<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2019-25613 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2019-25613/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 24 Mar 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2019-25613/feed.xml" rel="self" type="application/rss+xml"/><item><title>Easy Chat Server 3.1 Denial of Service Vulnerability (CVE-2019-25613)</title><link>https://feed.craftedsignal.io/briefs/2026-03-easy-chat-dos/</link><pubDate>Tue, 24 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-easy-chat-dos/</guid><description>Easy Chat Server 3.1 is vulnerable to a denial-of-service attack where a remote attacker can crash the application by sending oversized data in the message parameter via a POST request to the body2.ghp endpoint after establishing a session, leading to service unavailability.</description><content:encoded><![CDATA[<p>Easy Chat Server 3.1 is susceptible to a denial-of-service (DoS) vulnerability identified as CVE-2019-25613. This vulnerability allows an unauthenticated remote attacker to crash the application by sending an excessively large message parameter. The attack involves first establishing a session with the server via the <code>chat.ghp</code> endpoint. The attacker then sends a specially crafted POST request to the <code>body2.ghp</code> endpoint, including a message parameter containing oversized data. Successful…</p>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>dos</category><category>cve-2019-25613</category><category>easy-chat-server</category></item></channel></rss>