Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 24 Feb 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nwpsw
Nwpsw ippulse |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:nwpsw:ippulse:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Nwpsw
Nwpsw ippulse |
Thu, 19 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Feb 2026 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Northwest Performance Software
Northwest Performance Software ippulse |
|
| Vendors & Products |
Northwest Performance Software
Northwest Performance Software ippulse |
Wed, 18 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ipPulse 1.92 contains a denial of service vulnerability that allows local attackers to crash the application by providing an oversized input in the Enter Key field. Attackers can generate a 256-byte buffer of repeated 'A' characters to trigger an application crash when pasting the malicious content. | |
| Title | ipPulse 1.92 - 'Enter Key' Denial of Service | |
| Weaknesses | CWE-120 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-19T15:06:37.732Z
Reserved: 2026-02-12T14:37:45.920Z
Link: CVE-2019-25326
Updated: 2026-02-19T15:06:33.500Z
Status : Analyzed
Published: 2026-02-18T22:16:18.980
Modified: 2026-02-24T20:38:18.883
Link: CVE-2019-25326
No data.
OpenCVE Enrichment
Updated: 2026-02-19T10:10:54Z