Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 12 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Winmpg
Winmpg winmpg Ipod Convert |
|
| Vendors & Products |
Winmpg
Winmpg winmpg Ipod Convert |
Wed, 11 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Mar 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WinMPG iPod Convert 3.0 contains a buffer overflow vulnerability in the Register dialog that allows local attackers to crash the application by supplying an oversized payload. Attackers can paste a large string of characters into the User Name and User Code field to trigger a denial of service condition. | |
| Title | WinMPG iPod Convert 3.0 Register Field Buffer Overflow DoS | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-07T14:04:36.812Z
Reserved: 2026-02-23T13:57:15.136Z
Link: CVE-2019-25484
Updated: 2026-03-11T19:22:33.470Z
Status : Deferred
Published: 2026-03-11T19:16:02.560
Modified: 2026-04-15T14:56:45.970
Link: CVE-2019-25484
No data.
OpenCVE Enrichment
Updated: 2026-03-20T15:29:39Z