CVE-2018-25266

Angry IP Scanner 3.5.3 contains a buffer overflow vulnerability in the preferences dialog that allows local attackers to crash the application by supplying an excessively large string. Attackers can generate a file containing a massive buffer of repeated characters and paste it into the unavailable value field in the display preferences to trigger a denial of service.
Configurations

Configuration 1 (hide)

cpe:2.3:a:angryip:angry_ip_scanner:3.5.3:*:*:*:*:windows:*:*

History

27 Apr 2026, 17:28

Type Values Removed Values Added
CPE cpe:2.3:a:angryip:angry_ip_scanner:3.5.3:*:*:*:*:windows:*:*
References () https://angryip.org - () https://angryip.org - Product
References () https://www.exploit-db.com/exploits/45993 - () https://www.exploit-db.com/exploits/45993 - Exploit, VDB Entry
References () https://www.vulncheck.com/advisories/angry-ip-scanner-denial-of-service-via-preferences-buffer-overflow - () https://www.vulncheck.com/advisories/angry-ip-scanner-denial-of-service-via-preferences-buffer-overflow - Third Party Advisory
First Time Angryip
Angryip angry Ip Scanner

22 Apr 2026, 16:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-22 16:16

Updated : 2026-04-27 17:28


NVD link : CVE-2018-25266

Mitre link : CVE-2018-25266

CVE.ORG link : CVE-2018-25266


JSON object : View

Products Affected

angryip

  • angry_ip_scanner
CWE
CWE-787

Out-of-bounds Write