← Voltar para CVEs
CVE-2018-25223
CRITICAL9.8
Descricao
Crashmail 1.6 contains a stack-based buffer overflow vulnerability that allows remote attackers to execute arbitrary code by sending malicious input to the application. Attackers can craft payloads with ROP chains to achieve code execution in the application context, with failed attempts potentially causing denial of service.
Detalhes CVE
Pontuacao CVSS v3.19.8
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado3/28/2026
Ultima modificacao4/2/2026
Fontenvd
Avistamentos honeypot0
Produtos afetados
ftnapps:crashmail_ii
Fraquezas (CWE)
CWE-787
Referencias
http://exploitpack.com(disclosure@vulncheck.com)
http://ftnapps.sourceforge.net/crashmail.html(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/44331(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/crashmail-stack-based-buffer-overflow-remote-code-execution(disclosure@vulncheck.com)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.