CVE-2025-26600

CVE-2025-26600

Título es
CVE-2025-26600

Mar, 25/02/2025 – 16:15

Tipo
CWE-416

Gravedad 2.0 Txt
Pendiente de análisis

Título en

CVE-2025-26600

Descripción en
A use-after-free flaw was found in X.Org and Xwayland. When a device is removed while still frozen, the events queued for that device remain while the device is freed. Replaying the events will cause a use-after-free.

25/02/2025

25/02/2025

Vector CVSS:3.1
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Gravedad 3.1 (CVSS 3.1 Base Score)
7.80

Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
HIGH

Referencias


  • https://access.redhat.com/security/cve/CVE-2025-26600

  • https://bugzilla.redhat.com/show_bug.cgi?id=2345252
  • Enviar en el boletín
    Off

    CVE-2025-26599

    CVE-2025-26599

    Título es
    CVE-2025-26599

    Mar, 25/02/2025 – 16:15

    Tipo
    CWE-824

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-26599

    Descripción en
    An access to an uninitialized pointer flaw was found in X.Org and Xwayland. The function compCheckRedirect() may fail if it cannot allocate the backing pixmap. In that case, compRedirectWindow() will return a BadAlloc error without validating the window tree marked just before, which leaves the validated data partly initialized and the use of an uninitialized pointer later.

    25/02/2025

    25/02/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

    Gravedad 3.1 (CVSS 3.1 Base Score)
    7.80

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    HIGH

    Referencias


  • https://access.redhat.com/security/cve/CVE-2025-26599

  • https://bugzilla.redhat.com/show_bug.cgi?id=2345253
  • Enviar en el boletín
    Off

    CVE-2025-1068

    CVE-2025-1068

    Título es
    CVE-2025-1068

    Mar, 25/02/2025 – 17:15

    Tipo
    CWE-426

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-1068

    Descripción en
    There is an untrusted search path vulnerability in Esri ArcGIS AllSource 1.2 and 1.3 that may allow a low privileged attacker with write privileges to the local file system to introduce a malicious executable to the filesystem. When the victim performs a specific action using ArcGIS AllSource, the file could execute and run malicious commands under the context of the victim.

    25/02/2025

    25/02/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

    Gravedad 3.1 (CVSS 3.1 Base Score)
    7.30

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    HIGH

    Referencias


  • https://www.esri.com/arcgis-blog/products/administration/administration/arcgis-pro-and-arcgis-allsource-patches-address-high-severity-vulnerabilities
  • Enviar en el boletín
    Off

    CVE-2025-1067

    CVE-2025-1067

    Título es
    CVE-2025-1067

    Mar, 25/02/2025 – 17:15

    Tipo
    CWE-732

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-1067

    Descripción en
    There is an untrusted search path vulnerability in Esri ArcGIS Pro 3.3 and 3.4 that may allow a low privileged attacker with write privileges to the local file system to introduce a malicious executable to the filesystem. When the victim performs a specific action using ArcGIS

    ArcGIS Pro

    , the file could execute and run malicious commands under the context of the victim.

    25/02/2025

    25/02/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

    Gravedad 3.1 (CVSS 3.1 Base Score)
    7.30

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    HIGH

    Referencias


  • https://www.esri.com/arcgis-blog/products/administration/administration/arcgis-pro-and-arcgis-allsource-patches-address-high-severity-vulnerabilities
  • Enviar en el boletín
    Off

    CVE-2025-1204

    CVE-2025-1204

    Título es
    CVE-2025-1204

    Mar, 25/02/2025 – 17:15

    Tipo
    CWE-912

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-1204

    Descripción en
    The "update" binary in the firmware of the affected product sends attempts to mount to a hard-coded, routable IP address, bypassing existing device network settings to do so. The function triggers if the 'C' button is pressed at a specific time during the boot process. If an attacker is able to control or impersonate this IP address, they could upload and overwrite files on the device.

