Impact
ASPRunner Professional 6.0.766 contains a local buffer overflow vulnerability that allows an attacker to supply a project name of 180 or more characters, causing the application to crash and resulting in downtime for the web interface. This flaw arises from copying the input into a fixed-size buffer without bounds checking and is classified as CWE-787. It does not lead to code execution or data disclosure, but it disrupts service availability for users interacting with the application.
Affected Systems
The vulnerability only affects Xlinesoft ASPRunner Professional version 6.0.766. No other versions or products are listed as impacted in the advisory. Users running this specific build should be aware that the defect is tied to the project name input field during project creation.
Risk and Exploitability
The CVSS score of 6.9 indicates moderate severity. EPSS data is not available and the flaw is not listed in the CISA KEV catalog. Because the attack requires only local access to the application and the exploit consists simply of submitting a long project name, it is likely to be easy for an authenticated or local user to trigger. The result is an application crash and denial of service without privilege escalation or data compromise.
OpenCVE Enrichment