River Past Ringtone Converter 2.7.6.1601 contains a local buffer overflow vulnerability that allows attackers to crash the application by supplying oversized input to activation fields. Attackers can paste 300 bytes of data into the Email textbox and Activation code textarea via the Help menu's Activate dialog to trigger a denial of service condition.
References
| Link | Resource |
|---|---|
| http://www.riverpast.com/ | Product |
| https://www.exploit-db.com/exploits/46312 | Exploit VDB Entry |
| https://www.vulncheck.com/advisories/river-past-ringtone-converter-buffer-overflow-dos | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
27 Apr 2026, 13:34
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:river_past_ringtone_converter_project:river_past_ringtone_converter:*:*:*:*:*:*:*:* | |
| First Time |
River Past Ringtone Converter Project
River Past Ringtone Converter Project river Past Ringtone Converter |
|
| References | () http://www.riverpast.com/ - Product | |
| References | () https://www.exploit-db.com/exploits/46312 - Exploit, VDB Entry | |
| References | () https://www.vulncheck.com/advisories/river-past-ringtone-converter-buffer-overflow-dos - Third Party Advisory |
05 Apr 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-05 21:16
Updated : 2026-04-27 13:34
NVD link : CVE-2019-25665
Mitre link : CVE-2019-25665
CVE.ORG link : CVE-2019-25665
JSON object : View
Products Affected
river_past_ringtone_converter_project
- river_past_ringtone_converter
CWE
CWE-787
Out-of-bounds Write
