Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
4.6

ipPulse 1.92 Can Crash with Oversized Input

CVE-2019-25326
Summary

A flaw in ipPulse 1.92 allows a local attacker to crash the application by entering more data than it can handle in the Enter Key field. This could cause the application to stop working, but it does not allow the attacker to access or steal sensitive information. To fix this, update to a newer version of ipPulse that has this problem fixed.

What to do

No fix is available yet. Check with your software vendor for updates.

Affected software
VendorProductAffected versionsFix available
nwpsw ippulse <= 1.92 –
Original title
ipPulse 1.92 contains a denial of service vulnerability that allows local attackers to crash the application by providing an oversized input in the Enter Key field. Attackers can generate a 256-byt...
Original description
ipPulse 1.92 contains a denial of service vulnerability that allows local attackers to crash the application by providing an oversized input in the Enter Key field. Attackers can generate a 256-byte buffer of repeated 'A' characters to trigger an application crash when pasting the malicious content.
nvd CVSS3.1 5.5
nvd CVSS4.0 4.6
Vulnerability type
CWE-120 Classic Buffer Overflow
Published: 18 Feb 2026 · Updated: 11 Mar 2026 · First seen: 6 Mar 2026