Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-10985 | In JotUrl 2.0, passwords are sent via HTTP GET-type requests, potentially exposing credentials to eavesdropping or insecure records. |
| Link | Providers |
|---|---|
| https://www.gruppotim.it/it/footer/red-team.html |
|
Tue, 22 Apr 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Joturl
Joturl joturl |
|
| CPEs | cpe:2.3:a:joturl:joturl:2.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Joturl
Joturl joturl |
Tue, 15 Apr 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-598 | |
| Metrics |
cvssV3_1
|
Tue, 15 Apr 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In JotUrl 2.0, passwords are sent via HTTP GET-type requests, potentially exposing credentials to eavesdropping or insecure records. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-04-15T20:08:06.623Z
Reserved: 2025-01-29T00:00:00.000Z
Link: CVE-2025-24948
Updated: 2025-04-15T20:08:00.923Z
Status : Analyzed
Published: 2025-04-15T16:16:05.830
Modified: 2025-04-22T18:41:34.110
Link: CVE-2025-24948
No data.
OpenCVE Enrichment
No data.
EUVD