{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/cve-2019-25634/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["high"],"_cs_tags":["cve-2019-25634","buffer-overflow","seh-overwrite","code-execution"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eBase64 Decoder version 1.1.2 is susceptible to a stack-based buffer overflow vulnerability, identified as CVE-2019-25634. This flaw enables a local attacker to execute arbitrary code on a vulnerable system. The vulnerability arises from insufficient bounds checking when processing input, allowing an attacker to overwrite critical parts of the stack. Successful exploitation requires the attacker to craft a malicious input file specifically designed to trigger the overflow. The impact of this…\u003c/p\u003e\n","date_modified":"2026-03-24T12:16:04Z","date_published":"2026-03-24T12:16:04Z","id":"/briefs/2026-03-base64-decoder-overflow/","summary":"Base64 Decoder 1.1.2 is vulnerable to a stack-based buffer overflow (CVE-2019-25634) allowing local attackers to achieve arbitrary code execution via a crafted input file that triggers an SEH overwrite.","title":"Base64 Decoder 1.1.2 Stack-Based Buffer Overflow (CVE-2019-25634)","url":"https://feed.craftedsignal.io/briefs/2026-03-base64-decoder-overflow/"}],"language":"en","title":"CraftedSignal Threat Feed — Cve-2019-25634","version":"https://jsonfeed.org/version/1.1"}