<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2018-25222 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2018-25222/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 28 Mar 2026 12:16:02 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2018-25222/feed.xml" rel="self" type="application/rss+xml"/><item><title>SC v7.16 Stack-Based Buffer Overflow Vulnerability (CVE-2018-25222)</title><link>https://feed.craftedsignal.io/briefs/2026-03-sc-buffer-overflow/</link><pubDate>Sat, 28 Mar 2026 12:16:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-sc-buffer-overflow/</guid><description>SC v7.16 is vulnerable to a stack-based buffer overflow, allowing local attackers to execute arbitrary code by providing oversized input exceeding 1052 bytes, leading to potential arbitrary code execution.</description><content:encoded>&lt;p>SC v7.16 is susceptible to a stack-based buffer overflow vulnerability, identified as CVE-2018-25222. This flaw enables local attackers to execute arbitrary code by crafting malicious input that exceeds buffer boundaries. Specifically, providing an input string longer than 1052 bytes can overwrite the instruction pointer, enabling the execution of attacker-controlled shellcode within the application&amp;rsquo;s context. This vulnerability poses a significant threat to systems running the affected version…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>buffer-overflow</category><category>code-execution</category><category>CVE-2018-25222</category></item></channel></rss>