CVE-2025-20919

CVE-2025-20919

Título es
CVE-2025-20919

Jue, 06/03/2025 – 05:15

Gravedad 2.0 Txt
Pendiente de análisis

Título en

CVE-2025-20919

Descripción en
Out-of-bounds read in applying binary of video content in Samsung Notes prior to version 4.4.26.71 allows attackers to read out-of-bounds memory.

06/03/2025

06/03/2025

Vector CVSS:3.1
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Gravedad 3.1 (CVSS 3.1 Base Score)
5.50

Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
MEDIUM

Referencias


  • https://security.samsungmobile.com/serviceWeb.smsb?year=2025&month=03
  • Enviar en el boletín
    Off

    CVE-2025-27622

    CVE-2025-27622

    Título es
    CVE-2025-27622

    Mié, 05/03/2025 – 23:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-27622

    Descripción en
    Jenkins 2.499 and earlier, LTS 2.492.1 and earlier does not redact encrypted values of secrets when accessing `config.xml` of agents via REST API or CLI, allowing attackers with Agent/Extended Read permission to view encrypted values of secrets.

    06/03/2025

    06/03/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://www.jenkins.io/security/advisory/2025-03-05/#SECURITY-3495
  • Enviar en el boletín
    Off

    CVE-2025-27625

    CVE-2025-27625

    Título es
    CVE-2025-27625

    Mié, 05/03/2025 – 23:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-27625

    Descripción en
    In Jenkins 2.499 and earlier, LTS 2.492.1 and earlier, redirects starting with backslash (`\`) characters are considered safe, allowing attackers to perform phishing attacks by having users go to a Jenkins URL that will forward them to a different site, because browsers interpret these characters as part of scheme-relative redirects.

    06/03/2025

    06/03/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://www.jenkins.io/security/advisory/2025-03-05/#SECURITY-3501
  • Enviar en el boletín
    Off

    CVE-2025-27624

    CVE-2025-27624

    Título es
    CVE-2025-27624

    Mié, 05/03/2025 – 23:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-27624

    Descripción en
    A cross-site request forgery (CSRF) vulnerability in Jenkins 2.499 and earlier, LTS 2.492.1 and earlier allows attackers to have users toggle their collapsed/expanded status of sidepanel widgets (e.g., Build Queue and Build Executor Status widgets).

    06/03/2025

    06/03/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://www.jenkins.io/security/advisory/2025-03-05/#SECURITY-3498
  • Enviar en el boletín
    Off

    CVE-2025-27623

    CVE-2025-27623

    Título es
    CVE-2025-27623

    Mié, 05/03/2025 – 23:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-27623

    Descripción en
    Jenkins 2.499 and earlier, LTS 2.492.1 and earlier does not redact encrypted values of secrets when accessing `config.xml` of views via REST API or CLI, allowing attackers with View/Read permission to view encrypted values of secrets.

    06/03/2025

    06/03/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://www.jenkins.io/security/advisory/2025-03-05/#SECURITY-3496
  • Enviar en el boletín
    Off

    CVE-2025-27508

    CVE-2025-27508

    Título es
    CVE-2025-27508

    Mié, 05/03/2025 – 22:15

    Tipo
    CWE-327

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-27508

    Descripción en
    Emissary is a P2P based data-driven workflow engine. The ChecksumCalculator class within allows for hashing and checksum generation, but it includes or defaults to algorithms that are no longer recommended for secure cryptographic use cases (e.g., SHA-1, CRC32, and SSDEEP). These algorithms, while possibly valid for certain non-security-critical tasks, can expose users to security risks if used in scenarios where strong cryptographic guarantees are required. This issue is fixed in 8.24.0.

    05/03/2025

    05/03/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

    Gravedad 3.1 (CVSS 3.1 Base Score)
    7.50

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    HIGH

    Referencias


  • https://github.com/NationalSecurityAgency/emissary/commit/da3a81a8977577597ff2a944820a5ae4e9762368

  • https://github.com/NationalSecurityAgency/emissary/security/advisories/GHSA-hw43-fcmm-3m5g
  • Enviar en el boletín
    Off

    CVE-2025-25634

    CVE-2025-25634

    Título es
    CVE-2025-25634

    Mié, 05/03/2025 – 21:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-25634

    Descripción en
    A vulnerability has been found in Tenda AC15 15.03.05.19 in the function GetParentControlInfo of the file /goform/GetParentControlInfo. The manipulation of the argument src leads to stack-based buffer overflow.

    05/03/2025

    05/03/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://github.com/Pr0b1em/IoT/blob/master/TendaAC15v15.03.05.19GetParentControlInfo.md
  • Enviar en el boletín
    Off

    CVE-2025-25632

    CVE-2025-25632

    Título es
    CVE-2025-25632

    Mié, 05/03/2025 – 21:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-25632

    Descripción en
    Tenda AC15 v15.03.05.19 is vulnerable to Command Injection via the handler function in /goform/telnet.

    05/03/2025

    05/03/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://github.com/Pr0b1em/IoT/blob/master/TendaAC15v15.03.05.19telnet.md
  • Enviar en el boletín
    Off

    CVE-2025-25362

    CVE-2025-25362

    Título es
    CVE-2025-25362

    Mié, 05/03/2025 – 21:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-25362

    Descripción en
    A Server-Side Template Injection (SSTI) vulnerability in Spacy-LLM v0.7.2 allows attackers to execute arbitrary code via injecting a crafted payload into the template field.

    05/03/2025

    05/03/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://github.com/explosion/spacy-llm/issues/492
  • Enviar en el boletín
    Off

    CVE-2024-57174

    CVE-2024-57174

    Título es
    CVE-2024-57174

    Mié, 05/03/2025 – 21:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2024-57174

    Descripción en
    A misconfiguration in Alphion ASEE-1443 Firmware v0.4.H.00.02.15 defines a previously unregistered domain name as the default DNS suffix. This allows attackers to register the unclaimed domain and point its wildcard DNS entry to an attacker-controlled IP address, making it possible to access sensitive information.

    05/03/2025

    05/03/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://chenzw.medium.com/internal-domain-names-f1cd2886c654

  • https://github.com/geo-chen/BSides-SG-2022—Internal-Domain-Names?tab=readme-ov-file#finding-1—cve-2024-57174-alphion-routers
  • Enviar en el boletín
    Off