{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T16:14:39.865","vulnerabilities":[{"cve":{"id":"CVE-2025-4207","sourceIdentifier":"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007","published":"2025-05-08T15:15:48.577","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer over-read in PostgreSQL GB18030 encoding validation allows a database input provider to achieve temporary denial of service on platforms where a 1-byte over-read can elicit process termination.  This affects the database server and also libpq.  Versions before PostgreSQL 17.5, 16.9, 15.13, 14.18, and 13.21 are affected."},{"lang":"es","value":"La sobrelectura del búfer en la validación de codificación GB18030 de PostgreSQL permite que un proveedor de entrada de base de datos realice una denegación de servicio temporal en plataformas donde una sobrelectura de 1 byte puede provocar la finalización del proceso. Esto afecta al servidor de base de datos y también a libpq. Las versiones anteriores a PostgreSQL 17.5, 16.9, 15.13, 14.18 y 13.21 se ven afectadas."}],"metrics":{"cvssMetricV31":[{"source":"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":3.6}]},"weaknesses":[{"source":"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007","type":"Secondary","description":[{"lang":"en","value":"CWE-126"}]}],"references":[{"url":"https://www.postgresql.org/support/security/CVE-2025-4207/","source":"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007"},{"url":"http://www.openwall.com/lists/oss-security/2025/05/09/3","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00011.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}