![]() |
Description: A security issue was discovered in ingress-nginx where the mirror-target and mirror-host Ingress annotations can be used to inject arbitrary configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)
References
https://nvd.nist.gov/vuln/detail/CVE-2025-1098
https://github.com/kubernetes/kubernetes/issues/131008
https://github.com/kubernetes/ingress-nginx/releases/tag/controller-v1.11.5
https://github.com/kubernetes/ingress-nginx/releases/tag/controller-v1.12.1
https://groups.google.com/g/kubernetes-security-announce/c/2qa9DFtN0cQ
https://github.com/advisories/GHSA-vg63-w3p9-jc9m
CVSS: HIGH (8.8) EPSS Score: 26.45%
March 25th, 2025 (3 months ago)
|
![]() |
Description: A security issue was discovered in ingress-nginx where the auth-tls-match-cn Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)
References
https://nvd.nist.gov/vuln/detail/CVE-2025-1097
https://github.com/kubernetes/kubernetes/issues/131007
https://github.com/kubernetes/ingress-nginx/releases/tag/controller-v1.11.5
https://github.com/kubernetes/ingress-nginx/releases/tag/controller-v1.12.1
https://groups.google.com/g/kubernetes-security-announce/c/2qa9DFtN0cQ
https://github.com/advisories/GHSA-823x-fv5p-h7hw
CVSS: HIGH (8.8) EPSS Score: 4.82%
March 25th, 2025 (3 months ago)
|
![]() |
Description: A security issue was discovered in ingress-nginx where the auth-url Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)
References
https://nvd.nist.gov/vuln/detail/CVE-2025-24514
https://github.com/kubernetes/kubernetes/issues/131006
https://github.com/kubernetes/ingress-nginx/releases/tag/controller-v1.11.5
https://github.com/kubernetes/ingress-nginx/releases/tag/controller-v1.12.1
https://groups.google.com/g/kubernetes-security-announce/c/2qa9DFtN0cQ
https://github.com/advisories/GHSA-fwwp-xcxw-39vq
CVSS: HIGH (8.8) EPSS Score: 26.45%
March 25th, 2025 (3 months ago)
|
CVE-2022-24999 |
Description: View CSAF
1. EXECUTIVE SUMMARY
CVSS v4 8.7
ATTENTION: Exploitable remotely/low attack complexity
Vendor: ABB
Equipment: RMC-100
Vulnerability: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
2. RISK EVALUATION
Successful exploitation of this vulnerability could allow an attacker to send a specially crafted message to the web UI, causing a temporary denial of service until the interface can be restarted.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
ABB reports that the following products are affected when the REST interface is enabled:
RMC-100: Versions 2105457-036 to 2105457-044
RMC-100 LITE: Versions 2106229-010 to 2106229-016
3.2 VULNERABILITY OVERVIEW
3.2.1 IMPROPERLY CONTROLLED MODIFICATION OF OBJECT PROTOTYPE ATTRIBUTES ('PROTOTYPE POLLUTION') CWE-1321
A vulnerability exists in the web UI (REST interface) included in the product versions listed above. An attacker could exploit the vulnerability by sending a specially crafted message to the web UI node, causing a node process hang, requiring restart of the REST interface (disable/enable).
CVE-2022-24999 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
A CVSS v4 score has also been calculated for CVE-2022-24999. A base score of 8.7 has been calculated; the CVSS vector string is (CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N).
3.3 BACKGROUND
CRIT...
CVSS: HIGH (7.5)
March 25th, 2025 (3 months ago)
|
CVE-2020-27212 |
Description: View CSAF
1. EXECUTIVE SUMMARY
CVSS v4 7.3
ATTENTION: High attack complexity
Vendor: Rockwell Automation
Equipment: 440G TLS-Z
Vulnerability: Improper Neutralization of Special Elements in Output Used by a Downstream Component
2. RISK EVALUATION
Successful exploitation of this vulnerability could allow an attacker to take over the device.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
Rockwell Automation reports the following products are affected by a vulnerability because they use STMicroelectronics STM32L4 devices:
440G TLS-Z: Version v6.001
3.2 VULNERABILITY OVERVIEW
3.2.1 IMPROPER NEUTRALIIZATION OF SPECIAL ELEMENTS IN OUTPUT USED BY A DOWNSTREAM COMPONENT CWE-74
A local code execution vulnerability exists in the STMicroelectronics STM32L4 devices due to having incorrect access controls. The affected product utilizes the STMicroelectronics STM32L4 device and because of the vulnerability, a threat actor could reverse protections that control access to the JTAG interface. If exploited, a threat actor can take over the device.
CVE-2020-27212 has been assigned to this vulnerability. A CVSS v3.1 base score of 7.0 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).
A CVSS v4 score has also been calculated for CVE-2020-27212. A base score of 7.3 has been calculated; the CVSS vector string is (CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N).
3.3 BACKGROUND
CRITICAL INFRASTRUCTURE SECTORS: Commercial Facilities
COUNT...
CVSS: HIGH (7.0)
March 25th, 2025 (3 months ago)
|
CVE-2025-27147 |
Description: The GLPI Inventory Plugin handles various types of tasks for GLPI agents, including network discovery and inventory (SNMP), software deployment, VMWare ESX host remote inventory, and data collection (files, Windows registry, WMI). Versions prior to 1.5.0 have an improper access control vulnerability. Version 1.5.0 fixes the vulnerability.
CVSS: HIGH (8.2) EPSS Score: 0.06% SSVC Exploitation: none
March 25th, 2025 (3 months ago)
|
CVE-2025-2532 |
Description: Luxion KeyShot USDC File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of usdc files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23709.
CVSS: HIGH (7.8) EPSS Score: 0.03% SSVC Exploitation: none
March 25th, 2025 (3 months ago)
|
CVE-2025-2531 |
Description: Luxion KeyShot DAE File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of dae files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23704.
CVSS: HIGH (7.8) EPSS Score: 0.03% SSVC Exploitation: none
March 25th, 2025 (3 months ago)
|
CVE-2025-2530 |
Description: Luxion KeyShot DAE File Parsing Access of Uninitialized Pointer Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of dae files. The issue results from the lack of proper initialization of a pointer prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23698.
CVSS: HIGH (7.8) EPSS Score: 0.03% SSVC Exploitation: none
March 25th, 2025 (3 months ago)
|
CVE-2025-22230 |
Description: VMware Tools for Windows contains an authentication bypass vulnerability due to improper access control. A malicious actor with non-administrative privileges on a guest VM may gain ability to perform certain high privilege operations within that VM.
CVSS: HIGH (7.8) EPSS Score: 0.01% SSVC Exploitation: none
March 25th, 2025 (3 months ago)
|