Логотип exploitDog
bind:CVE-2025-15529
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-15529

Количество 3

Количество 3

nvd логотип

CVE-2025-15529

23 дня назад

A vulnerability was found in Open5GS up to 2.7.6. Affected by this issue is the function sgwc_s5c_handle_create_session_response of the file src/sgwc/s5c-handler.c. Performing a manipulation results in denial of service. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The patch is named b19cf6a2dbf5d30811be4488bf059c865bd7d1d2. To fix this issue, it is recommended to deploy a patch.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2025-15529

23 дня назад

A vulnerability was found in Open5GS up to 2.7.6. Affected by this iss ...

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-4mf2-6634-xrph

23 дня назад

A vulnerability was found in Open5GS up to 2.7.6. Affected by this issue is the function sgwc_s5c_handle_create_session_response of the file src/sgwc/s5c-handler.c. Performing a manipulation results in denial of service. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The patch is named b19cf6a2dbf5d30811be4488bf059c865bd7d1d2. To fix this issue, it is recommended to deploy a patch.

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-15529

A vulnerability was found in Open5GS up to 2.7.6. Affected by this issue is the function sgwc_s5c_handle_create_session_response of the file src/sgwc/s5c-handler.c. Performing a manipulation results in denial of service. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The patch is named b19cf6a2dbf5d30811be4488bf059c865bd7d1d2. To fix this issue, it is recommended to deploy a patch.

CVSS3: 5.3
0%
Низкий
23 дня назад
debian логотип
CVE-2025-15529

A vulnerability was found in Open5GS up to 2.7.6. Affected by this iss ...

CVSS3: 5.3
0%
Низкий
23 дня назад
github логотип
GHSA-4mf2-6634-xrph

A vulnerability was found in Open5GS up to 2.7.6. Affected by this issue is the function sgwc_s5c_handle_create_session_response of the file src/sgwc/s5c-handler.c. Performing a manipulation results in denial of service. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The patch is named b19cf6a2dbf5d30811be4488bf059c865bd7d1d2. To fix this issue, it is recommended to deploy a patch.

CVSS3: 5.3
0%
Низкий
23 дня назад

Уязвимостей на страницу