VeryPDF PCL Converter 2.7 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long password string. Attackers can trigger a buffer overflow by entering a 3000-byte password in the PDF Security encryption fields, causing the application to crash when processing PCL files.

Project Subscriptions

Vendors Products
Verypdf Subscribe
Verypdf Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sat, 21 Mar 2026 13:00:00 +0000

Type Values Removed Values Added
Description VeryPDF PCL Converter 2.7 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long password string. Attackers can trigger a buffer overflow by entering a 3000-byte password in the PDF Security encryption fields, causing the application to crash when processing PCL files.
Title VeryPDF PCL Converter 2.7 Denial of Service via PDF Security
First Time appeared Verypdf
Verypdf verypdf
Weaknesses CWE-787
CPEs cpe:2.3:a:verypdf:verypdf:2.7:*:*:*:*:*:*:*
Vendors & Products Verypdf
Verypdf verypdf
References
Metrics cvssV3_1

{'score': 6.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-21T12:46:52.307Z

Reserved: 2026-03-21T12:24:24.078Z

Link: CVE-2019-25549

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-21T13:16:16.980

Modified: 2026-03-21T13:16:16.980

Link: CVE-2019-25549

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses