Encrypt PDF 2.3 contains a buffer overflow vulnerability that allows local attackers to crash the application by inputting excessively long strings into password fields. Attackers can paste a 1000-byte buffer into the User Password or Master Password field in the Settings dialog to trigger an application crash when importing PDF files.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sat, 21 Mar 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Encrypt PDF 2.3 contains a buffer overflow vulnerability that allows local attackers to crash the application by inputting excessively long strings into password fields. Attackers can paste a 1000-byte buffer into the User Password or Master Password field in the Settings dialog to trigger an application crash when importing PDF files. | |
| Title | Encrypt PDF 2.3 Denial of Service via Buffer Overflow | |
| First Time appeared |
Verypdf
Verypdf verypdf |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:verypdf:verypdf:2.3:*:*:*:*:*:*:* | |
| Vendors & Products |
Verypdf
Verypdf verypdf |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-21T12:46:53.540Z
Reserved: 2026-03-21T12:24:30.924Z
Link: CVE-2019-25550
No data.
Status : Received
Published: 2026-03-21T13:16:17.147
Modified: 2026-03-21T13:16:17.147
Link: CVE-2019-25550
No data.
OpenCVE Enrichment
No data.
Weaknesses