Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 12 May 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV4_0
|
cvssV4_0
|
Thu, 18 Dec 2025 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Eyemaxsystems
Eyemaxsystems nvclient |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:eyemaxsystems:nvclient:5.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Eyemaxsystems
Eyemaxsystems nvclient |
|
| Metrics |
cvssV3_1
|
Mon, 15 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 15 Dec 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | NVClient 5.0 contains a stack buffer overflow vulnerability in the user configuration contact field that allows attackers to crash the application. Attackers can overwrite 846 bytes of memory by pasting a crafted payload into the contact box, causing a denial of service condition. | |
| Title | NVClient 5.0 Stack Buffer Overflow Vulnerability via User Configuration | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-12T20:46:30.493Z
Reserved: 2025-12-13T14:25:04.999Z
Link: CVE-2023-53879
Updated: 2025-12-15T21:36:49.152Z
Status : Analyzed
Published: 2025-12-15T21:15:50.700
Modified: 2025-12-18T22:36:50.590
Link: CVE-2023-53879
No data.
OpenCVE Enrichment
No data.