SpotPaltalk 1.1.5 contains a denial of service vulnerability in the registration code input field that allows local attackers to crash the application by submitting an excessively long string. Attackers can paste a buffer of 1000 characters into the Name/Key field during registration to trigger a crash when the OK button is clicked.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sat, 21 Mar 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SpotPaltalk 1.1.5 contains a denial of service vulnerability in the registration code input field that allows local attackers to crash the application by submitting an excessively long string. Attackers can paste a buffer of 1000 characters into the Name/Key field during registration to trigger a crash when the OK button is clicked. | |
| Title | SpotPaltalk 1.1.5 Name/Key Field Denial of Service | |
| Weaknesses | CWE-1260 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-21T12:47:00.586Z
Reserved: 2026-03-21T12:29:55.973Z
Link: CVE-2019-25559
No data.
Status : Received
Published: 2026-03-21T13:16:18.777
Modified: 2026-03-21T13:16:18.777
Link: CVE-2019-25559
No data.
OpenCVE Enrichment
No data.
Weaknesses