. The attack is possible to be carried out remotely. The attack is considered to have high complexity. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.
Metrics
Affected Vendors & Products
Mon, 08 Sep 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 08 Sep 2025 03:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability has been found in running-elephant Datart up to 1.0.0-rc3. Affected by this issue is the function getTokensecret of the file datart/security/src/main/java/datart/security/util/AESUtil.java of the component API. The manipulation leads to use of hard-coded cryptographic key . The attack is possible to be carried out remotely. The attack is considered to have high complexity. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. | |
Title | running-elephant Datart API AESUtil.java getTokensecret hard-coded key | |
Weaknesses | CWE-320 CWE-321 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-09-08T16:21:44.499Z
Reserved: 2025-09-07T14:58:28.193Z
Link: CVE-2025-10080

Updated: 2025-09-08T16:21:09.232Z

Status : Awaiting Analysis
Published: 2025-09-08T04:15:41.337
Modified: 2025-09-08T16:25:38.810
Link: CVE-2025-10080

No data.

No data.