CVE-2019-25434
Received Received - Intake
Denial of Service in SpotAuditor 5.3.1.0 via Registration Name Overflow

Publication date: 2026-02-20

Last updated on: 2026-03-05

Assigner: VulnCheck

Description
SpotAuditor 5.3.1.0 contains a denial of service vulnerability that allows unauthenticated attackers to crash the application by submitting excessive data in the registration name field. Attackers can enter a large string of characters (5000 bytes or more) in the name field during registration to trigger an unhandled exception that crashes the application.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-20
Last Modified
2026-03-05
Generated
2026-05-07
AI Q&A
2026-02-21
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
nsasoft spotauditor to 5.3.1.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-121 A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

SpotAuditor version 5.3.1.0 has a denial of service vulnerability that allows unauthenticated attackers to crash the application.

This happens when an attacker submits an excessively large amount of data (5000 bytes or more) in the registration name field, which triggers an unhandled exception causing the application to crash.


How can this vulnerability impact me? :

The vulnerability can cause the SpotAuditor application to crash, resulting in a denial of service.

This means legitimate users may be unable to use the application while it is down, potentially disrupting business operations or services that rely on it.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart