Auto-Update: 2025-06-09T14:00:20.314095+00:00

This commit is contained in:
cad-safe-bot 2025-06-09 14:03:59 +00:00
parent 0f5149027a
commit 77e0825747
174 changed files with 2333 additions and 505 deletions

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-13087",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2025-06-06T16:15:22.573",
"lastModified": "2025-06-06T16:15:22.573",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A command injection vulnerability has been reported to affect QHora. If an attacker gains local network access who have also gained an administrator account, they can then exploit the vulnerability to execute arbitrary commands.\n\nWe have already fixed the vulnerability in the following version:\nQuRouter 2.4.6.028 and later"
},
{
"lang": "es",
"value": "Se ha reportado una vulnerabilidad de inyecci\u00f3n de comandos que afecta a QHora. Si un atacante obtiene acceso a la red local y tambi\u00e9n ha obtenido una cuenta de administrador, puede explotar la vulnerabilidad para ejecutar comandos arbitrarios. Ya hemos corregido la vulnerabilidad en la siguiente versi\u00f3n: QuRouter 2.4.6.028 y posteriores."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-13088",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2025-06-06T16:15:23.323",
"lastModified": "2025-06-06T16:15:23.323",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An improper authentication vulnerability has been reported to affect QHora. If an attacker gains local network access, they can then exploit the vulnerability to compromise the security of the system.\n\nWe have already fixed the vulnerability in the following version:\nQuRouter 2.5.0.140 and later"
},
{
"lang": "es",
"value": "Se ha reportado una vulnerabilidad de autenticaci\u00f3n incorrecta que afecta a QHora. Si un atacante obtiene acceso a la red local, puede explotar la vulnerabilidad para comprometer la seguridad del sistema. Ya hemos corregido la vulnerabilidad en la siguiente versi\u00f3n: QuRouter 2.5.0.140 y posteriores."
}
],
"metrics": {

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-42367",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-12T13:38:34.240",
"lastModified": "2024-08-12T13:41:36.517",
"lastModified": "2025-06-09T13:15:21.623",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.10.2, static routes which contain files with compressed variants (`.gz` or `.br` extension) are vulnerable to path traversal outside the root directory if those variants are symbolic links. The server protects static routes from path traversal outside the root directory when `follow_symlinks=False` (default). It does this by resolving the requested URL to an absolute path and then checking that path relative to the root. However, these checks are not performed when looking for compressed variants in the `FileResponse` class, and symbolic links are then automatically followed when performing the `Path.stat()` and `Path.open()` to send the file. Version 3.10.2 contains a patch for the issue."
"value": "aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In versions on the 3.10 branch prior to version 3.10.2, static routes which contain files with compressed variants (`.gz` or `.br` extension) are vulnerable to path traversal outside the root directory if those variants are symbolic links. The server protects static routes from path traversal outside the root directory when `follow_symlinks=False` (default). It does this by resolving the requested URL to an absolute path and then checking that path relative to the root. However, these checks are not performed when looking for compressed variants in the `FileResponse` class, and symbolic links are then automatically followed when performing the `Path.stat()` and `Path.open()` to send the file. Version 3.10.2 contains a patch for the issue."
},
{
"lang": "es",

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-50406",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2025-06-06T16:15:23.500",
"lastModified": "2025-06-06T16:15:23.500",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A cross-site scripting (XSS) vulnerability has been reported to affect License Center. If exploited, the vulnerability could allow remote attackers who have gained user access to bypass security mechanisms or read application data.\n\nWe have already fixed the vulnerability in the following version:\nLicense Center 1.9.49 and later"
},
{
"lang": "es",
"value": "Se ha informado de una vulnerabilidad de Cross Site Scripting (XSS) que afecta a License Center. Si se explota, esta vulnerabilidad podr\u00eda permitir a atacantes remotos con acceso de usuario eludir mecanismos de seguridad o leer datos de la aplicaci\u00f3n. Ya hemos corregido la vulnerabilidad en la siguiente versi\u00f3n: License Center 1.9.49 y posteriores."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-55585",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-07T19:15:22.333",
"lastModified": "2025-06-07T20:15:23.417",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the moPS App through 1.8.618, all users can access administrative API endpoints without additional authentication, resulting in unrestricted read and write access, as demonstrated by /api/v1/users/resetpassword."
},
{
"lang": "es",
"value": "En moPS App hasta la versi\u00f3n 1.8.618, todos los usuarios pueden acceder a los endpoints de la API administrativa sin autenticaci\u00f3n adicional, lo que da como resultado un acceso de lectura y escritura sin restricciones, como lo demuestra /api/v1/users/resetpassword."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-56805",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2025-06-06T16:15:23.660",
"lastModified": "2025-06-06T16:15:23.660",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A buffer overflow vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained user access to modify memory or crash processes.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.4.3079 build 20250321 and later\nQuTS hero h5.2.4.3079 build 20250321 and later"
},
{
"lang": "es",
"value": "Se ha reportado una vulnerabilidad de desbordamiento de b\u00fafer que afecta a varias versiones del sistema operativo QNAP. Si se explota, esta vulnerabilidad podr\u00eda permitir a atacantes remotos con acceso de usuario modificar la memoria o bloquear procesos. Ya hemos corregido la vulnerabilidad en las siguientes versiones: QTS 5.2.4.3079, compilaci\u00f3n 20250321 y posteriores; QuTS hero h5.2.4.3079, compilaci\u00f3n 20250321 y posteriores."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-9993",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-06-07T12:15:21.360",
"lastModified": "2025-06-07T12:15:21.360",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Essential Addons for Elementor \u2013 Best Elementor Addon, Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the eael_event_details_text parameter of Event Calendar Widget in all versions up to, and including, 6.1.12 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "Los complementos Essential Addons for Elementor \u2013 Best Elementor Addon, Templates, Widgets, Kits & WooCommerce Builders para WordPress son vulnerables a Cross Site Scripting Almacenado a trav\u00e9s del par\u00e1metro eael_event_details_text del widget Calendario de eventos en todas las versiones hasta la 6.1.12 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite a atacantes autenticados, con acceso de colaborador o superior, inyectar scripts web arbitrarios en las p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a la p\u00e1gina inyectada."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-9994",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-06-07T12:15:22.963",
"lastModified": "2025-06-07T12:15:22.963",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Essential Addons for Elementor \u2013 Best Elementor Addon, Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the eael_pricing_item_tooltip_content parameter of the Pricing Table Widget in all versions up to, and including, 6.1.12 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "Los complementos Essential Addons for Elementor \u2013 Best Elementor Addon, Templates, Widgets, Kits & WooCommerce Builders para WordPress son vulnerables a Cross Site Scripting Almacenado a trav\u00e9s del par\u00e1metro eael_pricing_item_tooltip_content del widget Tabla de precios en todas las versiones hasta la 6.1.12 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite a atacantes autenticados, con acceso de colaborador o superior, inyectar scripts web arbitrarios en las p\u00e1ginas que se ejecutar\u00e1n al acceder a ellas."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-0620",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-06-06T14:15:21.247",
"lastModified": "2025-06-06T14:15:21.247",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in Samba. The smbd service daemon does not pick up group membership changes when re-authenticating an expired SMB session. This issue can expose file shares until clients disconnect and then connect again."
},
{
"lang": "es",
"value": "Se detect\u00f3 una falla en Samba. El demonio de servicio smbd no detecta los cambios en la membres\u00eda de grupo al volver a autenticar una sesi\u00f3n SMB expirada. Este problema puede exponer los recursos compartidos de archivos hasta que los clientes se desconecten y se vuelvan a conectar."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-20063",
"sourceIdentifier": "scy@openharmony.io",
"published": "2025-06-08T12:15:20.493",
"lastModified": "2025-06-08T12:15:20.493",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21082",
"sourceIdentifier": "scy@openharmony.io",
"published": "2025-06-08T12:15:21.433",
"lastModified": "2025-06-08T12:15:21.433",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-22481",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2025-06-06T16:15:23.877",
"lastModified": "2025-06-06T16:15:23.877",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained user access to execute arbitrary commands.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.4.3079 build 20250321 and later\nQuTS hero h5.2.4.3079 build 20250321 and later"
},
{
"lang": "es",
"value": "Se ha reportado una vulnerabilidad de inyecci\u00f3n de comandos que afecta a varias versiones del sistema operativo QNAP. Si se explota, esta vulnerabilidad podr\u00eda permitir que atacantes remotos con acceso de usuario ejecuten comandos arbitrarios. Ya hemos corregido la vulnerabilidad en las siguientes versiones: QTS 5.2.4.3079, compilaci\u00f3n 20250321 y posteriores; QuTS hero h5.2.4.3079, compilaci\u00f3n 20250321 y posteriores."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-22482",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2025-06-06T16:15:24.023",
"lastModified": "2025-06-06T16:15:24.023",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A use of externally-controlled format string vulnerability has been reported to affect Qsync Central. If exploited, the vulnerability could allow remote attackers who have gained user access to obtain secret data or modify memory.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 4.5.0.6 ( 2025/03/20 ) and later"
},
{
"lang": "es",
"value": "Se ha informado de una vulnerabilidad relacionada con el uso de cadenas de formato controladas externamente que afecta a Qsync Central. Si se explota, esta vulnerabilidad podr\u00eda permitir a atacantes remotos con acceso de usuario obtener datos secretos o modificar la memoria. Ya hemos corregido la vulnerabilidad en la siguiente versi\u00f3n: Qsync Central 4.5.0.6 (20/03/2025) y posteriores."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-22484",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2025-06-06T16:15:24.187",
"lastModified": "2025-06-06T16:15:24.187",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An allocation of resources without limits or throttling vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to prevent other systems, applications, or processes from accessing the same type of resource.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.4847 and later"
},
{
"lang": "es",
"value": "Se ha informado de una vulnerabilidad de asignaci\u00f3n de recursos sin l\u00edmites o de limitaci\u00f3n que afecta a File Station 5. Si un atacante remoto obtiene una cuenta de usuario, puede explotar la vulnerabilidad para impedir que otros sistemas, aplicaciones o procesos accedan al mismo tipo de recurso. Ya hemos corregido la vulnerabilidad en la siguiente versi\u00f3n: File Station 5 5.5.6.4847 y posteriores."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-22486",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2025-06-06T16:15:24.330",
"lastModified": "2025-06-06T16:15:24.330",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An improper certificate validation vulnerability has been reported to affect File Station 5. If exploited, the vulnerability could allow remote attackers who have gained user access to compromise the security of the system.\n\nWe have already fixed the vulnerability in the following versions:\nFile Station 5 5.5.6.4791 and later\n and later"
},
{
"lang": "es",
"value": "Se ha informado de una vulnerabilidad de validaci\u00f3n incorrecta de certificados que afecta a File Station 5. Si se explota, esta vulnerabilidad podr\u00eda permitir que atacantes remotos con acceso de usuario comprometan la seguridad del sistema. Ya hemos corregido la vulnerabilidad en las siguientes versiones: File Station 5 5.5.6.4791 y posteriores."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-22490",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2025-06-06T16:15:24.487",
"lastModified": "2025-06-06T16:15:24.487",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A NULL pointer dereference vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.4847 and later"
},
{
"lang": "es",
"value": "Se ha informado de una vulnerabilidad de desreferencia de puntero nulo que afecta a File Station 5. Si un atacante remoto obtiene una cuenta de usuario, puede explotar la vulnerabilidad para lanzar un ataque de denegaci\u00f3n de servicio (DoS). Ya hemos corregido la vulnerabilidad en la siguiente versi\u00f3n: File Station 5 5.5.6.4847 y posteriores."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-23235",
"sourceIdentifier": "scy@openharmony.io",
"published": "2025-06-08T12:15:21.590",
"lastModified": "2025-06-08T12:15:21.590",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-24493",
"sourceIdentifier": "scy@openharmony.io",
"published": "2025-06-08T12:15:21.763",
"lastModified": "2025-06-08T12:15:21.763",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-25207",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-06-09T06:15:24.413",
"lastModified": "2025-06-09T06:15:24.413",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-25208",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-06-09T06:15:24.667",
"lastModified": "2025-06-09T06:15:24.667",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-25209",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-06-09T06:15:24.853",
"lastModified": "2025-06-09T06:15:24.853",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-25217",
"sourceIdentifier": "scy@openharmony.io",
"published": "2025-06-08T12:15:21.933",
"lastModified": "2025-06-08T12:15:21.933",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-26691",
"sourceIdentifier": "scy@openharmony.io",
"published": "2025-06-08T12:15:22.093",
"lastModified": "2025-06-08T12:15:22.093",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-26693",
"sourceIdentifier": "scy@openharmony.io",
"published": "2025-06-08T12:15:22.260",
"lastModified": "2025-06-08T12:15:22.260",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-27131",
"sourceIdentifier": "scy@openharmony.io",
"published": "2025-06-08T12:15:22.423",
"lastModified": "2025-06-08T12:15:22.423",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-27242",
"sourceIdentifier": "scy@openharmony.io",
"published": "2025-06-08T12:15:22.583",
"lastModified": "2025-06-08T12:15:22.583",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-27247",
"sourceIdentifier": "scy@openharmony.io",
"published": "2025-06-08T12:15:22.733",
"lastModified": "2025-06-08T12:15:22.733",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-27531",
"sourceIdentifier": "security@apache.org",
"published": "2025-06-06T15:15:23.883",
"lastModified": "2025-06-06T15:15:23.883",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Deserialization of Untrusted Data vulnerability in Apache InLong.\u00a0\n\nThis issue affects Apache InLong: from 1.13.0 before 2.1.0, \n\nthis issue would allow an authenticated attacker to read arbitrary files\u00a0by double writing the param.\n\n\n\n\n\nUsers are recommended to upgrade to version 2.1.0, which fixes the issue."
},
{
"lang": "es",
"value": "Vulnerabilidad de deserializaci\u00f3n de datos no confiables en Apache InLong. Este problema afecta a Apache InLong: desde la versi\u00f3n 1.13.0 hasta la 2.1.0, este problema permit\u00eda a un atacante autenticado leer archivos arbitrarios mediante la escritura duplicada del par\u00e1metro. Se recomienda a los usuarios actualizar a la versi\u00f3n 2.1.0, que soluciona el problema."
}
],
"metrics": {},

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-27563",
"sourceIdentifier": "scy@openharmony.io",
"published": "2025-06-08T12:15:22.917",
"lastModified": "2025-06-08T12:15:22.917",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-27709",
"sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02",
"published": "2025-06-09T11:15:20.807",
"lastModified": "2025-06-09T11:15:20.807",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-2766",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-06T19:15:26.930",
"lastModified": "2025-06-06T19:15:26.930",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "70mai A510 Use of Default Password Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of 70mai A510. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the default configuration of user accounts. The configuration contains default password. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of the root. Was ZDI-CAN-24996."
