{"uuid": "ccf501bd-87ef-407b-a91a-80fb78109e87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2263", "type": "seen", "source": "https://t.me/cvedetector/20235", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2263 - Sante PACS Server.exe OpenSSL Stack-Based Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2025-2263 \nPublished : March 13, 2025, 5:15 p.m. | 43\u00a0minutes ago \nDescription : During login to the web server in \"Sante PACS Server.exe\", OpenSSL function EVP_DecryptUpdate is called to decrypt the username and password. A fixed 0x80-byte stack-based buffer is passed to the function as the output buffer. A stack-based buffer overflow exists if a long encrypted username or password is supplied by an unauthenticated remote attacker. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-13T19:48:12.000000Z"}