Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 27 Apr 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lizardsystems
Lizardsystems lanspy |
|
| CPEs | cpe:2.3:a:lizardsystems:lanspy:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Lizardsystems
Lizardsystems lanspy |
Wed, 22 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LanSpy 2.0.1.159 contains a local buffer overflow vulnerability in the scan section that allows local attackers to execute arbitrary code by exploiting structured exception handling mechanisms. Attackers can craft malicious payloads using egghunter techniques to locate and execute shellcode, triggering code execution through SEH chain manipulation and controlled jumps. | |
| Title | LanSpy 2.0.1.159 Local Buffer Overflow | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-14T02:06:34.487Z
Reserved: 2026-04-22T14:20:56.883Z
Link: CVE-2018-25265
Updated: 2026-04-22T15:39:33.756Z
Status : Analyzed
Published: 2026-04-22T16:16:46.907
Modified: 2026-04-27T17:28:49.850
Link: CVE-2018-25265
No data.
OpenCVE Enrichment
Updated: 2026-04-27T20:21:02Z