{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-28T21:36:03.733","vulnerabilities":[{"cve":{"id":"CVE-2025-24845","sourceIdentifier":"vultures@jpcert.or.jp","published":"2025-02-06T08:15:30.673","lastModified":"2026-01-30T21:05:58.620","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Improper neutralization of argument delimiters in a command ('Argument Injection') issue exists in Defense Platform Home Edition Ver.3.9.51.x and earlier. If an attacker provides specially crafted data to the specific process of the Windows system where the product is running, the system may cause a Blue Screen of Death (BSOD), and as a result, cause a denial-of-service (DoS) condition."},{"lang":"es","value":"Existe un problema de neutralización incorrecta de los delimitadores de argumentos en un comando ('Inyección de argumentos') en Defense Platform Home Edition Ver.3.9.51.x y versiones anteriores. Si un atacante proporciona datos especialmente manipulados al proceso específico del sistema Windows donde se ejecuta el producto, el sistema puede provocar una pantalla azul de la muerte (BSOD) y, como resultado, provocar una condición de denegación de servicio (DoS)."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}],"cvssMetricV30":[{"source":"vultures@jpcert.or.jp","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H","baseScore":6.3,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":4.0}]},"weaknesses":[{"source":"vultures@jpcert.or.jp","type":"Secondary","description":[{"lang":"en","value":"CWE-88"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hummingheads:defense_platform:*:*:*:*:home:*:*:*","versionEndIncluding":"3.9.51.0","matchCriteriaId":"6B192BB2-AB8A-49B5-A8EC-06D30F135E87"}]}]}],"references":[{"url":"https://jvn.jp/en/jp/JVN66673020/","source":"vultures@jpcert.or.jp","tags":["Third Party Advisory"]},{"url":"https://www.hummingheads.co.jp/dep/storelist/","source":"vultures@jpcert.or.jp","tags":["Product"]}]}}]}