Impact
SpotAuditor version 5.2.6 contains a flaw in its registration dialog that allows a locally active user to crash the application by entering a name string consisting of more than 300 repeated characters. The vulnerability is a buffer overflow type weakness (CWE-1287) that results in an unhandled exception, terminating the SpotAuditor process and making the software unavailable to legitimate users.
Affected Systems
The issue affects only SpotAuditor 5.2.6 distributed by NSAuditor. Users running that exact build are vulnerable; higher or lower versions are not known to be affected.
Risk and Exploitability
The CVSS base score of 6.9 classifies this problem as moderate severity. The need for local interaction limits the exposure, and no EPSS score or KEV listing is present, indicating that zero‑day exploitation or widespread attacks are unlikely. Nevertheless, any environment where untrusted users can launch SpotAuditor may face forced downtime.
OpenCVE Enrichment