Search for vulnerabilities
Vulnerability details: VCID-22x7-k4s1-uugm
Vulnerability ID VCID-22x7-k4s1-uugm
Aliases CVE-2025-3360
Summary A flaw was found in GLib. An integer overflow and buffer under-read occur when parsing a long invalid ISO 8601 timestamp with the g_date_time_new_from_iso8601() function.
Status Published
Exploitability 0.5
Weighted Severity 3.3
Risk 1.6
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 3.7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-3360.json
cvssv3.1 3.7 https://access.redhat.com/security/cve/CVE-2025-3360
ssvc Track https://access.redhat.com/security/cve/CVE-2025-3360
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2025-3360
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2025-3360
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2025-3360
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2025-3360
epss 0.00061 https://api.first.org/data/v1/epss?cve=CVE-2025-3360
epss 0.00061 https://api.first.org/data/v1/epss?cve=CVE-2025-3360
epss 0.00061 https://api.first.org/data/v1/epss?cve=CVE-2025-3360
epss 0.00061 https://api.first.org/data/v1/epss?cve=CVE-2025-3360
epss 0.00061 https://api.first.org/data/v1/epss?cve=CVE-2025-3360
epss 0.00061 https://api.first.org/data/v1/epss?cve=CVE-2025-3360
epss 0.00079 https://api.first.org/data/v1/epss?cve=CVE-2025-3360
epss 0.00079 https://api.first.org/data/v1/epss?cve=CVE-2025-3360
epss 0.00079 https://api.first.org/data/v1/epss?cve=CVE-2025-3360
epss 0.00079 https://api.first.org/data/v1/epss?cve=CVE-2025-3360
epss 0.00079 https://api.first.org/data/v1/epss?cve=CVE-2025-3360
epss 0.00079 https://api.first.org/data/v1/epss?cve=CVE-2025-3360
epss 0.00079 https://api.first.org/data/v1/epss?cve=CVE-2025-3360
epss 0.00079 https://api.first.org/data/v1/epss?cve=CVE-2025-3360
epss 0.00102 https://api.first.org/data/v1/epss?cve=CVE-2025-3360
epss 0.00102 https://api.first.org/data/v1/epss?cve=CVE-2025-3360
epss 0.00102 https://api.first.org/data/v1/epss?cve=CVE-2025-3360
epss 0.00102 https://api.first.org/data/v1/epss?cve=CVE-2025-3360
epss 0.00102 https://api.first.org/data/v1/epss?cve=CVE-2025-3360
epss 0.00102 https://api.first.org/data/v1/epss?cve=CVE-2025-3360
epss 0.00102 https://api.first.org/data/v1/epss?cve=CVE-2025-3360
epss 0.00102 https://api.first.org/data/v1/epss?cve=CVE-2025-3360
epss 0.00102 https://api.first.org/data/v1/epss?cve=CVE-2025-3360
epss 0.00102 https://api.first.org/data/v1/epss?cve=CVE-2025-3360
epss 0.00102 https://api.first.org/data/v1/epss?cve=CVE-2025-3360
cvssv3.1 3.7 https://bugzilla.redhat.com/show_bug.cgi?id=2357754
ssvc Track https://bugzilla.redhat.com/show_bug.cgi?id=2357754
cvssv3.1 5.9 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-3360.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://access.redhat.com/security/cve/CVE-2025-3360
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-07T13:23:42Z/ Found at https://access.redhat.com/security/cve/CVE-2025-3360
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://bugzilla.redhat.com/show_bug.cgi?id=2357754
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-07T13:23:42Z/ Found at https://bugzilla.redhat.com/show_bug.cgi?id=2357754
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.1576
EPSS Score 0.00052
Published At Sept. 9, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T09:30:51.809310+00:00 Vulnrichment Import https://github.com/cisagov/vulnrichment/blob/develop/2025/3xxx/CVE-2025-3360.json 37.0.0