🔐 CVE Alert

CVE-2019-25549

MEDIUM 6.2

VeryPDF PCL Converter 2.7 Denial of Service via PDF Security

CVSS Score
6.2
EPSS Score
0.0%
EPSS Percentile
1th

VeryPDF PCL Converter 2.7 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long password string. Attackers can trigger a buffer overflow by entering a 3000-byte password in the PDF Security encryption fields, causing the application to crash when processing PCL files.

CWE CWE-787
Vendor verypdf
Product verypdf pcl converter
Published Mar 21, 2026
Last Updated Mar 24, 2026
Stay Ahead of the Next One

Get instant alerts for verypdf verypdf pcl converter

Be the first to know when new medium vulnerabilities affecting verypdf verypdf pcl converter are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Affected Versions

Verypdf / VeryPDF PCL Converter
2.7

References

NVD ↗ CVE.org ↗ EPSS Data ↗
exploit-db.com: https://www.exploit-db.com/exploits/46872 verypdf.com: http://www.verypdf.com vulncheck.com: https://www.vulncheck.com/advisories/verypdf-pcl-converter-denial-of-service-via-pdf-security

Credits

Alejandra Sánchez