CVE-2025-27398 |
Description:
Tenable OT Security Plugin ID 503132 with Low Severity
Synopsis
The remote OT asset is affected by a vulnerability.
Description
A remote attacker needs to have access to a valid certificate in order to perform a successful attack.This plugin only works with Tenable.ot.Please visit https://www.tenable.com/products/tenable-ot for more information.
Solution
Refer to the vendor advisory.
Read more at https://www.tenable.com/plugins/ot/503132
CVSS: LOW (2.7) EPSS Score: 0.04%
March 17th, 2025 (3 months ago)
|
CVE-2025-27398 |
Description:
Tenable OT Security Plugin ID 503133 with Low Severity
Synopsis
The remote OT asset is affected by a vulnerability.
Description
Affected devices do not properly neutralize special characters when interpreting user controlled log paths. This could allow an authenticated highly-privileged remote attacker to execute a limited set of binaries that are already present on the filesystem.This plugin only works with Tenable.ot.Please visit https://www.tenable.com/products/tenable-ot for more information.
Solution
Refer to the vendor advisory.
Read more at https://www.tenable.com/plugins/ot/503133
CVSS: LOW (2.7) EPSS Score: 0.04%
March 17th, 2025 (3 months ago)
|
CVE-2025-27397 |
Description:
Tenable OT Security Plugin ID 503137 with Low Severity
Synopsis
The remote OT asset is affected by a vulnerability.
Description
Affected devices do not properly limit user controlled paths to which logs are written and from where they are read. This could allow an authenticated highly-privileged remote attacker to read and write arbitrary files in the filesystem, if and only if the malicious path ends with 'log' .This plugin only works with Tenable.ot.Please visit https://www.tenable.com/products/tenable-ot for more information.
Solution
Refer to the vendor advisory.
Read more at https://www.tenable.com/plugins/ot/503137
CVSS: LOW (3.8) EPSS Score: 0.04%
March 17th, 2025 (3 months ago)
|
CVE-2024-8925 |
Description: In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, erroneous parsing of multipart form data contained in an HTTP POST request could lead to legitimate data not being processed. This could lead to malicious attacker able to control part of the submitted data being able to exclude portion of other data, potentially leading to erroneous application behavior.
CVSS: LOW (3.1) EPSS Score: 0.03% SSVC Exploitation: poc
March 17th, 2025 (3 months ago)
|
CVE-2025-27512 |
Zincati allows unprivileged access to rpm-ostree D-Bus `Deploy()` and `FinalizeDeployment()` methods
Description: Zincati is an auto-update agent for Fedora CoreOS hosts. Zincati ships a polkit rule which allows the `zincati` system user to use the actions `org.projectatomic.rpmostree1.deploy` to deploy updates to the system and `org.projectatomic.rpmostree1.finalize-deployment` to reboot the system into the deployed update. Since Zincati v0.0.24, this polkit rule contains a logic error which broadens access of those polkit actions to any unprivileged user rather than just the `zincati` system user. In practice, this means that any unprivileged user with access to the system D-Bus socket is able to deploy older Fedora CoreOS versions (which may have other known vulnerabilities). Note that rpm-ostree enforces that the selected version must be from the same branch the system is currently on so this cannot directly be used to deploy an attacker-controlled update payload. This primarily impacts users running untrusted workloads with access to the system D-Bus socket. Note that in general, untrusted workloads should not be given this access, whether containerized or not. By default, containers do not have access to the system D-Bus socket. The logic error is fixed in Zincati v0.0.30. A workaround is to manually add a following polkit rule, instructions for which are available in the GitHub Security Advisory.
CVSS: LOW (2.1) EPSS Score: 0.02%
March 17th, 2025 (3 months ago)
|
CVE-2024-29508 |
Description: Artifex Ghostscript before 10.03.0 has a heap-based pointer disclosure (observable in a constructed BaseFont name) in the function pdf_base_font_alloc.
CVSS: LOW (3.3) EPSS Score: 0.01% SSVC Exploitation: none
March 17th, 2025 (3 months ago)
|
CVE-2025-2349 |
Description: A vulnerability was found in IROAD Dash Cam FX2 up to 20250308. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /etc/passwd of the component Password Hash Handler. The manipulation leads to password hash with insufficient computational effort. Access to the local network is required for this attack. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. In IROAD Dash Cam FX2 bis 20250308 wurde eine problematische Schwachstelle ausgemacht. Es geht um eine nicht näher bekannte Funktion der Datei /etc/passwd der Komponente Password Hash Handler. Durch Beeinflussen mit unbekannten Daten kann eine password hash with insufficient computational effort-Schwachstelle ausgenutzt werden. Der Angriff kann im lokalen Netzwerk erfolgen. Die Komplexität eines Angriffs ist eher hoch. Sie gilt als schwierig ausnutzbar. Der Exploit steht zur öffentlichen Verfügung.
CVSS: LOW (2.3) EPSS Score: 0.01%
March 16th, 2025 (3 months ago)
|
CVE-2025-2341 |
Description: A vulnerability was found in IROAD Dash Cam X5 up to 20250203. It has been rated as problematic. This issue affects some unknown processing of the component SSID. The manipulation leads to use of default credentials. The attack needs to be initiated within the local network. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. Eine Schwachstelle wurde in IROAD Dash Cam X5 bis 20250203 ausgemacht. Sie wurde als problematisch eingestuft. Dies betrifft einen unbekannten Teil der Komponente SSID. Mit der Manipulation mit unbekannten Daten kann eine use of default credentials-Schwachstelle ausgenutzt werden. Der Angriff kann im lokalen Netzwerk passieren. Die Komplexität eines Angriffs ist eher hoch. Die Ausnutzbarkeit gilt als schwierig. Der Exploit steht zur öffentlichen Verfügung.
CVSS: LOW (2.3) EPSS Score: 0.02%
March 16th, 2025 (3 months ago)
|
CVE-2024-46901 |
Description:
Nessus Plugin ID 232753 with Low Severity
Synopsis
The remote SUSE host is missing a security update.
Description
The remote SUSE Linux SLES12 host has a package installed that is affected by a vulnerability as referenced in the SUSE- SU-2025:0871-1 advisory. - CVE-2024-46901: Fixed mod_dav_svn denial-of-service via control characters in paths (bsc#1234317)Tenable has extracted the preceding description block directly from the SUSE security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Solution
Update the affected subversion-devel package.
Read more at https://www.tenable.com/plugins/nessus/232753
CVSS: LOW (3.1)
March 15th, 2025 (3 months ago)
|
CVE-2025-2295 |
Description: EDK2 contains a vulnerability in BIOS where a user may cause an Integer Overflow or Wraparound by network means. A successful exploitation of this vulnerability may lead to denial of service.
CVSS: LOW (3.5) EPSS Score: 0.05%
March 14th, 2025 (3 months ago)
|