CVE-2019-25554
Tomabo MP4 Converter 3.25.22 Denial of Service via Name Field
CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th
Tomabo MP4 Converter 3.25.22 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string in the Name field. Attackers can trigger a buffer overflow by pasting a large payload into the Name parameter when adding a preset in the Video/Audio Formats options, causing the application to crash when Reset All is clicked.
| CWE | CWE-787 |
| Vendor | tomabo |
| Product | mp4 converter |
| Published | Mar 21, 2026 |
| Last Updated | Mar 23, 2026 |
Stay Ahead of the Next One
Get instant alerts for tomabo mp4 converter
Be the first to know when new medium vulnerabilities affecting tomabo mp4 converter are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Affected Versions
Tomabo / MP4 Converter
3.25.22
References
Credits
Alejandra Sánchez