8.8

CVSS4.0

CVE-2025-25292 - Ruby SAML vulnerable to SAML authentication bypass due to namespace handling (parser differential)

ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. An authentication bypass vulnerability was found in ruby-saml prior to versions 1.12.4 and 1.18.0 due to a parser differential. ReXML and Nokogiri parse XML differently, the parsers can generate entirely different document structures from the same XML input. That allows an attacker to be able to execute a Signature Wrapping attack. This issue may lead to authentication bypass. Versions 1.12.4 and 1.18.0 contain a patch for the issue.

๐Ÿ“… Published: March 12, 2025, 8:53 p.m. ๐Ÿ”„ Last Modified: March 12, 2025, 10:15 p.m.

8.8

CVSS4.0

CVE-2025-25291 - ruby-saml vulnerable to SAML authentication bypass due to DOCTYPE handling (parser differential)

ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. An authentication bypass vulnerability was found in ruby-saml prior to versions 1.12.4 and 1.18.0 due to a parser differential. ReXML and Nokogiri parse XML differently; the parsers can generate entirely different document structures from the same XML input. That allows an attacker to be able to execute a Signature Wrapping attack. This issue may lead to authentication bypass. Versions 1.12.4 and 1.18.0 fix the issue.

๐Ÿ“… Published: March 12, 2025, 8:16 p.m. ๐Ÿ”„ Last Modified: March 12, 2025, 10:15 p.m.

7.7

CVSS4.0

CVE-2025-25293 - ruby-saml vulnerable to Remote Denial of Service (DoS) with compressed SAML responses

ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. Prior to versions 1.12.4 and 1.18.0, ruby-saml is susceptible to remote Denial of Service (DoS) with compressed SAML responses. ruby-saml uses zlib to decompress SAML responses in case they're compressed. It is possible to bypass the message size check with a compressed assertion since the message size is checked before inflation and not after. This issue may lead to remote Denial of Service (DoS). Versions 1.12.4 and 1.18.0 fix the issue.

๐Ÿ“… Published: March 12, 2025, 8:11 p.m. ๐Ÿ”„ Last Modified: March 12, 2025, 10:15 p.m.

8.7

CVSS4.0

CVE-2024-26290 - Authenticated Remote Command Injection affecting Avid NEXIS

Improper Input Validation vulnerability in Avid Avid NEXIS E-series on Linux, Avid Avid NEXIS F-series on Linux, Avid Avid NEXIS PRO+ on Linux, Avid System Director Appliance (SDA+) on Linux allows code execution on underlying operating system with root permissions.This issue affects Avid NEXIS E-series: before 2024.6.0; Avid NEXIS F-series: before 2024.6.0; Avid NEXIS PRO+: before 2024.6.0; System Director Appliance (SDA+): before 2024.6.0.

๐Ÿ“… Published: March 12, 2025, 7:45 p.m. ๐Ÿ”„ Last Modified: March 12, 2025, 8:27 p.m.

6

CVSS4.0

CVE-2025-0118 - GlobalProtect App: Execution of Unsafe ActiveX Control Vulnerability

A vulnerability in the Palo Alto Networks GlobalProtect app on Windows allows a remote attacker to run ActiveX controls within the context of an authenticated Windows user. This enables the attacker to run commands as if they are a legitimate authenticated user. However, to exploit this vulnerability, the authenticated user must navigate to a malicious page during the GlobalProtect SAML login process on a Windows device. This issue does not apply to the GlobalProtect app on other (non-Windows) platforms.

๐Ÿ“… Published: March 12, 2025, 6:36 p.m. ๐Ÿ”„ Last Modified: March 12, 2025, 7:15 p.m.
Load More Vulnerability
avatar

Mehmet Ince

@mdisec

CVE stats coming here

avatar

Nuri ร‡ilengir

@ncilengir

CVE stats coming here

avatar

Seyit Sigirci

@h3xecute

CVE stats coming here

avatar

Ali ฤฐltizar

@iltosec

CVE stats coming here

avatar

Nicat Abbasov

@scan9

CVE stats coming here

avatar

Mรผcahit ฤฐรง

@mucahic

CVE stats coming here

avatar

kutaysec

@kutaysec

CVE stats coming here

avatar

@mustafaashx

CVE stats coming here

avatar

@deimyon

CVE stats coming here