Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 12 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Top Password Software
Top Password Software outlook Password Recovery |
|
| Vendors & Products |
Top Password Software
Top Password Software outlook Password Recovery |
Wed, 11 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Mar 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Outlook Password Recovery 2.10 contains a buffer overflow vulnerability that allows local attackers to crash the application by supplying an oversized payload. Attackers can create a malicious text file containing 6000 bytes of data and paste it into the User Name and Registration Code field to trigger a denial of service condition. | |
| Title | Outlook Password Recovery 2.10 Denial of Service Buffer Overflow | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-07T14:04:32.269Z
Reserved: 2026-02-23T12:12:48.111Z
Link: CVE-2019-25476
Updated: 2026-03-11T19:22:46.635Z
Status : Deferred
Published: 2026-03-11T19:16:01.603
Modified: 2026-04-15T14:56:45.970
Link: CVE-2019-25476
No data.
OpenCVE Enrichment
Updated: 2026-03-20T15:29:44Z