NVClient 5.0 contains a stack buffer overflow vulnerability in the user configuration contact field that allows attackers to crash the application. Attackers can overwrite 846 bytes of memory by pasting a crafted payload into the contact box, causing a denial of service condition.
Metrics
Affected Vendors & Products
References
History
Thu, 18 Dec 2025 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Eyemaxsystems
Eyemaxsystems nvclient |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:eyemaxsystems:nvclient:5.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Eyemaxsystems
Eyemaxsystems nvclient |
|
| Metrics |
cvssV3_1
|
Mon, 15 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 15 Dec 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | NVClient 5.0 contains a stack buffer overflow vulnerability in the user configuration contact field that allows attackers to crash the application. Attackers can overwrite 846 bytes of memory by pasting a crafted payload into the contact box, causing a denial of service condition. | |
| Title | NVClient 5.0 Stack Buffer Overflow Vulnerability via User Configuration | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-12-15T20:32:42.415Z
Updated: 2025-12-15T21:45:58.910Z
Reserved: 2025-12-13T14:25:04.999Z
Link: CVE-2023-53879
Updated: 2025-12-15T21:36:49.152Z
Status : Analyzed
Published: 2025-12-15T21:15:50.700
Modified: 2025-12-18T22:36:50.590
Link: CVE-2023-53879
No data.