Angry IP Scanner for Linux 3.5.3 contains a denial of service vulnerability that allows local attackers to crash the application by supplying malformed input to the port selection field. Attackers can craft a malicious string containing buffer overflow patterns and paste it into the Preferences Ports tab to trigger an application crash.
References
| Link | Resource |
|---|---|
| https://angryip.org/ | Product |
| https://www.exploit-db.com/exploits/46038 | Exploit VDB Entry |
| https://www.vulncheck.com/advisories/angry-ip-scanner-for-linux-denial-of-service | Third Party Advisory |
Configurations
History
27 Apr 2026, 17:30
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Angryip
Angryip angry Ip Scanner |
|
| CPE | cpe:2.3:a:angryip:angry_ip_scanner:*:*:*:*:*:linux:*:* | |
| References | () https://angryip.org/ - Product | |
| References | () https://www.exploit-db.com/exploits/46038 - Exploit, VDB Entry | |
| References | () https://www.vulncheck.com/advisories/angry-ip-scanner-for-linux-denial-of-service - Third Party Advisory |
22 Apr 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-22 16:16
Updated : 2026-04-27 17:30
NVD link : CVE-2018-25262
Mitre link : CVE-2018-25262
CVE.ORG link : CVE-2018-25262
JSON object : View
Products Affected
angryip
- angry_ip_scanner
CWE
CWE-787
Out-of-bounds Write