},
{
"lang": "es",
"value": "Vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n por contrase\u00f1a predeterminada en 70mai A510. Esta vulnerabilidad permite a atacantes adyacentes a la red omitir la autenticaci\u00f3n en las instalaciones afectadas de 70mai A510. No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica se encuentra en la configuraci\u00f3n predeterminada de las cuentas de usuario. Esta configuraci\u00f3n contiene la contrase\u00f1a predeterminada. Un atacante puede aprovechar esta vulnerabilidad para omitir la autenticaci\u00f3n y ejecutar c\u00f3digo arbitrario en el contexto de la ra\u00edz. Era ZDI-CAN-24996."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-29871",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2025-06-06T16:15:24.637",
"lastModified": "2025-06-06T16:15:24.637",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds read vulnerability has been reported to affect File Station 5. If a local attacker gains an administrator account, they can then exploit the vulnerability to obtain secret data.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.4847 and later"
},
{
"lang": "es",
"value": "Se ha informado de una vulnerabilidad de lectura fuera de los l\u00edmites que afecta a File Station 5. Si un atacante local obtiene una cuenta de administrador, puede explotar la vulnerabilidad para obtener datos confidenciales. Ya hemos corregido la vulnerabilidad en la siguiente versi\u00f3n: File Station 5 5.5.6.4847 y posteriores."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-29872",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2025-06-06T16:15:24.803",
"lastModified": "2025-06-06T16:15:24.803",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An allocation of resources without limits or throttling vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to prevent other systems, applications, or processes from accessing the same type of resource.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.4847 and later"
},
{
"lang": "es",
"value": "Se ha informado de una vulnerabilidad de asignaci\u00f3n de recursos sin l\u00edmites o de limitaci\u00f3n que afecta a File Station 5. Si un atacante remoto obtiene una cuenta de usuario, puede explotar la vulnerabilidad para impedir que otros sistemas, aplicaciones o procesos accedan al mismo tipo de recurso. Ya hemos corregido la vulnerabilidad en la siguiente versi\u00f3n: File Station 5 5.5.6.4847 y posteriores."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-29873",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2025-06-06T16:15:24.950",
"lastModified": "2025-06-06T16:15:24.950",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A NULL pointer dereference vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.4847 and later"
},
{
"lang": "es",
"value": "Se ha informado de una vulnerabilidad de desreferencia de puntero nulo que afecta a File Station 5. Si un atacante remoto obtiene una cuenta de usuario, puede explotar la vulnerabilidad para lanzar un ataque de denegaci\u00f3n de servicio (DoS). Ya hemos corregido la vulnerabilidad en la siguiente versi\u00f3n: File Station 5 5.5.6.4847 y posteriores."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-29876",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2025-06-06T16:15:25.090",
"lastModified": "2025-06-06T16:15:25.090",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A NULL pointer dereference vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.4847 and later"
},
{
"lang": "es",
"value": "Se ha informado de una vulnerabilidad de desreferencia de puntero nulo que afecta a File Station 5. Si un atacante remoto obtiene una cuenta de usuario, puede explotar la vulnerabilidad para lanzar un ataque de denegaci\u00f3n de servicio (DoS). Ya hemos corregido la vulnerabilidad en la siguiente versi\u00f3n: File Station 5 5.5.6.4847 y posteriores."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-29877",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2025-06-06T16:15:25.230",
"lastModified": "2025-06-06T16:15:25.230",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A NULL pointer dereference vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.4847 and later"
},
{
"lang": "es",
"value": "Se ha informado de una vulnerabilidad de desreferencia de puntero nulo que afecta a File Station 5. Si un atacante remoto obtiene una cuenta de usuario, puede explotar la vulnerabilidad para lanzar un ataque de denegaci\u00f3n de servicio (DoS). Ya hemos corregido la vulnerabilidad en la siguiente versi\u00f3n: File Station 5 5.5.6.4847 y posteriores."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-29883",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2025-06-06T16:15:25.370",
"lastModified": "2025-06-06T16:15:25.370",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An improper certificate validation vulnerability has been reported to affect File Station 5. If exploited, the vulnerability could allow remote attackers who have gained user access to compromise the security of the system.\n\nWe have already fixed the vulnerability in the following versions:\nFile Station 5 5.5.6.4791 and later\n and later"
},
{
"lang": "es",
"value": "Se ha informado de una vulnerabilidad de validaci\u00f3n incorrecta de certificados que afecta a File Station 5. Si se explota, esta vulnerabilidad podr\u00eda permitir que atacantes remotos con acceso de usuario comprometan la seguridad del sistema. Ya hemos corregido la vulnerabilidad en las siguientes versiones: File Station 5 5.5.6.4791 y posteriores."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-29884",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2025-06-06T16:15:25.510",
"lastModified": "2025-06-06T16:15:25.510",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An improper certificate validation vulnerability has been reported to affect File Station 5. If exploited, the vulnerability could allow remote attackers who have gained user access to compromise the security of the system.\n\nWe have already fixed the vulnerability in the following versions:\nFile Station 5 5.5.6.4791 and later\n and later"
},
{
"lang": "es",
"value": "Se ha informado de una vulnerabilidad de validaci\u00f3n incorrecta de certificados que afecta a File Station 5. Si se explota, esta vulnerabilidad podr\u00eda permitir que atacantes remotos con acceso de usuario comprometan la seguridad del sistema. Ya hemos corregido la vulnerabilidad en las siguientes versiones: File Station 5 5.5.6.4791 y posteriores."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-29885",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2025-06-06T16:15:25.643",
"lastModified": "2025-06-06T16:15:25.643",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An improper certificate validation vulnerability has been reported to affect File Station 5. If exploited, the vulnerability could allow remote attackers who have gained user access to compromise the security of the system.\n\nWe have already fixed the vulnerability in the following versions:\nFile Station 5 5.5.6.4791 and later\n and later"
},
{
"lang": "es",
"value": "Se ha informado de una vulnerabilidad de validaci\u00f3n incorrecta de certificados que afecta a File Station 5. Si se explota, esta vulnerabilidad podr\u00eda permitir que atacantes remotos con acceso de usuario comprometan la seguridad del sistema. Ya hemos corregido la vulnerabilidad en las siguientes versiones: File Station 5 5.5.6.4791 y posteriores."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-29892",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2025-06-06T16:15:25.783",
"lastModified": "2025-06-06T16:15:25.783",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An SQL injection vulnerability has been reported to affect Qsync Central. If exploited, the vulnerability could allow remote attackers who have gained user access to execute unauthorized code or commands.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 4.5.0.6 ( 2025/03/20 ) and later"
},
{
"lang": "es",
"value": "Se ha reportado una vulnerabilidad de inyecci\u00f3n SQL que afecta a Qsync Central. Si se explota, esta vulnerabilidad podr\u00eda permitir que atacantes remotos con acceso de usuario ejecuten c\u00f3digo o comandos no autorizados. Ya hemos corregido la vulnerabilidad en la siguiente versi\u00f3n: Qsync Central 4.5.0.6 (20/03/2025) y posteriores."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-30279",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2025-06-06T16:15:26.030",
"lastModified": "2025-06-06T16:15:26.030",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An improper certificate validation vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to compromise the security of the system.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.4847 and later"
},
{
"lang": "es",
"value": "Se ha informado de una vulnerabilidad de validaci\u00f3n incorrecta de certificados que afecta a File Station 5. Si un atacante remoto obtiene una cuenta de usuario, puede explotar la vulnerabilidad para comprometer la seguridad del sistema. Ya hemos corregido la vulnerabilidad en la siguiente versi\u00f3n: File Station 5 5.5.6.4847 y posteriores."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-32455",
"sourceIdentifier": "cve@takeonme.org",
"published": "2025-06-08T21:15:30.993",
"lastModified": "2025-06-08T21:15:30.993",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-32456",
"sourceIdentifier": "cve@takeonme.org",
