Medium severity6.2NVD Advisory· Published Apr 22, 2026· Updated Apr 27, 2026
CVE-2018-25266
CVE-2018-25266
Description
Angry IP Scanner 3.5.3 contains a buffer overflow vulnerability in the preferences dialog that allows local attackers to crash the application by supplying an excessively large string. Attackers can generate a file containing a massive buffer of repeated characters and paste it into the unavailable value field in the display preferences to trigger a denial of service.
Affected products
1- cpe:2.3:a:angryip:angry_ip_scanner:3.5.3:*:*:*:*:windows:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- www.exploit-db.com/exploits/45993nvdExploitVDB Entry
- www.vulncheck.com/advisories/angry-ip-scanner-denial-of-service-via-preferences-buffer-overflownvdThird Party Advisory
- angryip.orgnvdProduct
News mentions
0No linked articles in our index yet.