    25/02/2025

    25/02/2025

    Vector CVSS:4.0
    CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

    Gravedad 4.0
    7.70

    Gravedad 4.0 txt
    HIGH

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://claroty.com/team82/research/are-contec-cms8000-patient-monitors-infected-with-a-chinese-backdoor-the-reality-is-more-complicated?ref=vault33.org

  • https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-030-01
  • Enviar en el boletín
    Off

    CVE-2024-51539

    CVE-2024-51539

    Título es
    CVE-2024-51539

    Mar, 25/02/2025 – 14:15

    Tipo
    CWE-89

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2024-51539

    Descripción en
    The Dell Secure Connect Gateway (SCG) Application and Appliance, versions prior to 5.28, contains a SQL injection vulnerability due to improper neutralization of special elements used in an SQL command. This vulnerability can only be exploited locally on the affected system. A high-privilege attacker with access to the system could potentially exploit this vulnerability, leading to the disclosure of non-sensitive information that does not include any customer data.

    25/02/2025

    25/02/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N

    Gravedad 3.1 (CVSS 3.1 Base Score)
    2.30

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    LOW

    Referencias


  • https://www.dell.com/support/kbdoc/en-us/000289550/dsa-2024-464-security-update-for-dell-secure-connect-gateway-application-and-appliance-vulnerability
  • Enviar en el boletín
    Off

    CVE-2023-25574

    CVE-2023-25574

    Título es
    CVE-2023-25574

    Mar, 25/02/2025 – 15:15

    Tipo
    CWE-347

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2023-25574

    Descripción en
    `jupyterhub-ltiauthenticator` is a JupyterHub authenticator for learning tools interoperability (LTI). LTI13Authenticator that was introduced in `jupyterhub-ltiauthenticator` 1.3.0 wasn't validating JWT signatures. This is believed to allow the LTI13Authenticator to authorize a forged request. Only users that has configured a JupyterHub installation to use the authenticator class `LTI13Authenticator` are affected. `jupyterhub-ltiauthenticator` version 1.4.0 removes LTI13Authenticator to address the issue. No known workarounds are available.

    25/02/2025

    25/02/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

    Gravedad 3.1 (CVSS 3.1 Base Score)
    10.00

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    CRITICAL

    Referencias


  • https://github.com/jupyterhub/ltiauthenticator/blob/3feec2e81b9d3b0ad6b58ab4226af640833039f3/ltiauthenticator/lti13/validator.py#L122-L164

  • https://github.com/jupyterhub/ltiauthenticator/blob/main/CHANGELOG.md#140—2023-03-01

  • https://github.com/jupyterhub/ltiauthenticator/security/advisories/GHSA-mcgx-2gcr-p3hp
  • Enviar en el boletín
    Off

    CVE-2024-34035

    CVE-2024-34035

    Título es
    CVE-2024-34035

    Mar, 25/02/2025 – 15:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2024-34035

    Descripción en
    An issue was discovered in O-RAN Near Realtime RIC H-Release. To trigger the crashing of the e2mgr, an adversary must flood the system with a significant quantity of E2 Subscription Requests originating from an xApp.

    25/02/2025

    25/02/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://gist.github.com/fklement/3a43dbb9fb361dddd8db7703080ade0f

  • https://jira.o-ran-sc.org/browse/RIC-1056
  • Enviar en el boletín
    Off

    CVE-2024-34034

    CVE-2024-34034

    Título es
    CVE-2024-34034

    Mar, 25/02/2025 – 15:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2024-34034

    Descripción en
    An issue was discovered in FlexRIC 2.0.0. It crashes during a Subscription Request denial-of-service (DoS) attack, triggered by an assertion error. An attacker must send a high number of E42 Subscription Requests to the Near-RT RIC component.

    25/02/2025

    25/02/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://gist.github.com/fklement/3a43dbb9fb361dddd8db7703080ade0f

  • https://gitlab.eurecom.fr/mosaic5g/flexric/-/tags/v2.0.0
  • Enviar en el boletín
    Off

    CVE-2024-12424

    CVE-2024-12424

    Título es
    CVE-2024-12424

    Mar, 25/02/2025 – 15:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2024-12424

    Descripción en
    Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2025-24592. Reason: This candidate is a reservation duplicate of CVE-2025-24592. Notes: All CVE users should reference CVE-2025-24592 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

    25/02/2025

    25/02/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Enviar en el boletín
    Off