Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
8.6
Verypdf docPrint Pro 8.0 allows local attackers to run malicious code
CVE-2019-25467
Summary
A security flaw in Verypdf docPrint Pro 8.0 allows an attacker with access to the computer to execute unauthorized code by entering a very long password. This could potentially allow the attacker to take control of the computer. Update to the latest version of Verypdf docPrint Pro to fix this issue.
Original title
Verypdf docPrint Pro 8.0 contains a structured exception handling buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an oversized alphanumeric encoded ...
Original description
Verypdf docPrint Pro 8.0 contains a structured exception handling buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an oversized alphanumeric encoded payload in the User Password or Master Password fields. Attackers can craft a malicious payload with encoded shellcode and SEH chain manipulation to bypass protections and execute a MessageBox proof-of-concept when the password fields are processed during PDF encryption.
nvd CVSS3.1
8.4
nvd CVSS4.0
8.6
Vulnerability type
CWE-787
Out-of-bounds Write
Published: 11 Mar 2026 · Updated: 13 Mar 2026 · First seen: 11 Mar 2026