CVE-2024-12137

CVE-2024-12137

Título es
CVE-2024-12137

Mié, 19/03/2025 – 09:15

Tipo
CWE-294

Gravedad 2.0 Txt
Pendiente de análisis

Título en

CVE-2024-12137

Descripción es
La vulnerabilidad de omisión de autenticación por captura y repetición en Elfatek Elektronics ANKA JPD-00028 permite el secuestro de sesión. Este problema afecta a ANKA JPD-00028 hasta el 19/03/2025. NOTA: El proveedor no informó sobre la finalización del proceso de corrección dentro del plazo especificado. El CVE se actualizará cuando haya nueva información disponible.

Descripción en
Authentication Bypass by Capture-replay vulnerability in Elfatek Elektronics ANKA JPD-00028 allows Session Hijacking.This issue affects ANKA JPD-00028: through 19.03.2025.

NOTE: The vendor did not inform about the completion of the fixing process within the specified time. The CVE will be updated when new information becomes available.

19/03/2025

19/03/2025

Vector CVSS:3.1
CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H

Gravedad 3.1 (CVSS 3.1 Base Score)
7.60

Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
HIGH

Referencias


  • https://www.usom.gov.tr/bildirim/tr-25-0071
  • Enviar en el boletín
    Off

    CVE-2024-57151

    CVE-2024-57151

    Título es
    CVE-2024-57151

    Mar, 18/03/2025 – 21:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2024-57151

    Descripción en
    SQL Injection vulnerability in rainrocka xinhu v.2.6.5 and before allows a remote attacker to execute arbitrary code via the inputAction.php file and the saveAjax function

    18/03/2025

    18/03/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://github.com/jcxj/jcxj/blob/master/source/_posts/%E4%BF%A1%E5%91%BCoa%E5%AE%A1%E8%AE%A1.md
  • Enviar en el boletín
    Off

    CVE-2025-30140

    CVE-2025-30140

    Título es
    CVE-2025-30140

    Mar, 18/03/2025 – 21:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-30140

    Descripción en
    An issue was discovered on G-Net Dashcam BB GONX devices. A Public Domain name is Used for the Internal Domain Name. It uses an unregistered public domain name as an internal domain, creating a security risk. This domain was not owned by GNET originally, allowing an attacker to register it and potentially intercept sensitive device traffic (it has since been registered by the vulnerability discoverer). If the dashcam or related services attempt to resolve this domain over the public Internet instead of locally, it could lead to data exfiltration or man-in-the-middle attacks.

    18/03/2025

    18/03/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://github.com/geo-chen/GNET

  • https://www.gnetsystem.com/eng/product/list?viewMode=view&idx=246&ca_id=0201
  • Enviar en el boletín
    Off

    CVE-2024-12563

    CVE-2024-12563

    Título es
    CVE-2024-12563

    Mar, 18/03/2025 – 21:15

    Tipo
    CWE-98

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2024-12563

    Descripción en
    The s2Member Pro plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 250214 via the 'template' attribute. This makes it possible for authenticated attackers, with contributor-level and above permissions, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution.

    18/03/2025

    18/03/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

    Gravedad 3.1 (CVSS 3.1 Base Score)
    8.80

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    HIGH

    Referencias

  • Changelog



  • https://www.wordfence.com/threat-intel/vulnerabilities/id/d3326e9d-504f-444f-baf7-03989594f483?source=cve
  • Enviar en el boletín
    Off

    CVE-2025-25042

    CVE-2025-25042

    Título es
    CVE-2025-25042

    Mar, 18/03/2025 – 19:15

    Tipo
    CWE-359

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-25042

    Descripción en
    A vulnerability in the AOS-CX REST interface could allow an authenticated remote attacker with low privileges to view sensitive information. Successful exploitation could allow an attacker to read encrypted credentials of other users on the switch, potentially leading to further unauthorized access or data breaches.

    18/03/2025

    18/03/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

    Gravedad 3.1 (CVSS 3.1 Base Score)
    4.30

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    MEDIUM

    Referencias


  • https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04818en_us&docLocale=en_US
  • Enviar en el boletín
    Off

    CVE-2025-27080

    CVE-2025-27080

    Título es
    CVE-2025-27080

    Mar, 18/03/2025 – 19:15

    Tipo
    CWE-359

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-27080

    Descripción en
    Vulnerabilities in the command line interface of AOS-CX could allow an authenticated remote attacker to expose sensitive information. Successful exploitation could allow an attacker to gain unauthorized access to services outside of the impacted switch, potentially leading to lateral movement involving those services.

