{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T03:48:17.342","vulnerabilities":[{"cve":{"id":"CVE-2025-3354","sourceIdentifier":"psirt@us.ibm.com","published":"2025-08-06T14:15:39.483","lastModified":"2025-08-13T18:22:49.927","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"IBM Tivoli Monitoring 6.3.0.7 through 6.3.0.7 Service Pack 20 is vulnerable to a heap-based buffer overflow, caused by improper bounds checking. A remote attacker could overflow a buffer and execute arbitrary code on the system or cause the server to crash."},{"lang":"es","value":"IBM Tivoli Monitoring 6.3.0.7 a 6.3.0.7 Service Pack 20 es vulnerable a un desbordamiento de búfer basado en el montón, causado por una comprobación incorrecta de los límites. Un atacante remoto podría desbordar un búfer y ejecutar código arbitrario en el sistema o provocar un fallo del servidor."}],"metrics":{"cvssMetricV31":[{"source":"psirt@us.ibm.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"psirt@us.ibm.com","type":"Secondary","description":[{"lang":"en","value":"CWE-122"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:-:*:*:*:*:*:*","matchCriteriaId":"15633ADC-6913-4AA1-8524-F139895B1C9D"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp1:*:*:*:*:*:*","matchCriteriaId":"F8F29F79-3813-4B6F-A0FE-3E12711F2827"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp10:*:*:*:*:*:*","matchCriteriaId":"63F43D7A-2BB8-475A-9F95-5AD83FC2F1E1"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp11:*:*:*:*:*:*","matchCriteriaId":"89FE6200-3F7A-43E6-B9DB-24D1B956A509"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp12:*:*:*:*:*:*","matchCriteriaId":"8632DB2C-4814-43F9-8AA9-682FB000CDC7"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp13:*:*:*:*:*:*","matchCriteriaId":"9D1B4834-85E5-4E41-9886-03BFD8424FF2"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp14:*:*:*:*:*:*","matchCriteriaId":"54AE7933-034F-459B-8C02-2850D3153437"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp15:*:*:*:*:*:*","matchCriteriaId":"643F4560-5049-466D-B4BA-18DDBBD2BEB2"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp16:*:*:*:*:*:*","matchCriteriaId":"3698F091-E08C-4B5C-9E85-1729A19A914F"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp17:*:*:*:*:*:*","matchCriteriaId":"DA218FEA-1091-4098-8A4C-3557924A27EE"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp18:*:*:*:*:*:*","matchCriteriaId":"6993220C-C737-4876-8E52-1C0CB9F109A5"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp19:*:*:*:*:*:*","matchCriteriaId":"2AAFF1A2-750F-4C08-B544-0D6BC56D2048"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp2:*:*:*:*:*:*","matchCriteriaId":"056BA0BC-CA53-4103-AA0A-692226602765"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp20:*:*:*:*:*:*","matchCriteriaId":"68430D8F-B043-4179-860E-D4DADB7203E1"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp3:*:*:*:*:*:*","matchCriteriaId":"FC469C26-0D30-40CF-8A24-AC7940DD9D44"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp4:*:*:*:*:*:*","matchCriteriaId":"2E6529C0-2017-413A-9FF8-D3D09475E867"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp5:*:*:*:*:*:*","matchCriteriaId":"BF411C3F-AB57-4F4B-92C7-6F6C142F2F64"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp6:*:*:*:*:*:*","matchCriteriaId":"C6BC45D1-9BE9-44FC-A99A-FF99F7393274"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp7:*:*:*:*:*:*","matchCriteriaId":"53D77364-F817-4BE8-BF25-1537180B06DE"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp8:*:*:*:*:*:*","matchCriteriaId":"680F331C-D4C7-4280-9981-9848BAE460C4"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp9:*:*:*:*:*:*","matchCriteriaId":"3C280072-A982-4A9F-A740-00838B72259B"}]}]}],"references":[{"url":"https://www.ibm.com/support/pages/node/7241472","source":"psirt@us.ibm.com","tags":["Vendor Advisory"]}]}}]}