CVE-2024-40715 |
Description: A vulnerability in Veeam Backup & Replication Enterprise Manager has been identified, which allows attackers to perform authentication bypass. Attackers must be able to perform Man-in-the-Middle (MITM) attack to exploit this vulnerability.
CVSS: HIGH (7.7) EPSS Score: 0.13% SSVC Exploitation: none
March 25th, 2025 (3 months ago)
|
![]() |
Description: Impact
Making crafted requests could lead to information disclosure that could further lead to account takeover.
Workarounds
There's no workaround to fix this without upgrading.
Credits
Thanks to Thanh of Calif.io for reporting the issue
References
https://github.com/frappe/frappe/security/advisories/GHSA-qrv3-jc3h-f3m6
https://nvd.nist.gov/vuln/detail/CVE-2025-30214
https://github.com/advisories/GHSA-qrv3-jc3h-f3m6
CVSS: HIGH (8.0) EPSS Score: 0.06%
March 25th, 2025 (3 months ago)
|
CVE-2025-30214 |
Description: Frappe is a full-stack web application framework. Prior to versions 14.89.0 and 15.51.0, making crafted requests could lead to information disclosure that could further lead to account takeover. Versions 14.89.0 and 15.51.0 fix the issue. There's no workaround to fix this without upgrading.
CVSS: HIGH (8.0) EPSS Score: 0.06% SSVC Exploitation: none
March 25th, 2025 (3 months ago)
|
CVE-2024-25021 |
Description: IBM AIX 7.3, VIOS 4.1's Perl implementation could allow a non-privileged local user to exploit a vulnerability to execute arbitrary commands. IBM X-Force ID: 281320.
CVSS: HIGH (8.4) EPSS Score: 0.02% SSVC Exploitation: none
March 25th, 2025 (3 months ago)
|
![]() |
Description: A security issue was discovered in ingress-nginx where the mirror-target and mirror-host Ingress annotations can be used to inject arbitrary configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)
References
https://nvd.nist.gov/vuln/detail/CVE-2025-1098
https://github.com/kubernetes/kubernetes/issues/131008
https://github.com/kubernetes/ingress-nginx/releases/tag/controller-v1.11.5
https://github.com/kubernetes/ingress-nginx/releases/tag/controller-v1.12.1
https://groups.google.com/g/kubernetes-security-announce/c/2qa9DFtN0cQ
https://github.com/advisories/GHSA-vg63-w3p9-jc9m
CVSS: HIGH (8.8) EPSS Score: 26.45%
March 25th, 2025 (3 months ago)
|
![]() |
Description: A security issue was discovered in ingress-nginx where the auth-tls-match-cn Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)
References
https://nvd.nist.gov/vuln/detail/CVE-2025-1097
https://github.com/kubernetes/kubernetes/issues/131007
https://github.com/kubernetes/ingress-nginx/releases/tag/controller-v1.11.5
https://github.com/kubernetes/ingress-nginx/releases/tag/controller-v1.12.1
https://groups.google.com/g/kubernetes-security-announce/c/2qa9DFtN0cQ
https://github.com/advisories/GHSA-823x-fv5p-h7hw
CVSS: HIGH (8.8) EPSS Score: 4.82%
March 25th, 2025 (3 months ago)
|
![]() |
Description: A security issue was discovered in ingress-nginx where the auth-url Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)
References
https://nvd.nist.gov/vuln/detail/CVE-2025-24514
https://github.com/kubernetes/kubernetes/issues/131006
https://github.com/kubernetes/ingress-nginx/releases/tag/controller-v1.11.5
https://github.com/kubernetes/ingress-nginx/releases/tag/controller-v1.12.1
https://groups.google.com/g/kubernetes-security-announce/c/2qa9DFtN0cQ
https://github.com/advisories/GHSA-fwwp-xcxw-39vq
CVSS: HIGH (8.8) EPSS Score: 26.45%
March 25th, 2025 (3 months ago)
|
CVE-2022-24999 |
Description: View CSAF
1. EXECUTIVE SUMMARY
CVSS v4 8.7
ATTENTION: Exploitable remotely/low attack complexity
Vendor: ABB
Equipment: RMC-100
Vulnerability: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
2. RISK EVALUATION
Successful exploitation of this vulnerability could allow an attacker to send a specially crafted message to the web UI, causing a temporary denial of service until the interface can be restarted.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
ABB reports that the following products are affected when the REST interface is enabled:
RMC-100: Versions 2105457-036 to 2105457-044
RMC-100 LITE: Versions 2106229-010 to 2106229-016
3.2 VULNERABILITY OVERVIEW
3.2.1 IMPROPERLY CONTROLLED MODIFICATION OF OBJECT PROTOTYPE ATTRIBUTES ('PROTOTYPE POLLUTION') CWE-1321
A vulnerability exists in the web UI (REST interface) included in the product versions listed above. An attacker could exploit the vulnerability by sending a specially crafted message to the web UI node, causing a node process hang, requiring restart of the REST interface (disable/enable).
CVE-2022-24999 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
A CVSS v4 score has also been calculated for CVE-2022-24999. A base score of 8.7 has been calculated; the CVSS vector string is (CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N).
3.3 BACKGROUND
CRIT...
CVSS: HIGH (7.5)
March 25th, 2025 (3 months ago)
|
CVE-2020-27212 |
Description: View CSAF
1. EXECUTIVE SUMMARY
CVSS v4 7.3
ATTENTION: High attack complexity
Vendor: Rockwell Automation
Equipment: 440G TLS-Z
Vulnerability: Improper Neutralization of Special Elements in Output Used by a Downstream Component
2. RISK EVALUATION
Successful exploitation of this vulnerability could allow an attacker to take over the device.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
Rockwell Automation reports the following products are affected by a vulnerability because they use STMicroelectronics STM32L4 devices:
440G TLS-Z: Version v6.001
3.2 VULNERABILITY OVERVIEW
3.2.1 IMPROPER NEUTRALIIZATION OF SPECIAL ELEMENTS IN OUTPUT USED BY A DOWNSTREAM COMPONENT CWE-74
A local code execution vulnerability exists in the STMicroelectronics STM32L4 devices due to having incorrect access controls. The affected product utilizes the STMicroelectronics STM32L4 device and because of the vulnerability, a threat actor could reverse protections that control access to the JTAG interface. If exploited, a threat actor can take over the device.
CVE-2020-27212 has been assigned to this vulnerability. A CVSS v3.1 base score of 7.0 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).
A CVSS v4 score has also been calculated for CVE-2020-27212. A base score of 7.3 has been calculated; the CVSS vector string is (CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N).
3.3 BACKGROUND
CRITICAL INFRASTRUCTURE SECTORS: Commercial Facilities
COUNT...
CVSS: HIGH (7.0)
March 25th, 2025 (3 months ago)
|
CVE-2025-27147 |
Description: The GLPI Inventory Plugin handles various types of tasks for GLPI agents, including network discovery and inventory (SNMP), software deployment, VMWare ESX host remote inventory, and data collection (files, Windows registry, WMI). Versions prior to 1.5.0 have an improper access control vulnerability. Version 1.5.0 fixes the vulnerability.
CVSS: HIGH (8.2) EPSS Score: 0.06% SSVC Exploitation: none
March 25th, 2025 (3 months ago)
|