{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-15T04:09:08.443","vulnerabilities":[{"cve":{"id":"CVE-2025-0617","sourceIdentifier":"trellixpsirt@trellix.com","published":"2025-01-29T11:15:09.330","lastModified":"2025-01-29T11:15:09.330","vulnStatus":"Awaiting Analysis","cveTags":[],"descriptions":[{"lang":"en","value":"An attacker with access to an HX 10.0.0  and previous versions, may send specially-crafted data to the HX console.  The malicious detection would then trigger file parsing containing exponential entity expansions in the consumer process thus causing a Denial of Service."},{"lang":"es","value":"Un atacante con acceso a HX 10.0.0 y versiones anteriores puede enviar datos especiales manipulado a la consola HX. La detección maliciosa activaría entonces el análisis de archivos que contienen expansiones de entidades exponenciales en el proceso del consumidor, lo que causaría una denegación de servicio."}],"metrics":{"cvssMetricV31":[{"source":"trellixpsirt@trellix.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:H\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:H","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":3.6}]},"weaknesses":[{"source":"trellixpsirt@trellix.com","type":"Secondary","description":[{"lang":"en","value":"CWE-776"}]}],"references":[{"url":"https:\/\/thrive.trellix.com\/s\/article\/000014214","source":"trellixpsirt@trellix.com"}]}}]}