CVE-2019-25661
Received Received - Intake
Local Buffer Overflow in Remote Process Explorer Causes DoS

Publication date: 2026-04-05

Last updated on: 2026-04-05

Assigner: VulnCheck

Description
Remote Process Explorer 1.0.0.16 contains a local buffer overflow vulnerability that allows attackers to cause a denial of service by sending a crafted payload to the Add Computer dialog. Attackers can paste a malicious string into the computer name textbox and trigger a crash by connecting to the added computer, overwriting the SEH chain and corrupting exception handlers.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-05
Last Modified
2026-04-05
Generated
2026-05-07
AI Q&A
2026-04-06
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
remote_process_explorer remote_process_explorer 1.0.0.16
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-787 The product writes data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

This vulnerability can cause a denial of service (DoS) condition on the affected system. By exploiting the buffer overflow, an attacker can crash the application, potentially disrupting normal operations and causing service interruptions.


Can you explain this vulnerability to me?

Remote Process Explorer version 1.0.0.16 has a local buffer overflow vulnerability. This occurs when an attacker sends a specially crafted payload to the Add Computer dialog, specifically by pasting a malicious string into the computer name textbox. When the attacker then connects to the added computer, this triggers a crash by overwriting the Structured Exception Handler (SEH) chain and corrupting exception handlers.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart