{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T19:50:07.220","vulnerabilities":[{"cve":{"id":"CVE-2025-23236","sourceIdentifier":"vultures@jpcert.or.jp","published":"2025-02-06T08:15:30.170","lastModified":"2026-02-04T20:16:12.047","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow vulnerability exists in Defense Platform Home Edition Ver.3.9.51.x and earlier. If an attacker performs a specific operation, SYSTEM privilege of the Windows system where the product is running may be obtained."},{"lang":"es","value":"Existe una vulnerabilidad de desbordamiento de búfer en Defense Platform Home Edition Ver.3.9.51.x y versiones anteriores. Si un atacante realiza una operación específica, puede obtener el privilegio SYSTEM del sistema Windows en el que se ejecuta el producto."}],"metrics":{"cvssMetricV30":[{"source":"vultures@jpcert.or.jp","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.0,"impactScore":6.0}]},"weaknesses":[{"source":"vultures@jpcert.or.jp","type":"Secondary","description":[{"lang":"en","value":"CWE-120"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hummingheads:defense_platform:*:*:*:*:home:*:*:*","versionEndIncluding":"3.9.51.0","matchCriteriaId":"6B192BB2-AB8A-49B5-A8EC-06D30F135E87"}]}]}],"references":[{"url":"https://jvn.jp/en/jp/JVN66673020/","source":"vultures@jpcert.or.jp","tags":["Third Party Advisory"]},{"url":"https://www.hummingheads.co.jp/dep/storelist/","source":"vultures@jpcert.or.jp","tags":["Product"]}]}}]}