Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 23 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Heidisql
Heidisql heidisql Portable |
|
| Vendors & Products |
Heidisql
Heidisql heidisql Portable |
Sun, 22 Mar 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | HeidiSQL Portable 10.1.0.5464 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string in the password field. Attackers can paste a buffer overflow payload into the password input during Microsoft SQL Server login to trigger an application crash. | |
| Title | HeidiSQL Portable 10.1.0.5464 Denial of Service via Buffer Overflow | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-23T16:02:51.559Z
Reserved: 2026-03-22T12:59:12.654Z
Link: CVE-2019-25598
Updated: 2026-03-23T16:01:48.214Z
Status : Deferred
Published: 2026-03-22T14:16:26.990
Modified: 2026-04-16T16:19:50.757
Link: CVE-2019-25598
No data.
OpenCVE Enrichment
Updated: 2026-03-25T14:46:18Z