"published": "2025-06-08T21:15:31.267",
"lastModified": "2025-06-08T21:15:31.267",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-32457",
"sourceIdentifier": "cve@takeonme.org",
"published": "2025-06-08T21:15:31.403",
"lastModified": "2025-06-08T21:15:31.403",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-32458",
"sourceIdentifier": "cve@takeonme.org",
"published": "2025-06-08T21:15:31.537",
"lastModified": "2025-06-08T21:15:31.537",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-32459",
"sourceIdentifier": "cve@takeonme.org",
"published": "2025-06-08T21:15:31.673",
"lastModified": "2025-06-08T21:15:31.673",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-33031",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2025-06-06T16:15:28.203",
"lastModified": "2025-06-06T16:15:28.203",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An improper certificate validation vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to compromise the security of the system.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.4847 and later"
},
{
"lang": "es",
"value": "Se ha informado de una vulnerabilidad de validaci\u00f3n incorrecta de certificados que afecta a File Station 5. Si un atacante remoto obtiene una cuenta de usuario, puede explotar la vulnerabilidad para comprometer la seguridad del sistema. Ya hemos corregido la vulnerabilidad en la siguiente versi\u00f3n: File Station 5 5.5.6.4847 y posteriores."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-33035",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2025-06-06T16:15:28.353",
"lastModified": "2025-06-06T16:15:28.353",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A path traversal vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to read the contents of unexpected files or system data.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.4847 and later"
},
{
"lang": "es",
"value": "Se ha informado de una vulnerabilidad de path traversal que afecta a File Station 5. Si un atacante remoto obtiene una cuenta de usuario, puede explotar la vulnerabilidad para leer el contenido de archivos o datos del sistema inesperados. Ya hemos corregido la vulnerabilidad en la siguiente versi\u00f3n: File Station 5 5.5.6.4847 y posteriores."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-3459",
"sourceIdentifier": "cve@takeonme.org",
"published": "2025-06-08T21:15:32.770",
"lastModified": "2025-06-08T21:15:32.770",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-3460",
"sourceIdentifier": "cve@takeonme.org",
"published": "2025-06-08T21:15:32.900",
"lastModified": "2025-06-08T21:15:32.900",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-3461",
"sourceIdentifier": "cve@takeonme.org",
"published": "2025-06-08T21:15:33.030",
"lastModified": "2025-06-08T21:15:33.030",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-3485",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-06T19:15:27.140",
"lastModified": "2025-06-06T19:15:27.140",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Allegra extractFileFromZip Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Allegra. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of the extractFileFromZip method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26524."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo Directory Traversal en Allegra extractFileFromZip. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de Allegra. Se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica se encuentra en la implementaci\u00f3n del m\u00e9todo extractFileFromZip. El problema se debe a la falta de validaci\u00f3n adecuada de una ruta proporcionada por el usuario antes de usarla en operaciones con archivos. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-26524."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-35004",
"sourceIdentifier": "cve@takeonme.org",
"published": "2025-06-08T21:15:31.807",
"lastModified": "2025-06-08T21:15:31.807",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-35005",
"sourceIdentifier": "cve@takeonme.org",
"published": "2025-06-08T21:15:31.947",
"lastModified": "2025-06-08T21:15:31.947",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-35006",
"sourceIdentifier": "cve@takeonme.org",
"published": "2025-06-08T21:15:32.087",
"lastModified": "2025-06-08T21:15:32.087",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-35007",
"sourceIdentifier": "cve@takeonme.org",
"published": "2025-06-08T21:15:32.227",
"lastModified": "2025-06-08T21:15:32.227",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-35008",
"sourceIdentifier": "cve@takeonme.org",
"published": "2025-06-08T21:15:32.363",
"lastModified": "2025-06-08T21:15:32.363",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-35009",
"sourceIdentifier": "cve@takeonme.org",
"published": "2025-06-08T21:15:32.500",
"lastModified": "2025-06-08T21:15:32.500",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-35010",
"sourceIdentifier": "cve@takeonme.org",
"published": "2025-06-08T21:15:32.633",
"lastModified": "2025-06-08T21:15:32.633",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-3501",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-04-29T21:15:51.523",
"lastModified": "2025-05-02T13:53:40.163",
"lastModified": "2025-06-09T13:15:22.493",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -60,6 +60,10 @@
"url": "https://access.redhat.com/errata/RHSA-2025:4336",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:8672",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2025-3501",
"source": "secalert@redhat.com"

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-3581",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-06-09T06:15:25.067",
"lastModified": "2025-06-09T06:15:25.067",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-3582",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-06-09T06:15:25.200",
"lastModified": "2025-06-09T06:15:25.200",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-36528",
"sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02",
"published": "2025-06-09T11:15:21.773",
"lastModified": "2025-06-09T11:15:21.773",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-38001",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-06-06T14:15:22.183",
"lastModified": "2025-06-06T14:15:22.183",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: hfsc: Address reentrant enqueue adding class to eltree twice\n\nSavino says:\n \"We are writing to report that this recent patch\n (141d34391abbb315d68556b7c67ad97885407547) [1]\n can be bypassed, and a UAF can still occur when HFSC is utilized with\n NETEM.\n\n The patch only checks the cl->cl_nactive field to determine whether\n it is the first insertion or not [2], but this field is only\n incremented by init_vf [3].\n\n By using HFSC_RSC (which uses init_ed) [4], it is possible to bypass the\n check and insert the class twice in the eltree.\n Under normal conditions, this would lead to an infinite loop in\n hfsc_dequeue for the reasons we already explained in this report [5].\n\n However, if TBF is added as root qdisc and it is configured with a\n very low rate,\n it can be utilized to prevent packets from being dequeued.\n This behavior can be exploited to perform subsequent insertions in the\n HFSC eltree and cause a UAF.\"\n\nTo fix both the UAF and the infinite loop, with netem as an hfsc child,\ncheck explicitly in hfsc_enqueue whether the class is already in the eltree\nwhenever the HFSC_RSC flag is set.\n\n[1] https://web.git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=141d34391abbb315d68556b7c67ad97885407547\n[2] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L1572\n[3] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L677\n[4] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L1574\n[5] https://lore.kernel.org/netdev/8DuRWwfqjoRDLDmBMlIfbrsZg9Gx50DHJc1ilxsEBNe2D6NMoigR_eIRIG0LOjMc3r10nUUZtArXx4oZBIdUfZQrwjcQhdinnMis_0G7VEk=@willsroot.io/T/#u"
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net_sched: hfsc: Direcci\u00f3n de cola reentrante que a\u00f1ade clase a eltree dos veces. Savino afirma: \"Les escribimos para informarles que este parche reciente (141d34391abbb315d68556b7c67ad97885407547) [1] se puede omitir, y a\u00fan puede producirse una UAF cuando se utiliza HFSC con NETEM. El parche solo comprueba el campo cl->cl_nactive para determinar si es la primera inserci\u00f3n o no [2], pero este campo solo se incrementa con init_vf [3]. Al usar HFSC_RSC (que utiliza init_ed) [4], es posible omitir la comprobaci\u00f3n e insertar la clase dos veces en eltree. En condiciones normales, esto provocar\u00eda un bucle infinito en hfsc_dequeue por las razones que ya explicamos en este informe [5]. Sin embargo, si TBF se a\u00f1ade como qdisc ra\u00edz y es Configurado con una tasa muy baja, puede utilizarse para evitar que los paquetes se desencolan. Este comportamiento puede aprovecharse para realizar inserciones posteriores en el eltree de HFSC y provocar un UAF. Para solucionar tanto el UAF como el bucle infinito, con netem como elemento secundario de hfsc, compruebe expl\u00edcitamente en hfsc_enqueue si la clase ya est\u00e1 en el eltree cuando se activa el indicador HFSC_RSC. [1] https://web.git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=141d34391abbb315d68556b7c67ad97885407547 [2] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L1572 [3] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L677 [4] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L1574 [5] https://lore.kernel.org/netdev/8DuRWwfqjoRDLDmBMlIfbrsZg9Gx50DHJc1ilxsEBNe2D6NMoigR_eIRIG0LOjMc3r10nUUZtArXx4oZBIdUfZQrwjcQhdinnMis_0G7VEk=@willsroot.io/T/#u"
