{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-28412","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-02-27T15:33:57.289Z","datePublished":"2026-03-02T15:46:56.128Z","dateUpdated":"2026-03-02T19:22:31.210Z"},"containers":{"cna":{"title":"Textream Vulnerable to Uncontrolled Resource Consumption (Denial of Service)","problemTypes":[{"descriptions":[{"cweId":"CWE-400","lang":"en","description":"CWE-400: Uncontrolled Resource Consumption","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","version":"3.1"}}],"references":[{"name":"https://github.com/f/textream/security/advisories/GHSA-qr5p-7x47-qxh9","tags":["x_refsource_CONFIRM"],"url":"https://github.com/f/textream/security/advisories/GHSA-qr5p-7x47-qxh9"},{"name":"https://github.com/f/textream/commit/3524fa96f98ba17025b48ce9e19d49d859fc2ec1","tags":["x_refsource_MISC"],"url":"https://github.com/f/textream/commit/3524fa96f98ba17025b48ce9e19d49d859fc2ec1"}],"affected":[{"vendor":"f","product":"textream","versions":[{"version":"< 1.5.1","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-03-02T15:46:56.128Z"},"descriptions":[{"lang":"en","value":"Textream is a free macOS teleprompter app. Prior to version 1.5.1, the `DirectorServer` WebSocket server imposes no limit on concurrent connections. Combined with a broadcast timer that sends state to all connected clients every 100 ms, an attacker can exhaust CPU and memory by flooding the server with connections, causing the Textream application to freeze and crash during a live session. Version 1.5.1 fixes the issue."}],"source":{"advisory":"GHSA-qr5p-7x47-qxh9","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-02T19:21:57.486841Z","id":"CVE-2026-28412","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-02T19:22:31.210Z"}}]}}