Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 08 Apr 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:heidisql:heidisql:*:*:*:*:*:*:*:* |
Wed, 01 Apr 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Heidisql
Heidisql heidisql |
|
| Vendors & Products |
Heidisql
Heidisql heidisql |
Mon, 30 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 30 Mar 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | HeidiSQL 9.5.0.5196 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long file path in the logging preferences. Attackers can input a buffer-overflow payload through the SQL log file path field in Preferences > Logging to trigger an application crash. | |
| Title | HeidiSQL 9.5.0.5196 Denial of Service via Preferences | |
| Weaknesses | CWE-98 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-30T14:51:48.071Z
Reserved: 2026-03-30T10:57:31.761Z
Link: CVE-2018-25231
Updated: 2026-03-30T12:50:06.837Z
Status : Analyzed
Published: 2026-03-30T12:16:16.860
Modified: 2026-04-08T17:27:35.193
Link: CVE-2018-25231
No data.
OpenCVE Enrichment
Updated: 2026-04-08T20:00:43Z