Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 21 Oct 2025 23:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 21 Oct 2025 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 21 Oct 2025 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 02 Jul 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Smarsh
Smarsh telemessage |
|
Weaknesses | CWE-552 | |
CPEs | cpe:2.3:a:smarsh:telemessage:-:*:*:*:*:*:*:* | |
Vendors & Products |
Smarsh
Smarsh telemessage |
Tue, 01 Jul 2025 23:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
kev
|
Tue, 01 Jul 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
ssvc
|
Wed, 28 May 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 28 May 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The TeleMessage service through 2025-05-05 is based on a JSP application in which the heap content is roughly equivalent to a "core dump" in which a password previously sent over HTTP would be included in this dump, as exploited in the wild in May 2025. | |
Weaknesses | CWE-528 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-10-21T22:55:14.199Z
Reserved: 2025-05-28T00:00:00.000Z
Link: CVE-2025-48928

Updated: 2025-05-28T18:01:41.476Z

Status : Modified
Published: 2025-05-28T17:15:25.020
Modified: 2025-10-21T23:17:05.100
Link: CVE-2025-48928

No data.

No data.