{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/cve-2019-25631/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["high"],"_cs_tags":["cve-2019-25631","buffer-overflow","seh","aida64","windows"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eAIDA64 Business version 5.99.4900 is vulnerable to a structured exception handling (SEH) buffer overflow (CVE-2019-25631). A local attacker can exploit this vulnerability to execute arbitrary code with application privileges. The vulnerability stems from insufficient bounds checking when processing the SMTP display name field in the preferences or report wizard functionality. An attacker can inject malicious shellcode, specifically egg hunter shellcode, into this field to overwrite SEH…\u003c/p\u003e\n","date_modified":"2026-03-24T12:16:03Z","date_published":"2026-03-24T12:16:03Z","id":"/briefs/2026-03-aida64-seh-overflow/","summary":"AIDA64 Business 5.99.4900 is vulnerable to a local Structured Exception Handling (SEH) buffer overflow (CVE-2019-25631) allowing attackers to execute arbitrary code by overwriting SEH pointers with malicious shellcode.","title":"AIDA64 Business SEH Buffer Overflow Vulnerability (CVE-2019-25631)","url":"https://feed.craftedsignal.io/briefs/2026-03-aida64-seh-overflow/"}],"language":"en","title":"CraftedSignal Threat Feed — Cve-2019-25631","version":"https://jsonfeed.org/version/1.1"}