Логотип exploitDog
bind: "CVE-2025-6203"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2025-6203"

Количество 5

Количество 5

redhat логотип

CVE-2025-6203

3 месяца назад

A malicious user may submit a specially-crafted complex payload that otherwise meets the default request size limit which results in excessive memory and CPU consumption of Vault. This may lead to a timeout in Vault’s auditing subroutine, potentially resulting in the Vault server to become unresponsive. This vulnerability, CVE-2025-6203, is fixed in Vault Community Edition 1.20.3 and Vault Enterprise 1.20.3, 1.19.9, 1.18.14, and 1.16.25.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2025-6203

3 месяца назад

A malicious user may submit a specially-crafted complex payload that otherwise meets the default request size limit which results in excessive memory and CPU consumption of Vault. This may lead to a timeout in Vault’s auditing subroutine, potentially resulting in the Vault server to become unresponsive. This vulnerability, CVE-2025-6203, is fixed in Vault Community Edition 1.20.3 and Vault Enterprise 1.20.3, 1.19.9, 1.18.14, and 1.16.25.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-8f82-53h8-2p34

3 месяца назад

HashiCorp Vault Community Edition Denial of Service Though Complex JSON Payloads

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2025-10637

3 месяца назад

Уязвимость подпрограммы аудита платформ для архивирования корпоративной информации Vault Enterprise и Vault Community Edition, связанная с неограниченным распределением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
redos логотип

ROS-20251020-05

около 1 месяца назад

Уязвимость vault

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2025-6203

A malicious user may submit a specially-crafted complex payload that otherwise meets the default request size limit which results in excessive memory and CPU consumption of Vault. This may lead to a timeout in Vault’s auditing subroutine, potentially resulting in the Vault server to become unresponsive. This vulnerability, CVE-2025-6203, is fixed in Vault Community Edition 1.20.3 and Vault Enterprise 1.20.3, 1.19.9, 1.18.14, and 1.16.25.

CVSS3: 5.3
0%
Низкий
3 месяца назад
nvd логотип
CVE-2025-6203

A malicious user may submit a specially-crafted complex payload that otherwise meets the default request size limit which results in excessive memory and CPU consumption of Vault. This may lead to a timeout in Vault’s auditing subroutine, potentially resulting in the Vault server to become unresponsive. This vulnerability, CVE-2025-6203, is fixed in Vault Community Edition 1.20.3 and Vault Enterprise 1.20.3, 1.19.9, 1.18.14, and 1.16.25.

CVSS3: 7.5
0%
Низкий
3 месяца назад
github логотип
GHSA-8f82-53h8-2p34

HashiCorp Vault Community Edition Denial of Service Though Complex JSON Payloads

CVSS3: 7.5
0%
Низкий
3 месяца назад
fstec логотип
BDU:2025-10637

Уязвимость подпрограммы аудита платформ для архивирования корпоративной информации Vault Enterprise и Vault Community Edition, связанная с неограниченным распределением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
0%
Низкий
3 месяца назад
redos логотип
ROS-20251020-05

Уязвимость vault

CVSS3: 7.5
0%
Низкий
около 1 месяца назад

Уязвимостей на страницу