Browse all 7 CVE security advisories affecting LizardSystems. AI-powered Chinese analysis, POCs, and references for each vulnerability.
LizardSystems develops network scanning and IP address management tools for IT infrastructure monitoring. Historically, their products have been vulnerable to remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from improper input validation and insecure authentication mechanisms. The company has addressed multiple CVEs, including critical issues allowing unauthorized system access and data exposure. While no major public security incidents have been documented, their consistent vulnerability pattern highlights the need for robust input handling and secure coding practices in network management software.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2018-25268 | LanSpy 2.0.1.159 Local Buffer Overflow via Scan Field — LanSpyCWE-787 | 8.4 | High | 2026-04-22 |
| CVE-2018-25265 | LanSpy 2.0.1.159 Local Buffer Overflow — LanSpyCWE-787 | 8.4 | High | 2026-04-22 |
| CVE-2018-25259 | Terminal Services Manager 3.1 Buffer Overflow SEH — Terminal Services ManagerCWE-306 | 8.4 | High | 2026-04-22 |
| CVE-2019-25661 | Remote Process Explorer 1.0.0.16 Local Buffer Overflow DoS — Remote Process ExplorerCWE-787 | 6.2 | Medium | 2026-04-05 |
| CVE-2019-25545 | Terminal Services Manager 3.2.1 Local Buffer Overflow Denial of Service — Terminal Services ManagerCWE-787 | 6.2 | Medium | 2026-03-21 |
| CVE-2020-37074 | Remote Desktop Audit 2.3.0.157 - Buffer Overflow (SEH) — Remote Desktop AuditCWE-120 | 9.8 | Critical | 2026-02-03 |
| CVE-2020-37075 | LanSend 3.2 - Buffer Overflow (SEH) — LanSendCWE-120 | 9.8 | Critical | 2026-02-03 |
This page lists every published CVE security advisory associated with LizardSystems. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.