Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 19 Jan 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Splinterware
Splinterware idailydiary |
|
| Vendors & Products |
Splinterware
Splinterware idailydiary |
Fri, 16 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 16 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | iDailyDiary 4.30 contains a denial of service vulnerability that allows attackers to crash the application by overflowing the preferences tab name field. Attackers can paste a 2,000,000 character buffer into the default diary tab name to trigger an application crash. | |
| Title | iDailyDiary 4.30 - Denial of Service (PoC) | |
| Weaknesses | CWE-1284 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-01-16T21:26:31.093Z
Reserved: 2026-01-14T17:11:19.898Z
Link: CVE-2021-47824
Updated: 2026-01-16T21:26:21.745Z
Status : Deferred
Published: 2026-01-16T19:16:07.190
Modified: 2026-04-15T00:35:42.020
Link: CVE-2021-47824
No data.
OpenCVE Enrichment
Updated: 2026-01-19T09:20:10Z