<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2019-25637 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2019-25637/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 24 Mar 2026 12:16:04 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2019-25637/feed.xml" rel="self" type="application/rss+xml"/><item><title>X-NetStat Pro 5.63 Local Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-xnetstat-pro-overflow/</link><pubDate>Tue, 24 Mar 2026 12:16:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-xnetstat-pro-overflow/</guid><description>X-NetStat Pro 5.63 contains a local buffer overflow vulnerability (CVE-2019-25637) allowing local attackers to execute arbitrary code by overwriting the EIP register.</description><content:encoded>&lt;p>X-NetStat Pro version 5.63 is susceptible to a local buffer overflow vulnerability, identified as CVE-2019-25637. This flaw enables a local attacker to execute arbitrary code on a targeted system. The vulnerability stems from a 264-byte buffer overflow that allows overwriting the EIP register. Successful exploitation allows attackers to inject shellcode into memory, leveraging an egg hunter technique to pinpoint and trigger the malicious payload. The vulnerable functionality resides within the…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>buffer-overflow</category><category>code-execution</category><category>windows</category><category>cve-2019-25637</category></item></channel></rss>