBLY build flags enabled.,Apache,Apache Nuttx (incubating),9.8,CRITICAL,0.00343999988399446,false,,false,false,false,,,false,false,,2020-12-09T16:35:14.000Z,0 CVE-2020-17528,https://securityvulnerability.io/vulnerability/CVE-2020-17528,Apache NuttX (incubating) Out of Bound Write from invalid TCP Urgent length,Out-of-bounds Write vulnerability in TCP stack of Apache NuttX (incubating) versions up to and including 9.1.0 and 10.0.0 allows attacker to corrupt memory by supplying arbitrary urgent data pointer offsets within TCP packets including beyond the length of the packet.,Apache,Apache Nuttx (incubating),9.1,CRITICAL,0.002420000033453107,false,,false,false,false,,,false,false,,2020-12-09T16:35:13.000Z,0 CVE-2020-1939,https://securityvulnerability.io/vulnerability/CVE-2020-1939,,"The Apache NuttX (Incubating) project provides an optional separate ""apps"" repository which contains various optional components and example programs. One of these, ftpd, had a NULL pointer dereference bug. The NuttX RTOS itself is not affected. Users of the optional apps repository are affected only if they have enabled ftpd. Versions 6.15 to 8.2 are affected.",Apache,Apache Nuttx (incubating),9.8,CRITICAL,0.0023900000378489494,false,,false,false,false,,,false,false,,2020-05-12T14:57:55.000Z,0