{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/cve-2018-25222/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["high"],"_cs_tags":["buffer-overflow","code-execution","CVE-2018-25222"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eSC v7.16 is susceptible to a stack-based buffer overflow vulnerability, identified as CVE-2018-25222. This flaw enables local attackers to execute arbitrary code by crafting malicious input that exceeds buffer boundaries. Specifically, providing an input string longer than 1052 bytes can overwrite the instruction pointer, enabling the execution of attacker-controlled shellcode within the application\u0026rsquo;s context. This vulnerability poses a significant threat to systems running the affected version…\u003c/p\u003e\n","date_modified":"2026-03-28T12:16:02Z","date_published":"2026-03-28T12:16:02Z","id":"/briefs/2026-03-sc-buffer-overflow/","summary":"SC v7.16 is vulnerable to a stack-based buffer overflow, allowing local attackers to execute arbitrary code by providing oversized input exceeding 1052 bytes, leading to potential arbitrary code execution.","title":"SC v7.16 Stack-Based Buffer Overflow Vulnerability (CVE-2018-25222)","url":"https://feed.craftedsignal.io/briefs/2026-03-sc-buffer-overflow/"}],"language":"en","title":"CraftedSignal Threat Feed — CVE-2018-25222","version":"https://jsonfeed.org/version/1.1"}