CVE tracker
276 subscribers
3.57K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2025-26009 - Telesquare TLR-2005KSH Information Disclosure Vulnerability

CVE ID : CVE-2025-26009
Published : March 26, 2025, 8:15 p.m. | 1 hour, 43 minutes ago
Description : Telesquare TLR-2005KSH 1.1.4 has an Information Disclosure vulnerability when requesting systemutilit.cgi.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-26010 - Telesquare TLR-2005KSH Authentication Bypass

CVE ID : CVE-2025-26010
Published : March 26, 2025, 8:15 p.m. | 1 hour, 43 minutes ago
Description : Telesquare TLR-2005KSH 1.1.4 allows unauthorized password modification when requesting the admin.cgi parameter with setUserNamePassword.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-26011 - Telesquare TLR-2005KSH Stack Overflow Vulnerability

CVE ID : CVE-2025-26011
Published : March 26, 2025, 8:15 p.m. | 1 hour, 43 minutes ago
Description : Telesquare TLR-2005KSH 1.1.4 has an unauthorized stack overflow vulnerability when requesting the admin.cgi parameter with setUsernamePassword.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-28361 - Telesquare TLR-2005KSH Stack Overflow Information Disclosure

CVE ID : CVE-2025-28361
Published : March 26, 2025, 8:15 p.m. | 1 hour, 43 minutes ago
Description : Unauthorized stack overflow vulnerability in Telesquare TLR-2005KSH v.1.1.4 allows a remote attacker to obtain sensitive information via the systemutil.cgi component.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-30073 - OPC cardsystems Webapp Aufwertung Referential Reuse Vulnerability

CVE ID : CVE-2025-30073
Published : March 26, 2025, 8:15 p.m. | 1 hour, 43 minutes ago
Description : An issue was discovered in OPC cardsystems Webapp Aufwertung 2.1.0. The reference assigned to transactions can be reused. When completing a payment, the first or all transactions with the same reference are completed, depending on timing. This can be used to transfer more money onto employee cards than is paid.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2024-55965 - Appsmith Information Disclosure Vulnerability

CVE ID : CVE-2024-55965
Published : March 26, 2025, 9:15 p.m. | 43 minutes ago
Description : An issue was discovered in Appsmith before 1.51. Users invited as "App Viewer" incorrectly have access to development information of a workspace (specifically, a list of datasources in a workspace they're a member of). This information disclosure does not expose sensitive data in the datasources, such as database passwords and API Keys.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-2787 - KNIME Business Hub Ingress-nginx Cluster Takeover Vulnerability

CVE ID : CVE-2025-2787
Published : March 26, 2025, 9:15 p.m. | 43 minutes ago
Description : KNIME Business Hub is affected by the Ingress-nginx CVE-2025-1974 ( a.k.a IngressNightmare ) vulnerability which affects the ingress-nginx component. In the worst case a complete takeover of the Kubernetes cluster is possible. Since the affected component is only reachable from within the cluster, i.e. requires an authenticated user, the severity in the context of KNIME Business Hub is slightly lower. Besides applying the publicly known workarounds, we strongly recommend updating to one of the following versions of KNIME Business Hub: * 1.13.3 or above * 1.12.4 or above * 1.11.4 or above * 1.10.4 or above *
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-31160 - Atop Denial of Service Vulnerability

CVE ID : CVE-2025-31160
Published : March 26, 2025, 9:15 p.m. | 43 minutes ago
Description : atop through 2.11.0 allows local users to cause a denial of service (e.g., assertion failure and application exit) or possibly have unspecified other impact by running certain types of unprivileged processes while a different user runs atop.
Severity: 2.9 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-20226 - Splunk Enterprise/Bypass of SPL Safeguards for Risky Commands

CVE ID : CVE-2025-20226
Published : March 26, 2025, 10:15 p.m. | 3 hours, 43 minutes ago
Description : In Splunk Enterprise versions below 9.4.1, 9.3.3, 9.2.5, and 9.1.8 and Splunk Cloud Platform versions below 9.3.2408.107, 9.2.2406.111, and 9.1.2308.214, a low-privileged user that does not hold the "admin" or "power" Splunk roles could run a saved search with a risky command using the permissions of a higher-privileged user to bypass the SPL safeguards for risky commands on the "/services/streams/search" endpoint through its "q" parameter. The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The authenticated user should not be able to exploit the vulnerability at will.
Severity: 5.7 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-20227 - Splunk Enterprise/Cloud Platform External Content Warning Bypass

CVE ID : CVE-2025-20227
Published : March 26, 2025, 10:15 p.m. | 3 hours, 43 minutes ago
Description : In Splunk Enterprise versions below 9.4.1, 9.3.3, 9.2.5, and 9.1.8, and Splunk Cloud Platform versions below 9.3.2408.107, 9.2.2406.112, 9.2.2403.115, 9.1.2312.208 and 9.1.2308.214, a low-privileged user that does not hold the "admin" or "power" Splunk roles could bypass the external content warning modal dialog box in Dashboard Studio dashboards which could lead to an information disclosure.
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-20228 - Splunk Enterprise Cross-Site Request Forgery (CSRF) Vulnerability

