NVClient 5.0 contains a stack buffer overflow vulnerability in the user configuration contact field that allows attackers to crash the application. Attackers can overwrite 846 bytes of memory by pasting a crafted payload into the contact box, causing a denial of service condition.
Metrics
Affected Vendors & Products
References
History
Mon, 15 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 15 Dec 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | NVClient 5.0 contains a stack buffer overflow vulnerability in the user configuration contact field that allows attackers to crash the application. Attackers can overwrite 846 bytes of memory by pasting a crafted payload into the contact box, causing a denial of service condition. | |
| Title | NVClient 5.0 Stack Buffer Overflow Vulnerability via User Configuration | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-12-15T20:32:42.415Z
Updated: 2025-12-15T21:45:58.910Z
Reserved: 2025-12-13T14:25:04.999Z
Link: CVE-2023-53879
Updated: 2025-12-15T21:36:49.152Z
Status : Received
Published: 2025-12-15T21:15:50.700
Modified: 2025-12-15T22:15:46.017
Link: CVE-2023-53879
No data.