Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 27 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Maxprog
Maxprog icash |
|
| Vendors & Products |
Maxprog
Maxprog icash |
Mon, 27 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 26 Apr 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | iCash 7.6.5 contains a buffer overflow vulnerability that allows local attackers to crash the application by supplying an oversized payload through the Connect to Server dialog. Attackers can paste a 7000-byte string into the Host field and click Connect to trigger an application crash. | |
| Title | iCash 7.6.5 Denial of Service via Connect to Server | |
| Weaknesses | CWE-120 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-27T13:09:10.490Z
Reserved: 2026-04-26T13:01:51.790Z
Link: CVE-2018-25281
Updated: 2026-04-27T13:09:06.856Z
Status : Deferred
Published: 2026-04-26T22:17:28.843
Modified: 2026-04-27T18:55:32.883
Link: CVE-2018-25281
No data.
OpenCVE Enrichment
Updated: 2026-04-28T05:15:22Z