{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2019-25633","assignerOrgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","state":"PUBLISHED","assignerShortName":"VulnCheck","dateReserved":"2026-03-24T11:02:35.099Z","datePublished":"2026-03-24T11:27:07.254Z","dateUpdated":"2026-03-24T13:08:55.859Z"},"containers":{"cna":{"providerMetadata":{"orgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","shortName":"VulnCheck","dateUpdated":"2026-03-24T11:27:07.254Z"},"title":"AIDA64 Extreme 5.99.4900 SEH Buffer Overflow via EggHunter","descriptions":[{"lang":"en","value":"AIDA64 Extreme 5.99.4900 contains a structured exception handling buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying malicious input through the email preferences and report wizard interfaces. Attackers can inject crafted payloads into the Display name field and Load from file parameter to trigger the overflow and execute shellcode with application privileges."}],"problemTypes":[{"descriptions":[{"lang":"en","description":"Out-of-bounds Write","cweId":"CWE-787","type":"CWE"}]}],"affected":[{"vendor":"Aida64","product":"AIDA64 Extreme","versions":[{"version":"5.99.4900                                                                               #","status":"affected"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"LOCAL","baseScore":8.6,"baseSeverity":"HIGH","exploitMaturity":"NOT_DEFINED","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS"},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":8.4,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS"}],"references":[{"url":"https://www.exploit-db.com/exploits/46636","name":"ExploitDB-46636","tags":["exploit"]},{"url":"https://www.aida64.com","name":"Official Product Homepage","tags":["product"]},{"url":"http://download.aida64.com/aida64extreme599.exe","name":"Product Reference","tags":["product"]},{"name":"VulnCheck Advisory: AIDA64 Extreme 5.99.4900 SEH Buffer Overflow via EggHunter","tags":["third-party-advisory"],"url":"https://www.vulncheck.com/advisories/aida64-extreme-seh-buffer-overflow-via-egghunter"}],"credits":[{"lang":"en","value":"Peyman Forouzan                                                                         #","type":"finder"}],"x_generator":{"engine":"vulncheck"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-24T13:08:36.883538Z","id":"CVE-2019-25633","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-24T13:08:55.859Z"}}]}}