CVE-2025-58582 - Uncontrolled Resource Consumption via log file
CVE ID : CVE-2025-58582
Published : 6 oktober 2025 07:15 | 45 minuten ago
Description : If a user tries to login but the provided credentials are incorrect a log is created. The data for this POST requests is not validated and it’s possible to send giant payloads which are then logged.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
Published : 6 oktober 2025 07:15 | 45 minuten ago
Description : If a user tries to login but the provided credentials are incorrect a log is created. The data for this POST requests is not validated and it’s possible to send giant payloads which are then logged.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...