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-38002",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-06-06T14:15:22.313",
"lastModified": "2025-06-06T14:15:22.313",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/fdinfo: grab ctx->uring_lock around io_uring_show_fdinfo()\n\nNot everything requires locking in there, which is why the 'has_lock'\nvariable exists. But enough does that it's a bit unwieldy to manage.\nWrap the whole thing in a ->uring_lock trylock, and just return\nwith no output if we fail to grab it. The existing trylock() will\nalready have greatly diminished utility/output for the failure case.\n\nThis fixes an issue with reading the SQE fields, if the ring is being\nactively resized at the same time."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: io_uring/fdinfo: captura ctx->uring_lock en torno a io_uring_show_fdinfo(). No todo requiere bloqueo, raz\u00f3n por la cual existe la variable 'has_lock'. Sin embargo, suficientes requieren bloqueo como para que sea un poco dif\u00edcil de manejar. Envuelva todo en un trylock `->uring_lock` y simplemente devuelva sin salida si no logramos capturarlo. El trylock() existente ya tendr\u00e1 una utilidad/salida considerablemente reducida en caso de fallo. Esto soluciona un problema con la lectura de los campos SQE si el anillo se est\u00e1 redimensionando activamente al mismo tiempo."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-38003",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-06-08T11:15:20.990",
"lastModified": "2025-06-08T11:15:20.990",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: bcm: add missing rcu read protection for procfs content\n\nWhen the procfs content is generated for a bcm_op which is in the process\nto be removed the procfs output might show unreliable data (UAF).\n\nAs the removal of bcm_op's is already implemented with rcu handling this\npatch adds the missing rcu_read_lock() and makes sure the list entries\nare properly removed under rcu protection."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: can: bcm: a\u00f1adir protecci\u00f3n de lectura rcu faltante para el contenido de procfs. Cuando se genera el contenido de procfs para un bcm_op que se va a eliminar, la salida de procfs podr\u00eda mostrar datos no fiables (UAF). Dado que la eliminaci\u00f3n de bcm_op ya est\u00e1 implementada con la gesti\u00f3n de rcu, este parche a\u00f1ade el rcu_read_lock() faltante y garantiza que las entradas de la lista se eliminen correctamente bajo la protecci\u00f3n de rcu."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-38004",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-06-08T11:15:22.210",
"lastModified": "2025-06-08T11:15:22.210",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: bcm: add locking for bcm_op runtime updates\n\nThe CAN broadcast manager (CAN BCM) can send a sequence of CAN frames via\nhrtimer. The content and also the length of the sequence can be changed\nresp reduced at runtime where the 'currframe' counter is then set to zero.\n\nAlthough this appeared to be a safe operation the updates of 'currframe'\ncan be triggered from user space and hrtimer context in bcm_can_tx().\nAnderson Nascimento created a proof of concept that triggered a KASAN\nslab-out-of-bounds read access which can be prevented with a spin_lock_bh.\n\nAt the rework of bcm_can_tx() the 'count' variable has been moved into\nthe protected section as this variable can be modified from both contexts\ntoo."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: can: bcm: a\u00f1adir bloqueo para actualizaciones en tiempo de ejecuci\u00f3n de bcm_op El gestor de difusi\u00f3n CAN (CAN BCM) puede enviar una secuencia de tramas CAN a trav\u00e9s de hrtimer. El contenido y tambi\u00e9n la longitud de la secuencia se pueden cambiar o reducir en tiempo de ejecuci\u00f3n, donde el contador 'currframe' se establece entonces en cero. Aunque esto parec\u00eda ser una operaci\u00f3n segura, las actualizaciones de 'currframe' se pueden activar desde el espacio de usuario y el contexto de hrtimer en bcm_can_tx(). Anderson Nascimento cre\u00f3 una prueba de concepto que activ\u00f3 un acceso de lectura fuera de los l\u00edmites de KASAN slab que se puede prevenir con un spin_lock_bh. En la reelaboraci\u00f3n de bcm_can_tx() la variable 'count' se ha movido a la secci\u00f3n protegida ya que esta variable tambi\u00e9n se puede modificar desde ambos contextos."
}
],
"metrics": {},

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-3835",
"sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02",
"published": "2025-06-09T11:15:21.913",
"lastModified": "2025-06-09T11:15:21.913",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-39472",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-04-16T18:16:19.610",
"lastModified": "2025-04-17T20:21:48.243",
"lastModified": "2025-06-09T13:15:22.357",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in WPWeb WooCommerce Social Login allows Cross Site Request Forgery.This issue affects WooCommerce Social Login: from n/a through 2.8.2."
"value": "Cross-Site Request Forgery (CSRF) vulnerability in WPWeb WooCommerce Social Login allows Cross Site Request Forgery.This issue affects WooCommerce Social Login: from n/a before 2.8.3."
},
{
"lang": "es",
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-40668",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-06-09T13:15:22.633",
"lastModified": "2025-06-09T13:15:22.633",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect authorization vulnerability in TCMAN's GIM v11. This vulnerability allows an attacker, with low privilege level, to change the password of other users through a POST request using the parameters idUser, PasswordActual, PasswordNew and PasswordNewRepeat in /PC/WebService.aspx/validateChangePassword%C3%B1a. To exploit the vulnerability the PasswordActual parameter must be empty."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-tcman-gim-1",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-40669",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-06-09T13:15:22.803",
"lastModified": "2025-06-09T13:15:22.803",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect authorization vulnerability in TCMAN's GIM v11. This vulnerability allows an unprivileged attacker to modify the permissions held by each of the application's users, including the user himself by sending a POST request to /PC/Options.aspx?Command=2&Page=-1."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-tcman-gim-1",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-40670",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-06-09T13:15:22.963",
"lastModified": "2025-06-09T13:15:22.963",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect authorization vulnerability in TCMAN's GIM v11. This vulnerability allows an unprivileged attacker to create a user and assign it many privileges by sending a POST request to /PC/frmGestionUser.aspx/updateUser."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-tcman-gim-1",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-40675",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-06-09T10:15:25.190",
"lastModified": "2025-06-09T10:15:25.190",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-41437",
"sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02",
"published": "2025-06-09T11:15:22.053",
"lastModified": "2025-06-09T11:15:22.053",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-41444",
"sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02",
"published": "2025-06-09T12:15:21.240",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Zohocorp ManageEngine ADAudit Plus versions 8510 and prior are vulnerable to authenticated SQL injection in the alerts module."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "0fc0942c-577d-436f-ae8e-945763c79b02",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "0fc0942c-577d-436f-ae8e-945763c79b02",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.manageengine.com/products/active-directory-audit/cve-2025-41444.html",
"source": "0fc0942c-577d-436f-ae8e-945763c79b02"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-41646",
"sourceIdentifier": "info@cert.vde.com",
"published": "2025-06-06T15:15:26.183",
"lastModified": "2025-06-06T15:15:26.183",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An unauthorized remote attacker can bypass the authentication of the affected software package by misusing an incorrect type conversion. This leads to full compromise of the device"
},
{
"lang": "es",
"value": "Un atacante remoto no autorizado puede eludir la autenticaci\u00f3n del paquete de software afectado mediante el uso indebido de una conversi\u00f3n de tipo incorrecta. Esto conlleva la vulnerabilidad total del dispositivo."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-4652",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-06-09T06:15:25.740",
"lastModified": "2025-06-09T06:15:25.740",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-47601",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-06-07T05:15:24.213",
"lastModified": "2025-06-07T05:15:24.213",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Christiaan Pieterse MaxiBlocks allows Privilege Escalation.This issue affects MaxiBlocks: from n/a through 2.1.0."
