← Back to CVEs
CVE-2019-25591
MEDIUM6.2
Description
DNSS Domain Name Search Software 2.1.8 contains a buffer overflow vulnerability in the registration code input field that allows local attackers to crash the application by submitting an excessively long string. Attackers can trigger a denial of service by pasting a malicious registration code containing 300 repeated characters into the Name/Key field via the Register menu option.
CVE Details
CVSS v3.1 Score6.2
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published3/22/2026
Last Modified3/23/2026
Sourcenvd
Honeypot Sightings0
Weaknesses (CWE)
CWE-787
References
http://www.nsauditor.com/downloads/dnss_setup.exe(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/46831(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/dnss-domain-name-search-software-denial-of-service(disclosure@vulncheck.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.