Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 24 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Mar 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | FlexHEX 2.71 contains a local buffer overflow vulnerability in the Stream Name field that allows local attackers to execute arbitrary code by triggering a structured exception handler (SEH) overflow. Attackers can craft a malicious text file with carefully aligned shellcode and SEH chain pointers, paste the contents into the Stream Name dialog, and execute arbitrary commands like calc.exe when the exception handler is triggered. | |
| Title | FlexHEX 2.71 Local Buffer Overflow via SEH Unicode | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-24T13:15:20.448Z
Reserved: 2026-03-24T10:59:43.113Z
Link: CVE-2019-25627
Updated: 2026-03-24T13:15:16.254Z
Status : Awaiting Analysis
Published: 2026-03-24T12:16:02.560
Modified: 2026-03-24T15:53:48.067
Link: CVE-2019-25627
No data.
OpenCVE Enrichment
No data.