Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 13 Apr 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Faleemi
Faleemi faleemi Desktop Software |
|
| Vendors & Products |
Faleemi
Faleemi faleemi Desktop Software |
Mon, 13 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 12 Apr 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Faleemi Desktop Software 1.8 contains a local buffer overflow vulnerability in the System Setup dialog that allows attackers to bypass DEP protections through structured exception handling exploitation. Attackers can inject a crafted payload into the Save Path for Snapshot and Record file field to trigger a buffer overflow and execute arbitrary code via ROP chain gadgets. | |
| Title | Faleemi Desktop Software 1.8 Local Buffer Overflow SEH DEP Bypass | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-13T12:11:35.418Z
Reserved: 2026-04-05T15:32:50.569Z
Link: CVE-2019-25691
Updated: 2026-04-13T12:11:25.806Z
Status : Deferred
Published: 2026-04-12T13:16:32.103
Modified: 2026-04-15T15:00:32.790
Link: CVE-2019-25691
No data.
OpenCVE Enrichment
Updated: 2026-04-13T12:56:00Z