Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 27 Apr 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
River Past Video Cleaner Project
River Past Video Cleaner Project river Past Video Cleaner |
|
| CPEs | cpe:2.3:a:river_past_video_cleaner_project:river_past_video_cleaner:*:*:*:*:*:*:*:* | |
| Vendors & Products |
River Past Video Cleaner Project
River Past Video Cleaner Project river Past Video Cleaner |
Tue, 07 Apr 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
River Past
River Past river Past Video Cleaner |
|
| Vendors & Products |
River Past
River Past river Past Video Cleaner |
Sun, 05 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | River Past Video Cleaner 7.6.3 contains a structured exception handler buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious string in the Lame_enc.dll field. Attackers can craft a payload with 280 bytes of padding, a next structured exception handler override, and shellcode to trigger code execution when the application processes the input. | |
| Title | River Past Video Cleaner 7.6.3 Buffer Overflow via SEH | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-06T18:11:34.811Z
Reserved: 2026-04-05T13:09:26.873Z
Link: CVE-2019-25670
Updated: 2026-04-06T18:11:30.468Z
Status : Analyzed
Published: 2026-04-05T21:16:44.610
Modified: 2026-04-27T13:35:22.033
Link: CVE-2019-25670
No data.
OpenCVE Enrichment
Updated: 2026-04-06T21:48:38Z