Tomabo MP4 Converter 3.25.22 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string in the Name field. Attackers can trigger a buffer overflow by pasting a large payload into the Name parameter when adding a preset in the Video/Audio Formats options, causing the application to crash when Reset All is clicked.
Metrics
Affected Vendors & Products
References
History
Sat, 21 Mar 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Tomabo MP4 Converter 3.25.22 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string in the Name field. Attackers can trigger a buffer overflow by pasting a large payload into the Name parameter when adding a preset in the Video/Audio Formats options, causing the application to crash when Reset All is clicked. | |
| Title | Tomabo MP4 Converter 3.25.22 Denial of Service via Name Field | |
| First Time appeared |
Ether Software
Ether Software easy Video To Mp4 Converter |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:ether_software:easy_video_to_mp4_converter:3.25.22:*:*:*:*:*:*:* | |
| Vendors & Products |
Ether Software
Ether Software easy Video To Mp4 Converter |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-21T12:46:56.539Z
Reserved: 2026-03-21T12:29:19.364Z
Link: CVE-2019-25554
No data.
Status : Received
Published: 2026-03-21T13:16:17.857
Modified: 2026-03-21T13:16:17.857
Link: CVE-2019-25554
No data.
OpenCVE Enrichment
No data.