Encrypt PDF 2.3 contains a buffer overflow vulnerability that allows local attackers to crash the application by inputting excessively long strings into password fields. Attackers can paste a 1000-byte buffer into the User Password or Master Password field in the Settings dialog to trigger an application crash when importing PDF files.
History

Mon, 23 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 21 Mar 2026 13:00:00 +0000

Type Values Removed Values Added
Description Encrypt PDF 2.3 contains a buffer overflow vulnerability that allows local attackers to crash the application by inputting excessively long strings into password fields. Attackers can paste a 1000-byte buffer into the User Password or Master Password field in the Settings dialog to trigger an application crash when importing PDF files.
Title Encrypt PDF 2.3 Denial of Service via Buffer Overflow
First Time appeared Verypdf
Verypdf verypdf
Weaknesses CWE-787
CPEs cpe:2.3:a:verypdf:verypdf:2.3:*:*:*:*:*:*:*
Vendors & Products Verypdf
Verypdf verypdf
References
Metrics cvssV3_1

{'score': 6.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2026-03-21T12:46:53.540Z

Updated: 2026-03-23T16:38:49.709Z

Reserved: 2026-03-21T12:24:30.924Z

Link: CVE-2019-25550

cve-icon Vulnrichment

Updated: 2026-03-23T16:38:41.612Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-21T13:16:17.147

Modified: 2026-03-23T14:31:37.267

Link: CVE-2019-25550

cve-icon Redhat

No data.