CVE-2025-27516

CVE-2025-27516

Título es
CVE-2025-27516

Mié, 05/03/2025 – 21:15

Tipo
CWE-1336

Gravedad 2.0 Txt
Pendiente de análisis

Título en

CVE-2025-27516

Descripción en
Jinja is an extensible templating engine. Prior to 3.1.6, an oversight in how the Jinja sandboxed environment interacts with the |attr filter allows an attacker that controls the content of a template to execute arbitrary Python code. To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates. Jinja's sandbox does catch calls to str.format and ensures they don't escape the sandbox. However, it's possible to use the |attr filter to get a reference to a string's plain format method, bypassing the sandbox. After the fix, the |attr filter no longer bypasses the environment's attribute lookup. This vulnerability is fixed in 3.1.6.

05/03/2025

05/03/2025

Vector CVSS:4.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Gravedad 4.0
5.40

Gravedad 4.0 txt
MEDIUM

Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
Pendiente de análisis

Referencias


  • https://github.com/pallets/jinja/commit/90457bbf33b8662926ae65cdde4c4c32e756e403

  • https://github.com/pallets/jinja/security/advisories/GHSA-cpwx-vrp4-4pq7
  • Enviar en el boletín
    Off

    CVE-2024-11035

    CVE-2024-11035

    Título es
    CVE-2024-11035

    Mié, 05/03/2025 – 17:15

    Tipo
    CWE-497

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2024-11035

    Descripción en
    Carbon Black Cloud Windows Sensor, prior to 4.0.3, may be susceptible to an Information Leak vulnerability, which s a type of issue whereby sensitive information may b exposed due to a vulnerability in software.

    05/03/2025

    05/03/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N

    Gravedad 3.1 (CVSS 3.1 Base Score)
    2.50

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    LOW

    Referencias


  • https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25472
  • Enviar en el boletín
    Off

    CVE-2024-48246

    CVE-2024-48246

    Título es
    CVE-2024-48246

    Mié, 05/03/2025 – 19:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2024-48246

    Descripción en
    Vehicle Management System 1.0 contains a Stored Cross-Site Scripting (XSS) vulnerability in the "Name" parameter of /vehicle-management/booking.php.

    05/03/2025

    05/03/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://github.com/ShadowByte1/CVE-2024-48246
  • Enviar en el boletín
    Off

    CVE-2024-31525

    CVE-2024-31525

    Título es
    CVE-2024-31525

    Mié, 05/03/2025 – 19:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2024-31525

    Descripción en
    Peppermint Ticket Management 0.4.6 is vulnerable to Incorrect Access Control. A regular registered user is able to elevate his privileges to admin and gain complete access to the system as the authorization mechanism is not validated on the server side and only on the client side. This can result, for example, in creating a new admin user in the system which enables persistent access for the attacker as an administrator.

    05/03/2025

    05/03/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://cwe.mitre.org/data/definitions/285.html

  • https://github.com/Peppermint-Lab/peppermint/issues/258
  • Enviar en el boletín
    Off

    CVE-2025-2003

    CVE-2025-2003

    Título es
    CVE-2025-2003

    Mié, 05/03/2025 – 19:15

    Tipo
    CWE-863

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-2003

    Descripción en
    Incorrect authorization in PAM vaults in Devolutions Server 2024.3.12 and earlier allows an authenticated user to bypass the 'add in root' permission.

    05/03/2025

    05/03/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L

    Gravedad 3.1 (CVSS 3.1 Base Score)
    7.10

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    HIGH

    Referencias


  • https://devolutions.net/security/advisories/DEVO-2025-0003/
  • Enviar en el boletín
    Off

    CVE-2025-27515

    CVE-2025-27515

    Título es
    CVE-2025-27515

    Mié, 05/03/2025 – 19:15

    Tipo
    CWE-155

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-27515

    Descripción en
    Laravel is a web application framework. When using wildcard validation to validate a given file or image field (`files.*`), a user-crafted malicious request could potentially bypass the validation rules. This vulnerability is fixed in 11.44.1 and 12.1.1.

    05/03/2025

    05/03/2025

    Vector CVSS:4.0
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

    Gravedad 4.0
    6.90

    Gravedad 4.0 txt
    MEDIUM

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://github.com/laravel/framework/commit/2d133034fefddfb047838f4caca3687a3ba811a5

  • https://github.com/laravel/framework/security/advisories/GHSA-78fx-h6xr-vch4
  • Enviar en el boletín
    Off

    CVE-2025-27513

    CVE-2025-27513

    Título es
    CVE-2025-27513

    Mié, 05/03/2025 – 19:15

    Tipo
    CWE-770

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-27513

    Descripción en
    OpenTelemetry dotnet is a dotnet telemetry framework. A vulnerability in OpenTelemetry.Api package 1.10.0 to 1.11.1 could cause a Denial of Service (DoS) when a tracestate and traceparent header is received. Even if an application does not explicitly use trace context propagation, receiving these headers can still trigger high CPU usage. This issue impacts any application accessible over the web or backend services that process HTTP requests containing a tracestate header. Application may experience excessive resource consumption, leading to increased latency, degraded performance, or downtime. This vulnerability is fixed in 1.11.2.

    05/03/2025

    05/03/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

    Gravedad 3.1 (CVSS 3.1 Base Score)
    7.50

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    HIGH

    Referencias


  • https://github.com/open-telemetry/opentelemetry-dotnet/commit/1b555c1201413f2f55f2cd3c4ba03ef4b615b6b5

  • https://github.com/open-telemetry/opentelemetry-dotnet/security/advisories/GHSA-8785-wc3w-h8q6
  • Enviar en el boletín
    Off

    CVE-2025-27517

    CVE-2025-27517

    Título es
    CVE-2025-27517

    Mié, 05/03/2025 – 20:16

    Tipo
    CWE-20

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-27517

    Descripción en
    Volt is an elegantly crafted functional API for Livewire. Malicious, user-crafted request payloads could potentially lead to remote code execution within Volt components. This vulnerability is fixed in 1.7.0.

    05/03/2025

    05/03/2025

    Vector CVSS:4.0
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

    Gravedad 4.0
    9.30

    Gravedad 4.0 txt
    CRITICAL

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://github.com/livewire/volt/security/advisories/GHSA-v69f-5jxm-hwvv
  • Enviar en el boletín
    Off

    CVE-2024-51144

    CVE-2024-51144

    Título es
    CVE-2024-51144

    Mié, 05/03/2025 – 20:16

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2024-51144

    Descripción en
    Cross Site Request Forgery (CSRF) vulnerability exists in the 'pvmsg.php?action=add_message', pvmsg.php?action=confirm_delete , and ajax.server.php?page=user&action=flip_follow endpoints in Ampache

    05/03/2025

    05/03/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://github.com/ampache/ampache

  • https://nitipoom-jar.github.io/CVE-2024-51144/
  • Enviar en el boletín
    Off

    CVE-2025-22212

    CVE-2025-22212

    Título es
    CVE-2025-22212

    Mié, 05/03/2025 – 16:15

    Tipo
    CWE-89

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-22212

    Descripción en
    A SQL injection vulnerability in the ConvertForms component versions 1.0.0-1.0.0 – 4.4.9 for Joomla allows authenticated attackers (administrator) to execute arbitrary SQL commands in the submission management area in backend.

    05/03/2025

    05/03/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N

    Gravedad 3.1 (CVSS 3.1 Base Score)
    2.70

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    LOW

    Referencias


  • https://github.com/AdamWallwork/CVEs/tree/main/2025/CVE-2025-22212

  • https://www.tassos.gr/
  • Enviar en el boletín
    Off