Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 26 Nov 2025 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Intercom
Intercom malion Microsoft Microsoft windows |
|
| Vendors & Products |
Intercom
Intercom malion Microsoft Microsoft windows |
Tue, 25 Nov 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 25 Nov 2025 07:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Security Point (Windows) of MaLion and MaLionCloud contains a stack-based buffer overflow vulnerability in processing HTTP headers. Receiving a specially crafted request from a remote unauthenticated attacker could lead to arbitrary code execution with SYSTEM privilege. | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2025-11-25T20:17:50.931Z
Reserved: 2025-11-18T02:02:13.827Z
Link: CVE-2025-62691
Updated: 2025-11-25T20:17:47.737Z
Status : Deferred
Published: 2025-11-25T08:15:54.230
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-62691
No data.
OpenCVE Enrichment
Updated: 2025-11-26T11:11:09Z