CVE-2024-29202 |
Description: JumpServer is an open source bastion host and an operation and maintenance security audit system. Attackers can exploit a Jinja2 template injection vulnerability in JumpServer's Ansible to execute arbitrary code within the Celery container. Since the Celery container runs with root privileges and has database access, attackers could steal sensitive information from all hosts or manipulate the database. This vulnerability is fixed in v3.10.7.
CVSS: CRITICAL (10.0) EPSS Score: 50.44% SSVC Exploitation: poc
March 25th, 2025 (26 days ago)
|
CVE-2024-29201 |
Description: JumpServer is an open source bastion host and an operation and maintenance security audit system. Attackers can bypass the input validation mechanism in JumpServer's Ansible to execute arbitrary code within the Celery container. Since the Celery container runs with root privileges and has database access, attackers could steal sensitive information from all hosts or manipulate the database. This vulnerability is fixed in v3.10.7.
CVSS: CRITICAL (10.0) EPSS Score: 41.29% SSVC Exploitation: poc
March 25th, 2025 (26 days ago)
|
CVE-2025-28904 |
Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Shamalli Web Directory Free allows Blind SQL Injection. This issue affects Web Directory Free: from n/a through 1.7.6.
CVSS: CRITICAL (9.3) EPSS Score: 0.04% SSVC Exploitation: none
March 25th, 2025 (26 days ago)
|
CVE-2024-24681 |
Description: An issue was discovered in Yealink Configuration Encrypt Tool (AES version) and Yealink Configuration Encrypt Tool (RSA version before 1.2). There is a single hardcoded key (used to encrypt provisioning documents) across customers' installations.
CVSS: CRITICAL (9.8) EPSS Score: 0.1% SSVC Exploitation: none
March 25th, 2025 (26 days ago)
|
CVE-2024-24722 |
Description: An unquoted service path vulnerability in the 12d Synergy Server and File Replication Server components may allow an attacker to gain elevated privileges via the 12d Synergy Server and/or 12d Synergy File Replication Server executable service path. This is fixed in 4.3.10.192, 5.1.5.221, and 5.1.6.235.
CVSS: CRITICAL (9.1) EPSS Score: 0.12% SSVC Exploitation: none
March 25th, 2025 (26 days ago)
|
![]() |
Description: A security issue was discovered in Kubernetes where under certain conditions, an unauthenticated attacker with access to the pod network can achieve arbitrary code execution in the context of the ingress-nginx controller. This can lead to disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)
References
https://nvd.nist.gov/vuln/detail/CVE-2025-1974
https://github.com/kubernetes/kubernetes/issues/131009
https://github.com/kubernetes/ingress-nginx/releases/tag/controller-v1.11.5
https://github.com/kubernetes/ingress-nginx/releases/tag/controller-v1.12.1
https://groups.google.com/g/kubernetes-security-announce/c/2qa9DFtN0cQ
https://github.com/advisories/GHSA-mgvx-rpfc-9mpv
CVSS: CRITICAL (9.8) EPSS Score: 75.83%
March 25th, 2025 (26 days ago)
|
CVE-2024-29667 |
Description: SQL Injection vulnerability in Tongtianxing Technology Co., Ltd CMSV6 v.7.31.0.2 through v.7.31.0.3 allows a remote attacker to escalate privileges and obtain sensitive information via the ids parameter.
CVSS: CRITICAL (9.8) EPSS Score: 0.22% SSVC Exploitation: poc
March 25th, 2025 (26 days ago)
|
![]() |
Description: Rapid7 is warning customers of two notable vulnerabilities affecting Next.js (CVE-2025-29927) and file transfer software CrushFTP (no CVE).
CVSS: CRITICAL (9.1) EPSS Score: 91.42%
March 25th, 2025 (26 days ago)
|
CVE-2025-30091 |
Description: In Tiny MoxieManager PHP before 4.0.0, remote code execution can occur in the installer command. This vulnerability allows unauthenticated attackers to inject and execute arbitrary code. Attacker-controlled data to InstallCommand can be inserted into config.php, and InstallCommand is available after an installation has completed.
CVSS: CRITICAL (9.4) EPSS Score: 0.3%
March 25th, 2025 (26 days ago)
|
CVE-2024-45480 |
Description: An improper control of generation of code ('Code Injection') vulnerability in the AprolCreateReport component of B&R APROL <4.4-00P5 may allow an unauthenticated network-based attacker to read files from the local system.
CVSS: CRITICAL (9.2) EPSS Score: 0.06%
March 25th, 2025 (26 days ago)
|