},
{
"lang": "es",
"value": "La vulnerabilidad de autorizaci\u00f3n faltante en Christiaan Pieterse MaxiBlocks permite la escalada de privilegios. Este problema afecta a MaxiBlocks: desde n/a hasta 2.1.0."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-47711",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-06-09T06:15:25.320",
"lastModified": "2025-06-09T06:15:25.320",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-47712",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-06-09T06:15:25.537",
"lastModified": "2025-06-09T06:15:25.537",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-47950",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-06-06T18:15:35.330",
"lastModified": "2025-06-06T22:15:23.207",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CoreDNS is a DNS server that chains plugins. In versions prior to 1.12.2, a Denial of Service (DoS) vulnerability exists in the CoreDNS DNS-over-QUIC (DoQ) server implementation. The server previously created a new goroutine for every incoming QUIC stream without imposing any limits on the number of concurrent streams or goroutines. A remote, unauthenticated attacker could open a large number of streams, leading to uncontrolled memory consumption and eventually causing an Out Of Memory (OOM) crash \u2014 especially in containerized or memory-constrained environments. The patch in version 1.12.2 introduces two key mitigation mechanisms: `max_streams`, which caps the number of concurrent QUIC streams per connection with a default value of `256`; and `worker_pool_size`, which Introduces a server-wide, bounded worker pool to process incoming streams with a default value of `1024`. This eliminates the 1:1 stream-to-goroutine model and ensures that CoreDNS remains resilient under high concurrency. Some workarounds are available for those who are unable to upgrade. Disable QUIC support by removing or commenting out the `quic://` block in the Corefile, use container runtime resource limits to detect and isolate excessive memory usage, and/or monitor QUIC connection patterns and alert on anomalies."
},
{
"lang": "es",
"value": "CoreDNS es un servidor DNS que encadena complementos. En versiones anteriores a la 1.12.2, exist\u00eda una vulnerabilidad de denegaci\u00f3n de servicio (DoS) en la implementaci\u00f3n del servidor DNS sobre QUIC (DoQ) de CoreDNS. Anteriormente, el servidor creaba una nueva goroutine para cada flujo QUIC entrante sin imponer ning\u00fan l\u00edmite en el n\u00famero de flujos o goroutines simult\u00e1neos. Un atacante remoto no autenticado podr\u00eda abrir un gran n\u00famero de flujos, lo que provocar\u00eda un consumo de memoria descontrolado y, eventualmente, un fallo por falta de memoria (OOM), especialmente en entornos contenedorizados o con memoria limitada. El parche de la versi\u00f3n 1.12.2 introduce dos mecanismos clave de mitigaci\u00f3n: `max_streams`, que limita el n\u00famero de flujos QUIC simult\u00e1neos por conexi\u00f3n con un valor predeterminado de `256`; y `worker_pool_size`, que introduce un grupo de trabajadores limitado a nivel de servidor para procesar los flujos entrantes con un valor predeterminado de `1024`. Esto elimina el modelo 1:1 de flujo a go-rutina y garantiza la resiliencia de CoreDNS en condiciones de alta concurrencia. Existen soluciones alternativas para quienes no puedan actualizar. Desactive la compatibilidad con QUIC eliminando o comentando el bloque `quic://` en el Corefile, utilice los l\u00edmites de recursos del contenedor en tiempo de ejecuci\u00f3n para detectar y aislar el uso excesivo de memoria, o monitoree los patrones de conexi\u00f3n de QUIC y alerte sobre anomal\u00edas."
}
],
"metrics": {

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2025-48053",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-06-09T13:15:23.163",
"lastModified": "2025-06-09T13:15:23.163",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Discourse is an open-source discussion platform. Prior to version 3.4.4 of the `stable` branch, version 3.5.0.beta5 of the `beta` branch, and version 3.5.0.beta6-dev of the `tests-passed` branch, sending a malicious URL in a PM to a bot user can cause a reduced the availability of a Discourse instance. This issue is patched in version 3.4.4 of the `stable` branch, version 3.5.0.beta5 of the `beta` branch, and version 3.5.0.beta6-dev of the `tests-passed` branch. No known workarounds are available."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-400"
},
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [
{
"url": "https://github.com/discourse/discourse/security/advisories/GHSA-3q5q-qmrm-rvwx",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-48062",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-06-09T13:15:23.320",
"lastModified": "2025-06-09T13:15:23.320",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Discourse is an open-source discussion platform. Prior to version 3.4.4 of the `stable` branch, version 3.5.0.beta5 of the `beta` branch, and version 3.5.0.beta6-dev of the `tests-passed` branch, certain invites via email may result in HTML injection in the email body if the topic title includes HTML. This includes inviting someone (without an account) to a PM and inviting someone (without an account) to a topic with a custom message. This issue is patched in version 3.4.4 of the `stable` branch, version 3.5.0.beta5 of the `beta` branch, and version 3.5.0.beta6-dev of the `tests-passed` branch. This can be worked around if the relevant templates are overridden without `{topic_title}`."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-116"
}
]
}
],
"references": [
{
"url": "https://github.com/discourse/discourse/security/advisories/GHSA-x8mp-chx3-6x2p",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-48877",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-06-09T13:15:23.500",
"lastModified": "2025-06-09T13:15:23.500",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Discourse is an open-source discussion platform. Prior to version 3.4.4 of the `stable` branch, version 3.5.0.beta5 of the `beta` branch, and version 3.5.0.beta6-dev of the `tests-passed` branch, Codepen is present in the default `allowed_iframes` site setting, and it can potentially auto-run arbitrary JS in the iframe scope, which is unintended. This issue is patched in version 3.4.4 of the `stable` branch, version 3.5.0.beta5 of the `beta` branch, and version 3.5.0.beta6-dev of the `tests-passed` branch. As a workaround, the Codepen prefix can be removed from a site's `allowed_iframes`."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "UNREPORTED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1038"
}
]
}
],
"references": [
{
"url": "https://github.com/discourse/discourse/security/advisories/GHSA-cm93-6m2m-cjcv",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2025-49006",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-06-09T13:15:23.650",
"lastModified": "2025-06-09T13:15:23.650",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Wasp (Web Application Specification) is a Rails-like framework for React, Node.js, and Prisma. Prior to version 0.16.6, Wasp authentication has a vulnerability in the OAuth authentication implementation (affecting only Keycloak with a specific config). Wasp currently lowercases OAuth user IDs before storing / fetching them. This behavior violates OAuth and OpenID Connect specifications and can result in user impersonation, account collisions, and privilege escalation. In practice, out of the OAuth providers that Wasp auth supports, only Keycloak is affected. Keycloak uses a lowercase UUID by default, but users can configure it to be case sensitive, making it affected. Google, GitHub, and Discord use numerical IDs, making them not affected. Users should update their Wasp version to `0.16.6` which has a fix for the problematic behavior. Users using Keycloak can work around the issue by not using a case sensitive user ID in their realm configuration."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"references": [
{
"url": "https://github.com/wasp-lang/wasp/commit/433b9b7f491c172db656fb94cc85e5bd7d614b74",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/wasp-lang/wasp/security/advisories/GHSA-qvjc-6xv7-6v5f",
"source": "security-advisories@github.com"
},
{
"url": "https://wasp-lang.notion.site/PUB-Case-insensitive-OAuth-ID-vulnerability-20018a74854c8064a2bfebe4eaf5fceb",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-49011",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-06-06T18:15:35.497",
"lastModified": "2025-06-06T18:15:35.497",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SpiceDB is an open source database for storing and querying fine-grained authorization data. Prior to version 1.44.2, on schemas involving arrows with caveats on the arrow\u2019ed relation, when the path to resolve a CheckPermission request involves the evaluation of multiple caveated branches, requests may return a negative response when a positive response is expected. Version 1.44.2 fixes the issue. As a workaround, do not use caveats in the schema over an arrow\u2019ed relation."
},
{
"lang": "es",
"value": "SpiceDB es una base de datos de c\u00f3digo abierto para almacenar y consultar datos de autorizaci\u00f3n detallados. Antes de la versi\u00f3n 1.44.2, en esquemas con flechas y advertencias en la relaci\u00f3n con flechas, cuando la ruta para resolver una solicitud CheckPermission implica la evaluaci\u00f3n de varias ramas con advertencias, las solicitudes pod\u00edan devolver una respuesta negativa cuando se esperaba una positiva. La versi\u00f3n 1.44.2 soluciona este problema. Como soluci\u00f3n alternativa, no utilice advertencias en el esquema sobre una relaci\u00f3n con flechas."