    18/03/2025

    18/03/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N

    Gravedad 3.1 (CVSS 3.1 Base Score)
    6.00

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    MEDIUM

    Referencias


  • https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04818en_us&docLocale=en_US
  • Enviar en el boletín
    Off

    CVE-2025-29790

    CVE-2025-29790

    Título es
    CVE-2025-29790

    Mar, 18/03/2025 – 19:15

    Tipo
    CWE-79

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-29790

    Descripción en
    Contao is an Open Source CMS. Users can upload SVG files with malicious code, which is then executed in the back end and/or front end. This vulnerability is fixed in Contao 4.13.54, 5.3.30, or 5.5.6.

    18/03/2025

    18/03/2025

    Vector CVSS:4.0
    CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

    Gravedad 4.0
    4.80

    Gravedad 4.0 txt
    MEDIUM

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://contao.org/en/security-advisories/cross-site-scripting-through-svg-uploads

  • https://github.com/contao/contao/security/advisories/GHSA-vqqr-fgmh-f626
  • Enviar en el boletín
    Off

    CVE-2025-29930

    CVE-2025-29930

    Título es
    CVE-2025-29930

    Mar, 18/03/2025 – 19:15

    Tipo
    CWE-73

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-29930

    Descripción en
    imFAQ is an advanced questions and answers management system for ImpressCMS. Prior to 1.0.1, if the $_GET['seoOp'] parameter is manipulated to include malicious input (e.g., seoOp=php://filter/read=convert.base64-encode/resource=/var/www/html/config.php), the application could allow an attacker to read sensitive files on the server (Local File Inclusion, LFI). The $_GET['seoOp'] and $_GET['seoArg'] parameters are directly used without sanitization or validation. This is partly mitigated by the fact that the ImpressCMS sensitive files are stored outside the web root, in a folder with a randomized name. The issue has been resolved in imFaq 1.0.1.

    18/03/2025

    18/03/2025

    Vector CVSS:4.0
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

    Gravedad 4.0
    6.90

    Gravedad 4.0 txt
    MEDIUM

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://github.com/ImpressModules/imfaq/commit/63dedd30a8f196db7b340740adf667a39c26a4ac

  • https://github.com/ImpressModules/imfaq/security/advisories/GHSA-vrr3-54vc-vwg3
  • Enviar en el boletín
    Off

    CVE-2025-29907

    CVE-2025-29907

    Título es
    CVE-2025-29907

    Mar, 18/03/2025 – 19:15

    Tipo
    CWE-400

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-29907

    Descripción en
    jsPDF is a library to generate PDFs in JavaScript. Prior to 3.0.1, user control of the first argument of the addImage method results in CPU utilization and denial of service. If given the possibility to pass unsanitised image urls to the addImage method, a user can provide a harmful data-url that results in high CPU utilization and denial of service. Other affected methods are html and addSvgAsImage. The vulnerability was fixed in jsPDF 3.0.1.

    18/03/2025

    18/03/2025

    Vector CVSS:4.0
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

    Gravedad 4.0
    8.70

    Gravedad 4.0 txt
    HIGH

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://github.com/parallax/jsPDF/commit/b167c43c27c466eb914b927885b06073708338df

  • https://github.com/parallax/jsPDF/security/advisories/GHSA-w532-jxjh-hjhj
  • Enviar en el boletín
    Off

    CVE-2025-30142

    CVE-2025-30142

    Título es
    CVE-2025-30142

    Mar, 18/03/2025 – 20:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-30142

    Descripción en
    An issue was discovered on G-Net Dashcam BB GONX devices. Bypassing of Device Pairing can occur. It uses MAC address verification as the sole mechanism for recognizing paired devices, allowing attackers to bypass authentication. By capturing the MAC address of an already-paired device through ARP scanning or other means, an attacker can spoof the MAC address and connect to the dashcam without going through the pairing process. This enables full access to the device.

    18/03/2025

    18/03/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://github.com/geo-chen/GNET

  • https://www.gnetsystem.com/eng/product/list?viewMode=view&idx=246&ca_id=0201
  • Enviar en el boletín
    Off