Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
6.9
WinMPG iPod Convert 3.0 Crashes When Given Oversized Registration Input
CVE-2019-25484
Summary
The WinMPG iPod Convert 3.0 software can become unresponsive or crash if an attacker enters a very long string into the registration form. This can happen when an attacker copies and pastes a large amount of text into the User Name and User Code fields. To protect your system, it's recommended to update to a fixed version of the software or exercise caution when entering registration information.
Original title
WinMPG iPod Convert 3.0 contains a buffer overflow vulnerability in the Register dialog that allows local attackers to crash the application by supplying an oversized payload. Attackers can paste a...
Original description
WinMPG iPod Convert 3.0 contains a buffer overflow vulnerability in the Register dialog that allows local attackers to crash the application by supplying an oversized payload. Attackers can paste a large string of characters into the User Name and User Code field to trigger a denial of service condition.
nvd CVSS3.1
6.2
nvd CVSS4.0
6.9
Vulnerability type
CWE-787
Out-of-bounds Write
Published: 11 Mar 2026 · Updated: 13 Mar 2026 · First seen: 11 Mar 2026