CVE-2019-25665

River Past Ringtone Converter 2.7.6.1601 contains a local buffer overflow vulnerability that allows attackers to crash the application by supplying oversized input to activation fields. Attackers can paste 300 bytes of data into the Email textbox and Activation code textarea via the Help menu's Activate dialog to trigger a denial of service condition.
Configurations

Configuration 1 (hide)

cpe:2.3:a:river_past_ringtone_converter_project:river_past_ringtone_converter:*:*:*:*:*:*:*:*

History

27 Apr 2026, 13:34

Type Values Removed Values Added
CPE cpe:2.3:a:river_past_ringtone_converter_project:river_past_ringtone_converter:*:*:*:*:*:*:*:*
First Time River Past Ringtone Converter Project
River Past Ringtone Converter Project river Past Ringtone Converter
References () http://www.riverpast.com/ - () http://www.riverpast.com/ - Product
References () https://www.exploit-db.com/exploits/46312 - () https://www.exploit-db.com/exploits/46312 - Exploit, VDB Entry
References () https://www.vulncheck.com/advisories/river-past-ringtone-converter-buffer-overflow-dos - () https://www.vulncheck.com/advisories/river-past-ringtone-converter-buffer-overflow-dos - Third Party Advisory

05 Apr 2026, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-05 21:16

Updated : 2026-04-27 13:34


NVD link : CVE-2019-25665

Mitre link : CVE-2019-25665

CVE.ORG link : CVE-2019-25665


JSON object : View

Products Affected

river_past_ringtone_converter_project

  • river_past_ringtone_converter
CWE
CWE-787

Out-of-bounds Write