CVE ID : CVE-2025-20228
Published : March 26, 2025, 10:15 p.m. | 3 hours, 43 minutes ago
Description : In Splunk Enterprise versions below 9.3.3, 9.2.5, and 9.1.8 and Splunk Cloud Platform versions below 9.2.2403.108, and 9.1.2312.204, a low-privileged user that does not hold the "admin" or "power" Splunk roles could change the maintenance mode state of App Key Value Store (KVStore) through a Cross-Site Request Forgery (CSRF).
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-20229 - Splunk Enterprise/Cloud Platform Remote Code Execution Vulnerability

CVE ID : CVE-2025-20229
Published : March 26, 2025, 10:15 p.m. | 3 hours, 43 minutes ago
Description : In Splunk Enterprise versions below 9.3.3, 9.2.5, and 9.1.8, and Splunk Cloud Platform versions below 9.3.2408.104, 9.2.2406.108, 9.2.2403.114, and 9.1.2312.208, a low-privileged user that does not hold the "admin" or "power" Splunk roles could perform a Remote Code Execution (RCE) through a file upload to the "$SPLUNK_HOME/var/run/splunk/apptemp" directory due to missing authorization checks.
Severity: 8.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-20231 - Splunk Enterprise & Splunk Secure Gateway App Cross-Site Request Forgery (CSRF)

CVE ID : CVE-2025-20231
Published : March 26, 2025, 10:15 p.m. | 3 hours, 43 minutes ago
Description : In Splunk Enterprise versions below 9.4.1, 9.3.3, 9.2.5, and 9.1.8, and versions below 3.8.38 and 3.7.23 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles could run a search using the permissions of a higher-privileged user that could lead to disclosure of sensitive information.

The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The authenticated low-privileged user should not be able to exploit the vulnerability at will.
Severity: 7.1 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-20232 - Splunk Enterprise/Bypass Splunk Search Command Permissions

CVE ID : CVE-2025-20232
Published : March 26, 2025, 10:15 p.m. | 3 hours, 43 minutes ago
Description : In Splunk Enterprise versions below 9.3.3, 9.2.5, and 9.1.8 and Splunk Cloud Platform versions below 9.3.2408.103, 9.2.2406.108, 9.2.2403.113, 9.1.2312.208 and 9.1.2308.212, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles could run a saved search with a risky command using the permissions of a higher-privileged user to bypass the SPL safeguards for risky commands on the “/app/search/search“ endpoint through its “s“ parameter.
The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The authenticated user should not be able to exploit the vulnerability at will.
Severity: 5.7 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-20233 - Splunk App for Lookup File Editing Privilege Escalation Vulnerability

CVE ID : CVE-2025-20233
Published : March 26, 2025, 10:15 p.m. | 3 hours, 43 minutes ago
Description : In the Splunk App for Lookup File Editing versions below 4.0.5, a script in the app used the `chmod` and `makedirs` Python functions in a way that resulted in overly broad read and execute permissions. This could lead to improper access control for a low-privileged user.
Severity: 2.5 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-2837 - Silicon Labs Gecko OS HTTP Request Handling Stack-based Buffer Overflow Remote Code Execution

CVE ID : CVE-2025-2837
Published : March 26, 2025, 10:15 p.m. | 3 hours, 43 minutes ago
Description : Silicon Labs Gecko OS HTTP Request Handling Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Silicon Labs Gecko OS. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HTTP requests. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-23245.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-2838 - Silicon Labs Gecko OS DNS Response Processing Denial-of-Service Vulnerability

CVE ID : CVE-2025-2838
Published : March 26, 2025, 10:15 p.m. | 3 hours, 43 minutes ago
Description : Silicon Labs Gecko OS DNS Response Processing Infinite Loop Denial-of-Service Vulnerability. This vulnerability allows network-adjacent attackers to create a denial-of-service condition on affected installations of Silicon Labs Gecko OS. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of DNS responses. The issue results from a logic error that can lead to an infinite loop. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-23392.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-30407 - Acronis Cyber Protect Cloud Agent Binary Hijacking Vulnerability

CVE ID : CVE-2025-30407
Published : March 26, 2025, 10:15 p.m. | 3 hours, 43 minutes ago
Description : Local privilege escalation due to a binary hijacking vulnerability. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 39713.
Severity: 6.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-20230 - Splunk Enterprise and Splunk Secure Gateway Unauthorized Data Access Vulnerability

CVE ID : CVE-2025-20230
Published : March 26, 2025, 11:15 p.m. | 2 hours, 43 minutes ago
Description : In Splunk Enterprise versions below 9.4.1, 9.3.3, 9.2.5, and 9.1.8, and versions below 3.8.38 and 3.7.23 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles could edit and delete other user data in App Key Value Store (KVStore) collections that the Splunk Secure Gateway app created. This is due to missing access control and incorrect ownership of the data in those KVStore collections.

In the affected versions, the `nobody` user owned the data in the KVStore collections. This meant that there was no specific owner assigned to the data in those collections.
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-2496 - Apache Struts Remote Code Execution Vulnerability

CVE ID : CVE-2025-2496
Published : March 26, 2025, 11:15 p.m. | 2 hours, 43 minutes ago
Description : Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-30355 - Synapse Denial of Federation Vulnerability

CVE ID : CVE-2025-30355
Published : March 27, 2025, 1:15 a.m. | 43 minutes ago
Description : Synapse is an open source Matrix homeserver implementation. A malicious server can craft events which, when received, prevent Synapse version up to 1.127.0 from federating with other servers. The vulnerability has been exploited in the wild and has been fixed in Synapse v1.127.1. No known workarounds are available.
Severity: 7.1 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...