Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sourceforge
Sourceforge snes9k 0.0.9z |
|
| Vendors & Products |
Sourceforge
Sourceforge snes9k 0.0.9z |
Mon, 06 Apr 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 04 Apr 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Snes9K 0.0.9z contains a buffer overflow vulnerability in the Netplay Socket Port Number field that allows local attackers to trigger a structured exception handler (SEH) overwrite. Attackers can craft a malicious payload and paste it into the Socket Port Number field via the Netplay Options menu to achieve code execution through SEH chain exploitation. | |
| Title | Snes9K 0.0.9z Buffer Overflow SEH via Netplay Socket | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-06T18:02:54.033Z
Reserved: 2026-04-04T13:27:41.226Z
Link: CVE-2018-25251
Updated: 2026-04-06T17:59:38.024Z
Status : Deferred
Published: 2026-04-04T14:16:21.203
Modified: 2026-04-16T16:15:56.380
Link: CVE-2018-25251
No data.
OpenCVE Enrichment
Updated: 2026-04-06T21:57:36Z