Description
VX Search 10.6.18 contains a local buffer overflow vulnerability that allows attackers to overwrite the instruction pointer by supplying an oversized string in the directory field. Attackers can craft a malicious input file containing 271 bytes of junk data followed by a return address to execute arbitrary code with application privileges.
Published: 2026-05-17
Score: 8.6 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a local buffer overflow (CWE-120) in VX Search 10.6.18. Attackers can submit an oversized string in the directory field, causing the instruction pointer to be overwritten with 271 bytes of junk data followed by a crafted return address. Successful exploitation allows execution of arbitrary code with the privileges of the running application, compromising system integrity. The description indicates that the flaw is triggered when the application processes a user‑supplied file, implying that the attack vector is local and requires the ability to provide such a file to the application.

Affected Systems

VX Search 10.6.18 is the affected product. The vendor is VX Search, and the product name reported by the CNA is VX Search. Only this exact version is listed as vulnerable; no newer releases are identified in the data.

Risk and Exploitability

The CVSS base score of 8.6 indicates a high severity vulnerability. EPSS information is not available. The existence of a documented exploit demonstrates that local exploitation is feasible by supplying a malicious file. The issue is not currently listed in the CISA KEV catalog. Exploitation requires the ability to supply data to the directory field, meaning an attacker must have local or untrusted user access. Once exploited, arbitrary code runs with application privileges, potentially leading to further system compromise. Runtime memory protection features such as stack canaries, ASLR, and DEP can reduce the impact of an exploit but do not eliminate the flaw.

Generated by OpenCVE AI on May 17, 2026 at 14:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to the latest patch of VX Search released by the vendor; consult the vendor’s website or security advisories for the official fix.
  • If a patch is not yet available, disable or restrict the directory field feature so that no oversized input can be processed, or enforce strict input size validation to prevent overflow.
  • Run the application with the least privileges required and enable runtime memory protection features such as stack canaries, ASLR, and DEP to mitigate the impact of any remaining exploitability.

Generated by OpenCVE AI on May 17, 2026 at 14:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 17 May 2026 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Vxsearch
Vxsearch vx Search
Vendors & Products Vxsearch
Vxsearch vx Search

Sun, 17 May 2026 12:30:00 +0000

Type Values Removed Values Added
Description VX Search 10.6.18 contains a local buffer overflow vulnerability that allows attackers to overwrite the instruction pointer by supplying an oversized string in the directory field. Attackers can craft a malicious input file containing 271 bytes of junk data followed by a return address to execute arbitrary code with application privileges.
Title VX Search 10.6.18 Local Buffer Overflow via Directory Field
First Time appeared Webberzone
Webberzone better Search
Weaknesses CWE-120
CPEs cpe:2.3:a:webberzone:better_search:10.6.18:*:*:*:*:*:*:*
Vendors & Products Webberzone
Webberzone better Search
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Vxsearch Vx Search
Webberzone Better Search
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-17T12:11:33.848Z

Reserved: 2026-05-17T11:42:36.674Z

Link: CVE-2018-25328

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-17T13:16:44.310

Modified: 2026-05-17T13:16:44.310

Link: CVE-2018-25328

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-17T14:30:03Z

Weaknesses