Home

Description

XnConvert 1.82 contains a denial of service vulnerability in its registration code input field that allows attackers to crash the application. Attackers can generate a 9000-byte buffer of repeated characters and paste it into the registration code field to trigger an application crash.

PUBLISHED Reserved 2026-02-12 | Published 2026-02-12 | Updated 2026-02-13 | Assigner VulnCheck




MEDIUM: 6.7CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

Stack-based Buffer Overflow

Product status

1.82
affected

Credits

Gokkulraj (TwinTech Solutions) finder

References

www.exploit-db.com/exploits/47801 (ExploitDB-47801) exploit

www.xnview.com (Vendor Homepage) product

www.xnview.com/en/apps/ (Official Product Page) product

www.vulncheck.com/advisories/xnconvert-denial-of-service (VulnCheck Advisory: XnConvert 1.82 - Denial of Service) third-party-advisory

cve.org (CVE-2019-25328)

nvd.nist.gov (CVE-2019-25328)

Download JSON