}
],
"metrics": {

View File

@ -0,0 +1,80 @@
{
"id": "CVE-2025-49013",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-06-09T13:15:23.803",
"lastModified": "2025-06-09T13:15:23.803",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "WilderForge is a Wildermyth coremodding API. A critical vulnerability has been identified in multiple projects across the WilderForge organization. The issue arises from unsafe usage of `${{ github.event.review.body }}` and other user controlled variables directly inside shell script contexts in GitHub Actions workflows. This introduces a code injection vulnerability: a malicious actor submitting a crafted pull request review containing shell metacharacters or commands could execute arbitrary shell code on the GitHub Actions runner. This can lead to arbitrary command execution with the permissions of the workflow, potentially compromising CI infrastructure, secrets, and build outputs. Developers who maintain or contribute to the repos WilderForge/WilderForge, WilderForge/ExampleMod, WilderForge/WilderWorkspace, WilderForge/WildermythGameProvider, WilderForge/AutoSplitter, WilderForge/SpASM, WilderForge/thrixlvault, WilderForge/MassHash, and/or WilderForge/DLC_Disabler; as well as users who fork any of the above repositories and reuse affected GitHub Actions workflows, are affected. End users of any the above software and users who only install pre-built releases or artifacts are not affected. This vulnerability does not impact runtime behavior of the software or compiled outputs unless those outputs were produced during exploitation of this vulnerability. A current workaround is to disable GitHub Actions in affected repositories, or remove the affected workflows."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
},
{
"lang": "en",
"value": "CWE-95"
},
{
"lang": "en",
"value": "CWE-116"
}
]
}
],
"references": [
{
"url": "https://codeql.github.com/codeql-query-help/javascript/js-actions-command-injection",
"source": "security-advisories@github.com"
},
{
"url": "https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions#preventing-script-injection",
"source": "security-advisories@github.com"
},
{
"url": "https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions#understanding-the-risk-of-script-injection",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/WilderForge/WilderForge/security/advisories/GHSA-m6r3-c73x-8fw5",
"source": "security-advisories@github.com"
},
{
"url": "https://securitylab.github.com/research/github-actions-untrusted-input",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-49127",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-06-06T21:15:23.137",
"lastModified": "2025-06-06T21:15:23.137",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Kafbat UI is a web user interface for managing Apache Kafka clusters. An unsafe deserialization vulnerability in version 1.0.0 allows any unauthenticated user to execute arbitrary code on the server. Version 1.1.0 fixes the issue."
},
{
"lang": "es",
"value": "Kafbat UI es una interfaz de usuario web para administrar cl\u00fasteres de Apache Kafka. Una vulnerabilidad de deserializaci\u00f3n insegura en la versi\u00f3n 1.0.0 permite que cualquier usuario no autenticado ejecute c\u00f3digo arbitrario en el servidor. La versi\u00f3n 1.1.0 corrige el problema."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-49128",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-06-06T22:15:23.427",
"lastModified": "2025-06-06T22:15:23.427",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Jackson-core contains core low-level incremental (\"streaming\") parser and generator abstractions used by Jackson Data Processor. Starting in version 2.0.0 and prior to version 2.13.0, a flaw in jackson-core's `JsonLocation._appendSourceDesc` method allows up to 500 bytes of unintended memory content to be included in exception messages. When parsing JSON from a byte array with an offset and length, the exception message incorrectly reads from the beginning of the array instead of the logical payload start. This results in possible information disclosure in systems using pooled or reused buffers, like Netty or Vert.x. This issue was silently fixed in jackson-core version 2.13.0, released on September 30, 2021, via PR #652. All users should upgrade to version 2.13.0 or later. If upgrading is not immediately possible, applications can mitigate the issue by disabling exception message exposure to clients to avoid returning parsing exception messages in HTTP responses and/or disabling source inclusion in exceptions to prevent Jackson from embedding any source content in exception messages, avoiding leakage."
},
{
"lang": "es",
"value": "Jackson-core contiene abstracciones de analizador y generador incrementales (\"streaming\") de bajo nivel que utiliza Jackson Data Processor. A partir de la versi\u00f3n 2.0.0 y anteriores a la 2.13.0, una falla en el m\u00e9todo `JsonLocation._appendSourceDesc` de jackson-core permite incluir hasta 500 bytes de contenido de memoria no deseado en los mensajes de excepci\u00f3n. Al analizar JSON desde una matriz de bytes con un desplazamiento y una longitud, el mensaje de excepci\u00f3n lee incorrectamente desde el principio de la matriz en lugar del inicio l\u00f3gico del payload. Esto puede provocar la divulgaci\u00f3n de informaci\u00f3n en sistemas que utilizan b\u00faferes agrupados o reutilizados, como Netty o Vert.x. Este problema se solucion\u00f3 de forma silenciosa en la versi\u00f3n 2.13.0 de jackson-core, publicada el 30 de septiembre de 2021, mediante la solicitud de registro n.\u00b0 652. Todos los usuarios deben actualizar a la versi\u00f3n 2.13.0 o posterior. Si la actualizaci\u00f3n no es posible de inmediato, las aplicaciones pueden mitigar el problema deshabilitando la exposici\u00f3n de mensajes de excepci\u00f3n a los clientes para evitar devolver mensajes de excepci\u00f3n de an\u00e1lisis en respuestas HTTP y/o deshabilitando la inclusi\u00f3n de fuente en excepciones para evitar que Jackson incorpore cualquier contenido de fuente en los mensajes de excepci\u00f3n, evitando fugas."
}
],
"metrics": {

View File

@ -0,0 +1,90 @@
{
"id": "CVE-2025-49130",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-06-09T13:15:23.977",
"lastModified": "2025-06-09T13:15:23.977",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Laravel Translation Manager is a package to manage Laravel translation files. Prior to version 0.6.8, the application is vulnerable to Cross-Site Scripting (XSS) attacks due to incorrect input validation and sanitization of user-input data. An attacker can inject arbitrary HTML code, including JavaScript scripts, into the page processed by the user's browser, allowing them to steal sensitive data, hijack user sessions, or conduct other malicious activities. Only authenticated users with access to the translation manager are impacted. The issue is fixed in version 0.6.8."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/barryvdh/laravel-translation-manager/commit/527446ed419f90f2319675fc5211cb8f851d7a1f",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/barryvdh/laravel-translation-manager/pull/475",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/barryvdh/laravel-translation-manager/releases/tag/v0.6.8",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/barryvdh/laravel-translation-manager/security/advisories/GHSA-j226-63j7-qrqh",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,72 @@
{
"id": "CVE-2025-49131",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-06-09T13:15:24.120",
"lastModified": "2025-06-09T13:15:24.120",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "FastGPT is an open-source project that provides a platform for building, deploying, and operating AI-driven workflows and conversational agents. The Sandbox container (fastgpt-sandbox) is a specialized, isolated environment used by FastGPT to safely execute user-submitted or dynamically generated code in isolation. The sandbox before version 4.9.11 has insufficient isolation and inadequate restrictions on code execution by allowing overly permissive syscalls, which allows attackers to escape the intended sandbox boundaries. Attackers could exploit this to read and overwrite arbitrary files and bypass Python module import restrictions. This is patched in version 4.9.11 by restricting the allowed system calls to a safer subset and additional descriptive error messaging."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
}
],
"references": [
{
"url": "https://github.com/labring/FastGPT/commit/bb810a43a1c70683fab7f5fe993771e930a94426",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/labring/FastGPT/pkgs/container/fastgpt-sandbox",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/labring/FastGPT/pull/4958",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/labring/FastGPT/releases/tag/v4.9.11",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/labring/FastGPT/security/advisories/GHSA-f3pf-r3g7-g895",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-49599",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-06T17:15:36.147",
"lastModified": "2025-06-06T17:15:36.147",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Huawei EG8141A5 devices through V5R019C00S100, EG8145V5 devices through V5R019C00S100, and EG8145V5-V2 devices through V5R021C00S184 allow the Epuser account to disable ONT firewall functionality, e.g., to remove the default blocking of the SSH and TELNET TCP ports, aka HWNO-56Q3."
