Description
GSearch 1.0.1.0 contains a denial of service vulnerability that allows local attackers to crash the application by inputting an excessively long string in the search bar. Attackers can paste a buffer of 2000 characters into the search field, click search, and select any result to trigger an application crash.
Published: 2026-03-22
Score: 6.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

GSearch 1.0.1.0 contains a denial of service vulnerability that allows local attackers to crash the application by inputting an excessively long string in the search bar. Attackers can paste a buffer of 2000 characters, click search, and select any result to trigger a crash. The vulnerability does not lead to data disclosure or modification; it purely causes the application to terminate.

Affected Systems

Affected product is GSearch version 1.0.1.0. No other versions or vendors are indicated to be vulnerable, and the CNA vendor list lists only GSearch. Only local users with access to the application can trigger the issue.

Risk and Exploitability

The CVSS score is 6.8, indicating moderate severity. Exploitation requires local access and does not involve remote code execution or privilege escalation. EPSS score is not available, and the vulnerability is not in KEV. Attackers can trigger the crash by using the search field, but no confidentiality, integrity, or remote execution impact is present. Immediate patching is recommended due to moderate score and ease of exploitation.

Generated by OpenCVE AI on March 22, 2026 at 15:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest available patch for GSearch.
  • If no patch exists, limit the length of the search input or disable the search feature to prevent crashes.
  • Restart the application after implementing any mitigation measures.

Generated by OpenCVE AI on March 22, 2026 at 15:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Gsearch
Gsearch gsearch
Vendors & Products Gsearch
Gsearch gsearch

Sun, 22 Mar 2026 13:45:00 +0000

Type Values Removed Values Added
Description GSearch 1.0.1.0 contains a denial of service vulnerability that allows local attackers to crash the application by inputting an excessively long string in the search bar. Attackers can paste a buffer of 2000 characters into the search field, click search, and select any result to trigger an application crash.
Title GSearch 1.0.1.0 Denial of Service via Search Input
Weaknesses CWE-1260
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}

cvssV4_0

{'score': 6.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-23T15:30:56.790Z

Reserved: 2026-03-22T13:02:13.208Z

Link: CVE-2019-25602

cve-icon Vulnrichment

Updated: 2026-03-23T15:30:52.536Z

cve-icon NVD

Status : Deferred

Published: 2026-03-22T14:16:27.710

Modified: 2026-04-16T16:19:50.757

Link: CVE-2019-25602

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:46:14Z

Weaknesses