{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T02:08:39.576","vulnerabilities":[{"cve":{"id":"CVE-2023-25076","sourceIdentifier":"talos-cna@cisco.com","published":"2023-03-30T15:15:07.370","lastModified":"2024-11-21T07:49:03.510","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A buffer overflow vulnerability exists in the handling of wildcard backend hosts of SNIProxy 0.6.0-2 and the master branch (commit: 822bb80df9b7b345cc9eba55df74a07b498819ba). A specially crafted HTTP or TLS packet can lead to arbitrary code execution. An attacker could send a malicious packet to trigger this vulnerability."}],"metrics":{"cvssMetricV31":[{"source":"talos-cna@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"talos-cna@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-120"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sniproxy_project:sniproxy:0.6.0-2:*:*:*:*:*:*:*","matchCriteriaId":"1E18CB41-EF35-46B8-9D6C-E0BA78FFA8F2"},{"vulnerable":true,"criteria":"cpe:2.3:a:sniproxy_project:sniproxy:0.6.1:*:*:*:*:*:*:*","matchCriteriaId":"28C6109D-E621-41AC-87A6-F50E7ACB5510"}]}]}],"references":[{"url":"https://github.com/dlundquist/sniproxy/commit/f8d9a433fe22ab2fa15c00179048ab02ae23d583","source":"talos-cna@cisco.com","tags":["Patch"]},{"url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00030.html","source":"talos-cna@cisco.com"},{"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2023-1731","source":"talos-cna@cisco.com","tags":["Exploit","Mitigation","Third Party Advisory"]},{"url":"https://www.debian.org/security/2023/dsa-5413","source":"talos-cna@cisco.com"},{"url":"https://github.com/dlundquist/sniproxy/commit/f8d9a433fe22ab2fa15c00179048ab02ae23d583","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00030.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2023-1731","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Mitigation","Third Party Advisory"]},{"url":"https://www.debian.org/security/2023/dsa-5413","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1731","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}