Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lizardsystems
Lizardsystems remote Process Explorer |
|
| Vendors & Products |
Lizardsystems
Lizardsystems remote Process Explorer |
Mon, 06 Apr 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 05 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Remote Process Explorer 1.0.0.16 contains a local buffer overflow vulnerability that allows attackers to cause a denial of service by sending a crafted payload to the Add Computer dialog. Attackers can paste a malicious string into the computer name textbox and trigger a crash by connecting to the added computer, overwriting the SEH chain and corrupting exception handlers. | |
| Title | Remote Process Explorer 1.0.0.16 Local Buffer Overflow DoS | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-06T16:12:30.667Z
Reserved: 2026-04-05T12:47:04.305Z
Link: CVE-2019-25661
Updated: 2026-04-06T16:12:16.553Z
Status : Deferred
Published: 2026-04-05T21:16:43.050
Modified: 2026-04-16T16:15:56.380
Link: CVE-2019-25661
No data.
OpenCVE Enrichment
Updated: 2026-04-06T21:56:16Z