<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2019-25631 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2019-25631/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 24 Mar 2026 12:16:03 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2019-25631/feed.xml" rel="self" type="application/rss+xml"/><item><title>AIDA64 Business SEH Buffer Overflow Vulnerability (CVE-2019-25631)</title><link>https://feed.craftedsignal.io/briefs/2026-03-aida64-seh-overflow/</link><pubDate>Tue, 24 Mar 2026 12:16:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-aida64-seh-overflow/</guid><description>AIDA64 Business 5.99.4900 is vulnerable to a local Structured Exception Handling (SEH) buffer overflow (CVE-2019-25631) allowing attackers to execute arbitrary code by overwriting SEH pointers with malicious shellcode.</description><content:encoded>&lt;p>AIDA64 Business version 5.99.4900 is vulnerable to a structured exception handling (SEH) buffer overflow (CVE-2019-25631). A local attacker can exploit this vulnerability to execute arbitrary code with application privileges. The vulnerability stems from insufficient bounds checking when processing the SMTP display name field in the preferences or report wizard functionality. An attacker can inject malicious shellcode, specifically egg hunter shellcode, into this field to overwrite SEH…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2019-25631</category><category>buffer-overflow</category><category>seh</category><category>aida64</category><category>windows</category></item></channel></rss>