NBMonitor 1.6.8 contains a denial of service vulnerability that allows attackers to crash the application by overflowing the registration code input field. Attackers can paste a 256-character buffer into the registration key field to trigger an application crash and potential system instability.
References
| Link | Resource |
|---|---|
| http://www.nsauditor.com | Product |
| https://www.exploit-db.com/exploits/49964 | Exploit Third Party Advisory |
| https://www.vulncheck.com/advisories/nbmonitor-denial-of-service-poc | Third Party Advisory |
Configurations
History
29 Jan 2026, 19:20
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://www.nsauditor.com - Product | |
| References | () https://www.exploit-db.com/exploits/49964 - Exploit, Third Party Advisory | |
| References | () https://www.vulncheck.com/advisories/nbmonitor-denial-of-service-poc - Third Party Advisory | |
| CPE | cpe:2.3:a:nsasoft:nbmonitor:1.6.8:*:*:*:*:*:*:* | |
| First Time |
Nsasoft
Nsasoft nbmonitor |
16 Jan 2026, 00:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-16 00:16
Updated : 2026-01-29 19:20
NVD link : CVE-2021-47814
Mitre link : CVE-2021-47814
CVE.ORG link : CVE-2021-47814
JSON object : View
Products Affected
nsasoft
- nbmonitor
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
