Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 12 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Top Password Software
Top Password Software rar Password Recovery |
|
| Vendors & Products |
Top Password Software
Top Password Software rar Password Recovery |
Wed, 11 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Mar 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | RAR Password Recovery 1.80 contains a buffer overflow vulnerability that allows local attackers to crash the application by supplying an oversized payload in the registration dialog. Attackers can craft a malicious input string exceeding 6000 bytes and paste it into the User Name and Registration Code field to trigger an application crash. | |
| Title | RAR Password Recovery 1.80 Denial of Service Buffer Overflow | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-07T14:04:32.972Z
Reserved: 2026-02-23T12:12:58.687Z
Link: CVE-2019-25477
Updated: 2026-03-11T19:22:43.067Z
Status : Deferred
Published: 2026-03-11T19:16:01.787
Modified: 2026-04-15T14:56:45.970
Link: CVE-2019-25477
No data.
OpenCVE Enrichment
Updated: 2026-03-20T15:29:43Z