CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2022-4046

Description: View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Exploitable remotely/low attack complexity Vendor: ABB Equipment: MV Drives Vulnerabilities: Improper Restriction of Operations within the Bounds of a Memory Buffer, Improper Input Validation, Out-of-bounds Write 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to gain full access to the drive or cause a denial-of-service condition. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS ABB reports that the following MV Drives are affected by CODESYS RTS (Runtime System) vulnerabilities: ACS6080: LAAAA 2.10.0 to LAAAB 5.06.1 ACS5000: LAAAB 4.03.0 to LAAAB 5.06.1 ACS6000: LAAAA 2.10.0 to LAAAB 5.06.1 3.2 VULNERABILITY OVERVIEW 3.2.1 IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119 The CODESYS Control runtime system does not restrict the memory access. An improper restriction of operations within the bounds of a memory buffer allows an attacker with access to the drive with user privileges to gain full access of the drive. CVE-2022-4046 has been assigned to this vulnerability. A CVSS v3.1 base score of 8.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). A CVSS v4 score has also been calculated for CVE-2022-4046. A base score of 8.7 has been calculated; the CVSS vector string is (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N). 3.2.2 IMPROPER INPUT VALIDATION CWE-20 In multiple versions of vario...

CVSS: HIGH (8.8)

Source: All CISA Advisories
April 22nd, 2025 (2 months ago)

CVE-2025-23176

Description: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

CVSS: HIGH (8.8)

EPSS Score: 0.03%

Source: CVE
April 22nd, 2025 (2 months ago)

CVE-2025-1951

Description: IBM Hardware Management Console - Power Systems V10.2.1030.0 and V10.3.1050.0 could allow a local user to execute commands as a privileged user due to execution of commands with unnecessary privileges.

CVSS: HIGH (8.4)

EPSS Score: 0.01%

Source: CVE
April 22nd, 2025 (2 months ago)

CVE-2025-2092

Description: Insertion of Sensitive Information into Log File in Checkmk GmbH's Checkmk versions <2.3.0p29, <2.2.0p41 and <=2.1.0p49 (EOL) causes remote site authentication secrets to be written to log files accessible to administrators.

CVSS: HIGH (7.1)

EPSS Score: 0.02%

Source: CVE
April 22nd, 2025 (2 months ago)

CVE-2025-46252

Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in kofimokome Message Filter for Contact Form 7 allows SQL Injection. This issue affects Message Filter for Contact Form 7: from n/a through 1.6.3.2.

CVSS: HIGH (7.6)

EPSS Score: 0.04%

Source: CVE
April 22nd, 2025 (2 months ago)

CVE-2025-46251

Description: Cross-Site Request Forgery (CSRF) vulnerability in e4jvikwp VikRestaurants Table Reservations and Take-Away allows Cross Site Request Forgery. This issue affects VikRestaurants Table Reservations and Take-Away: from n/a through 1.3.3.

CVSS: HIGH (7.1)

EPSS Score: 0.02%

Source: CVE
April 22nd, 2025 (2 months ago)

CVE-2025-46242

Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Bob Watu Quiz allows SQL Injection. This issue affects Watu Quiz: from n/a through 3.4.3.

CVSS: HIGH (7.6)

EPSS Score: 0.03%

Source: CVE
April 22nd, 2025 (2 months ago)

CVE-2025-46241

Description: Cross-Site Request Forgery (CSRF) vulnerability in codepeople Appointment Booking Calendar allows SQL Injection. This issue affects Appointment Booking Calendar: from n/a through 1.3.92.

CVSS: HIGH (8.2)

EPSS Score: 0.02%

Source: CVE
April 22nd, 2025 (2 months ago)

CVE-2025-3519

Description: An authorization bypass in Unblu Spark allows a participant of a conversation to replace an existing, uploaded file. Every uploaded file in Unblu gets assigned with a randomly generated Universally Unique ID (UUID). In case a participant of this or another conversation gets access to such a file ID, it can be used to replace the file without changing the file name and details or the name of the user who uploaded the file. During the upload, file interception and allowed file type rules are still applied correctly.

CVSS: HIGH (7.0)

EPSS Score: 0.04%

Source: CVE
April 22nd, 2025 (2 months ago)

CVE-2024-55549

Description: Nessus Plugin ID 234704 with High Severity Synopsis The remote Amazon Linux AMI host is missing a security update. Description The version of libxslt installed on the remote host is prior to 1.1.28-6.16. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS-2025-1968 advisory. xsltGetInheritedNsList in libxslt before 1.1.43 has a use-after-free issue related to exclusion of result prefixes. (CVE-2024-55549) numbers.c in libxslt before 1.1.43 has a use-after-free because, in nested XPath evaluations, an XPath context node can be modified but never restored. This is related to xsltNumberFormatGetValue, xsltEvalXPathPredicate, xsltEvalXPathStringNs, and xsltComputeSortResultInternal. (CVE-2025-24855)Tenable has extracted the preceding description block directly from the tested product security advisory.Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number. Solution Run 'yum update libxslt' to update your system. Read more at https://www.tenable.com/plugins/nessus/234704

CVSS: HIGH (7.8)

Source: Tenable Plugins
April 22nd, 2025 (2 months ago)