CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2024-40715

Description: A vulnerability in Veeam Backup & Replication Enterprise Manager has been identified, which allows attackers to perform authentication bypass. Attackers must be able to perform Man-in-the-Middle (MITM) attack to exploit this vulnerability.

CVSS: HIGH (7.7)

EPSS Score: 0.13%

SSVC Exploitation: none

Source: CVE
March 25th, 2025 (3 months ago)
Description: Impact Making crafted requests could lead to information disclosure that could further lead to account takeover. Workarounds There's no workaround to fix this without upgrading. Credits Thanks to Thanh of Calif.io for reporting the issue References https://github.com/frappe/frappe/security/advisories/GHSA-qrv3-jc3h-f3m6 https://nvd.nist.gov/vuln/detail/CVE-2025-30214 https://github.com/advisories/GHSA-qrv3-jc3h-f3m6

CVSS: HIGH (8.0)

EPSS Score: 0.06%

Source: Github Advisory Database (PIP)
March 25th, 2025 (3 months ago)

CVE-2025-30214

Description: Frappe is a full-stack web application framework. Prior to versions 14.89.0 and 15.51.0, making crafted requests could lead to information disclosure that could further lead to account takeover. Versions 14.89.0 and 15.51.0 fix the issue. There's no workaround to fix this without upgrading.

CVSS: HIGH (8.0)

EPSS Score: 0.06%

SSVC Exploitation: none

Source: CVE
March 25th, 2025 (3 months ago)

CVE-2024-25021

Description: IBM AIX 7.3, VIOS 4.1's Perl implementation could allow a non-privileged local user to exploit a vulnerability to execute arbitrary commands. IBM X-Force ID: 281320.

CVSS: HIGH (8.4)

EPSS Score: 0.02%

SSVC Exploitation: none

Source: CVE
March 25th, 2025 (3 months ago)
Description: A security issue was discovered in ingress-nginx where the mirror-target and mirror-host Ingress annotations can be used to inject arbitrary configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.) References https://nvd.nist.gov/vuln/detail/CVE-2025-1098 https://github.com/kubernetes/kubernetes/issues/131008 https://github.com/kubernetes/ingress-nginx/releases/tag/controller-v1.11.5 https://github.com/kubernetes/ingress-nginx/releases/tag/controller-v1.12.1 https://groups.google.com/g/kubernetes-security-announce/c/2qa9DFtN0cQ https://github.com/advisories/GHSA-vg63-w3p9-jc9m

CVSS: HIGH (8.8)

EPSS Score: 26.45%

Source: Github Advisory Database (Go)
March 25th, 2025 (3 months ago)
Description: A security issue was discovered in ingress-nginx where the auth-tls-match-cn Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.) References https://nvd.nist.gov/vuln/detail/CVE-2025-1097 https://github.com/kubernetes/kubernetes/issues/131007 https://github.com/kubernetes/ingress-nginx/releases/tag/controller-v1.11.5 https://github.com/kubernetes/ingress-nginx/releases/tag/controller-v1.12.1 https://groups.google.com/g/kubernetes-security-announce/c/2qa9DFtN0cQ https://github.com/advisories/GHSA-823x-fv5p-h7hw

CVSS: HIGH (8.8)

EPSS Score: 4.82%

Source: Github Advisory Database (Go)
March 25th, 2025 (3 months ago)
Description: A security issue was discovered in ingress-nginx where the auth-url Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.) References https://nvd.nist.gov/vuln/detail/CVE-2025-24514 https://github.com/kubernetes/kubernetes/issues/131006 https://github.com/kubernetes/ingress-nginx/releases/tag/controller-v1.11.5 https://github.com/kubernetes/ingress-nginx/releases/tag/controller-v1.12.1 https://groups.google.com/g/kubernetes-security-announce/c/2qa9DFtN0cQ https://github.com/advisories/GHSA-fwwp-xcxw-39vq

CVSS: HIGH (8.8)

EPSS Score: 26.45%

Source: Github Advisory Database (Go)
March 25th, 2025 (3 months ago)

CVE-2022-24999

Description: View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Exploitable remotely/low attack complexity Vendor: ABB Equipment: RMC-100 Vulnerability: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to send a specially crafted message to the web UI, causing a temporary denial of service until the interface can be restarted. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS ABB reports that the following products are affected when the REST interface is enabled: RMC-100: Versions 2105457-036 to 2105457-044 RMC-100 LITE: Versions 2106229-010 to 2106229-016 3.2 VULNERABILITY OVERVIEW 3.2.1 IMPROPERLY CONTROLLED MODIFICATION OF OBJECT PROTOTYPE ATTRIBUTES ('PROTOTYPE POLLUTION') CWE-1321 A vulnerability exists in the web UI (REST interface) included in the product versions listed above. An attacker could exploit the vulnerability by sending a specially crafted message to the web UI node, causing a node process hang, requiring restart of the REST interface (disable/enable). CVE-2022-24999 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). A CVSS v4 score has also been calculated for CVE-2022-24999. A base score of 8.7 has been calculated; the CVSS vector string is (CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N). 3.3 BACKGROUND CRIT...

CVSS: HIGH (7.5)

Source: All CISA Advisories
March 25th, 2025 (3 months ago)

CVE-2020-27212

Description: View CSAF 1. EXECUTIVE SUMMARY CVSS v4 7.3 ATTENTION: High attack complexity Vendor: Rockwell Automation Equipment: 440G TLS-Z Vulnerability: Improper Neutralization of Special Elements in Output Used by a Downstream Component 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to take over the device. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS Rockwell Automation reports the following products are affected by a vulnerability because they use STMicroelectronics STM32L4 devices: 440G TLS-Z: Version v6.001 3.2 VULNERABILITY OVERVIEW 3.2.1 IMPROPER NEUTRALIIZATION OF SPECIAL ELEMENTS IN OUTPUT USED BY A DOWNSTREAM COMPONENT CWE-74 A local code execution vulnerability exists in the STMicroelectronics STM32L4 devices due to having incorrect access controls. The affected product utilizes the STMicroelectronics STM32L4 device and because of the vulnerability, a threat actor could reverse protections that control access to the JTAG interface. If exploited, a threat actor can take over the device. CVE-2020-27212 has been assigned to this vulnerability. A CVSS v3.1 base score of 7.0 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H). A CVSS v4 score has also been calculated for CVE-2020-27212. A base score of 7.3 has been calculated; the CVSS vector string is (CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N). 3.3 BACKGROUND CRITICAL INFRASTRUCTURE SECTORS: Commercial Facilities COUNT...

CVSS: HIGH (7.0)

Source: All CISA Advisories
March 25th, 2025 (3 months ago)

CVE-2025-27147

Description: The GLPI Inventory Plugin handles various types of tasks for GLPI agents, including network discovery and inventory (SNMP), software deployment, VMWare ESX host remote inventory, and data collection (files, Windows registry, WMI). Versions prior to 1.5.0 have an improper access control vulnerability. Version 1.5.0 fixes the vulnerability.

CVSS: HIGH (8.2)

EPSS Score: 0.06%

SSVC Exploitation: none

Source: CVE
March 25th, 2025 (3 months ago)