},
{
"lang": "es",
"value": "Los dispositivos Huawei EG8141A5 a trav\u00e9s de V5R019C00S100, los dispositivos EG8145V5 a trav\u00e9s de V5R019C00S100 y los dispositivos EG8145V5-V2 a trav\u00e9s de V5R021C00S184 permiten que la cuenta Epuser deshabilite la funcionalidad del firewall ONT, por ejemplo, para eliminar el bloqueo predeterminado de los puertos TCP SSH y TELNET, tambi\u00e9n conocido como HWNO-56Q3."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-49619",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-07T14:15:21.573",
"lastModified": "2025-06-07T21:15:21.887",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Skyvern through 0.1.85 has a Jinja runtime leak in sdk/workflow/models/block.py."
},
{
"lang": "es",
"value": "Skyvern hasta la versi\u00f3n 0.1.85 tiene una fuga de tiempo de ejecuci\u00f3n de Jinja en sdk/workflow/models/block.py."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-5303",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-06-07T09:15:22.007",
"lastModified": "2025-06-07T09:15:22.007",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The LTL Freight Quotes \u2013 Freightview Edition, LTL Freight Quotes \u2013 Daylight Edition and LTL Freight Quotes \u2013 Day & Ross Edition plugins for WordPress are vulnerable to Stored Cross-Site Scripting via the expiry_date parameter in all versions up to, and including, 1.0.11, 2.2.6 and 2.1.10 respectively, due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "Los complementos LTL Freight Quotes \u2013 Freightview Edition, LTL Freight Quotes \u2013 Daylight Edition and LTL Freight Quotes \u2013 Day & Ross Edition para WordPress son vulnerables a Cross Site Scripting Almacenado a trav\u00e9s del par\u00e1metro expiry_date en todas las versiones (hasta la 1.0.11, 2.2.6 y 2.1.10 incluida, respectivamente), debido a una depuraci\u00f3n de entrada y un escape de salida insuficientes. Esto permite a atacantes no autenticados inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-5399",
"sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9",
"published": "2025-06-07T08:15:20.687",
"lastModified": "2025-06-07T08:15:20.687",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Due to a mistake in libcurl's WebSocket code, a malicious server can send a\nparticularly crafted packet which makes libcurl get trapped in an endless\nbusy-loop.\n\nThere is no other way for the application to escape or exit this loop other\nthan killing the thread/process.\n\nThis might be used to DoS libcurl-using application."
},
{
"lang": "es",
"value": "Debido a un error en el c\u00f3digo WebSocket de libcurl, un servidor malicioso puede enviar un paquete especialmente manipulado que atrapa a libcurl en un bucle de actividad sin fin. La aplicaci\u00f3n no tiene otra forma de escapar de este bucle que cerrar el hilo/proceso. Esto podr\u00eda usarse para atacar a la aplicaci\u00f3n que usa libcurl."
}
],
"metrics": {},

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-5473",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-06T19:15:27.463",
"lastModified": "2025-06-06T19:15:27.463",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "GIMP ICO File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of ICO files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26752."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo por desbordamiento de enteros en el an\u00e1lisis de archivos ICO de GIMP. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de GIMP. Para explotar esta vulnerabilidad, se requiere la interacci\u00f3n del usuario, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica se encuentra en el an\u00e1lisis de archivos ICO. El problema se debe a la falta de una validaci\u00f3n adecuada de los datos proporcionados por el usuario, lo que puede provocar un desbordamiento de enteros antes de escribir en memoria. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-26752."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-5474",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-06T19:15:27.613",
"lastModified": "2025-06-06T19:15:27.613",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "2BrightSparks SyncBackFree Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of 2BrightSparks SyncBackFree. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. User interaction on the part of an administrator is also required.\n\nThe specific flaw exists within the Mirror functionality. By creating a junction, an attacker can abuse the service to delete arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-26962."
},
{
"lang": "es",
"value": "Vulnerabilidad de escalada de privilegios locales tras enlaces en 2BrightSparks SyncBackFree. Esta vulnerabilidad permite a atacantes locales escalar privilegios en las instalaciones afectadas de 2BrightSparks SyncBackFree. Para explotar esta vulnerabilidad, un atacante debe ejecutar c\u00f3digo con pocos privilegios en el sistema objetivo. Tambi\u00e9n se requiere la interacci\u00f3n del administrador. La falla espec\u00edfica se encuentra en la funcionalidad Mirror. Al crear una uni\u00f3n, un atacante puede abusar del servicio para eliminar archivos arbitrarios. Un atacante puede aprovechar esta vulnerabilidad para escalar privilegios y ejecutar c\u00f3digo arbitrario en el contexto del SYSTEM. Anteriormente, se denominaba ZDI-CAN-26962."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-5480",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-06T19:15:27.757",
"lastModified": "2025-06-06T19:15:27.757",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Action1 Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Action1. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the configuration of OpenSSL. The product loads an OpenSSL configuration file from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-26767."
},
{
"lang": "es",
"value": "Vulnerabilidad de escalada de privilegios locales en el elemento de ruta de b\u00fasqueda no controlada de Action1. Esta vulnerabilidad permite a atacantes locales escalar privilegios en las instalaciones afectadas de Action1. Para explotar esta vulnerabilidad, un atacante debe primero ejecutar c\u00f3digo con pocos privilegios en el sistema objetivo. La falla espec\u00edfica se encuentra en la configuraci\u00f3n de OpenSSL. El producto carga un archivo de configuraci\u00f3n de OpenSSL desde una ubicaci\u00f3n no segura. Un atacante puede aprovechar esta vulnerabilidad para escalar privilegios y ejecutar c\u00f3digo arbitrario en el contexto de SYSTEM. Anteriormente, se denominaba ZDI-CAN-26767."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-5481",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-06T19:15:27.903",
"lastModified": "2025-06-06T19:15:27.903",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Sante DICOM Viewer Pro DCM File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Sante DICOM Viewer Pro. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26168."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo por escritura fuera de los l\u00edmites en el an\u00e1lisis de archivos DCM de Sante DICOM Viewer Pro. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de Sante DICOM Viewer Pro. Para explotar esta vulnerabilidad, se requiere la interacci\u00f3n del usuario, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica se encuentra en el an\u00e1lisis de archivos DCM. El problema se debe a la falta de una validaci\u00f3n adecuada de los datos proporcionados por el usuario, lo que puede provocar una escritura posterior al final de un objeto asignado. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Anteriormente, se denomin\u00f3 ZDI-CAN-26168."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-5528",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-06-07T12:15:23.157",
"lastModified": "2025-06-07T12:15:23.157",
"vulnStatus": "Received",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Social Sharing Plugin \u2013 Sassy Social Share plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the heateor_mastodon_share parameter in all versions up to, and including, 3.3.75 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action, such as clicking on a link."
},
{
"lang": "es",
"value": "El complemento Social Sharing Plugin \u2013 Sassy Social Share para WordPress es vulnerable a ataques de Cross-Site Scripting Reflejado a trav\u00e9s del par\u00e1metro heater_mastodon_share en todas las versiones hasta la 3.3.75 incluida, debido a una depuraci\u00f3n de entrada y un escape de salida insuficientes. Esto permite a atacantes no autenticados inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar al usuario para que realice una acci\u00f3n, como hacer clic en un enlace."
}
],
"metrics": {

Some files were not shown because too many files have changed in this diff Show More