CRITICALVulnerability
Verified
Global

NVD CRITICAL: CVE-2018-25223 — Crashmail 1.6 contains a stack-based buffer overflow vulnerability that allows r...

Saturday, March 28, 2026 at 12:16 PM UTC·Source: NIST NVD

Updated: Thursday, April 2, 2026 at 05:46 PM UTC

Executive Summary

Crashmail 1.6 contains a stack-based buffer overflow vulnerability that allows remote attackers to execute arbitrary code by sending malicious input to the application. Attackers can craft payloads with ROP chains to achieve code execution in the application context, with failed attempts potentially causing denial of service.

Analysis

Crashmail 1.6 contains a stack-based buffer overflow vulnerability that allows remote attackers to execute arbitrary code by sending malicious input to the application. Attackers can craft payloads with ROP chains to achieve code execution in the application context, with failed attempts potentially causing denial of service. CVSS Score: 9.8. Published: 2026-03-28T12:16:03.170.

Indicators of Compromise (1)

CVE (1)
CVE-2018-25223
Source Attribution

Originally published by NIST NVD on Mar 28, 2026. Verified by: NIST.

Related Threats