No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 24 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Valentina-db
Valentina-db valentina Studio |
|
| Vendors & Products |
Valentina-db
Valentina-db valentina Studio |
Sat, 21 Mar 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Valentina Studio 9.0.5 Linux contains a buffer overflow vulnerability in the Host field of the connection dialog that allows local attackers to crash the application by supplying an oversized input string. Attackers can trigger the vulnerability by pasting a crafted buffer exceeding 264 bytes into the Host field during server connection attempts, causing a denial of service. | |
| Title | Valentina Studio 9.0.5 Linux Buffer Overflow via Host Field | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-24T14:17:40.410Z
Reserved: 2026-03-21T12:35:22.844Z
Link: CVE-2019-25567
Updated: 2026-03-24T14:17:34.628Z
Status : Awaiting Analysis
Published: 2026-03-21T13:16:20.277
Modified: 2026-03-23T14:31:37.267
Link: CVE-2019-25567
No data.
OpenCVE Enrichment
Updated: 2026-03-23T09:49:13Z