Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 22 Oct 2025 08:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 22 Oct 2025 05:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 22 Oct 2025 04:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 03 Jul 2025 03:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Smarsh
Smarsh telemessage |
|
| Weaknesses | CWE-552 | |
| CPEs | cpe:2.3:a:smarsh:telemessage:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Smarsh
Smarsh telemessage |
Wed, 02 Jul 2025 08:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
kev
|
Wed, 02 Jul 2025 03:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Thu, 29 May 2025 03:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 29 May 2025 02:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The TeleMessage service through 2025-05-05 is based on a JSP application in which the heap content is roughly equivalent to a "core dump" in which a password previously sent over HTTP would be included in this dump, as exploited in the wild in May 2025. | |
| Weaknesses | CWE-528 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-10-21T22:55:14.199Z
Reserved: 2025-05-28T00:00:00.000Z
Link: CVE-2025-48928
Updated: 2025-05-28T18:01:41.476Z
Status : Analyzed
Published: 2025-05-28T17:15:25.020
Modified: 2025-11-05T19:25:52.250
Link: CVE-2025-48928
No data.
OpenCVE Enrichment
No data.