CVE-2022-4046 |
Description: View CSAF
1. EXECUTIVE SUMMARY
CVSS v4 8.7
ATTENTION: Exploitable remotely/low attack complexity
Vendor: ABB
Equipment: MV Drives
Vulnerabilities: Improper Restriction of Operations within the Bounds of a Memory Buffer, Improper Input Validation, Out-of-bounds Write
2. RISK EVALUATION
Successful exploitation of these vulnerabilities could allow an attacker to gain full access to the drive or cause a denial-of-service condition.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
ABB reports that the following MV Drives are affected by CODESYS RTS (Runtime System) vulnerabilities:
ACS6080: LAAAA 2.10.0 to LAAAB 5.06.1
ACS5000: LAAAB 4.03.0 to LAAAB 5.06.1
ACS6000: LAAAA 2.10.0 to LAAAB 5.06.1
3.2 VULNERABILITY OVERVIEW
3.2.1 IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119
The CODESYS Control runtime system does not restrict the memory access. An improper restriction of operations within the bounds of a memory buffer allows an attacker with access to the drive with user privileges to gain full access of the drive.
CVE-2022-4046 has been assigned to this vulnerability. A CVSS v3.1 base score of 8.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
A CVSS v4 score has also been calculated for CVE-2022-4046. A base score of 8.7 has been calculated; the CVSS vector string is (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N).
3.2.2 IMPROPER INPUT VALIDATION CWE-20
In multiple versions of vario...
CVSS: HIGH (8.8)
April 22nd, 2025 (2 months ago)
|
CVE-2025-23176 |
Description: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVSS: HIGH (8.8) EPSS Score: 0.03%
April 22nd, 2025 (2 months ago)
|
CVE-2025-1951 |
Description: IBM Hardware Management Console - Power Systems V10.2.1030.0 and V10.3.1050.0 could allow a local user to execute commands as a privileged user due to execution of commands with unnecessary privileges.
CVSS: HIGH (8.4) EPSS Score: 0.01%
April 22nd, 2025 (2 months ago)
|
CVE-2025-2092 |
Description: Insertion of Sensitive Information into Log File in Checkmk GmbH's Checkmk versions <2.3.0p29, <2.2.0p41 and <=2.1.0p49 (EOL) causes remote site authentication secrets to be written to log files accessible to administrators.
CVSS: HIGH (7.1) EPSS Score: 0.02%
April 22nd, 2025 (2 months ago)
|
CVE-2025-46252 |
Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in kofimokome Message Filter for Contact Form 7 allows SQL Injection. This issue affects Message Filter for Contact Form 7: from n/a through 1.6.3.2.
CVSS: HIGH (7.6) EPSS Score: 0.04%
April 22nd, 2025 (2 months ago)
|
CVE-2025-46251 |
Description: Cross-Site Request Forgery (CSRF) vulnerability in e4jvikwp VikRestaurants Table Reservations and Take-Away allows Cross Site Request Forgery. This issue affects VikRestaurants Table Reservations and Take-Away: from n/a through 1.3.3.
CVSS: HIGH (7.1) EPSS Score: 0.02%
April 22nd, 2025 (2 months ago)
|
CVE-2025-46242 |
Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Bob Watu Quiz allows SQL Injection. This issue affects Watu Quiz: from n/a through 3.4.3.
CVSS: HIGH (7.6) EPSS Score: 0.03%
April 22nd, 2025 (2 months ago)
|
CVE-2025-46241 |
Description: Cross-Site Request Forgery (CSRF) vulnerability in codepeople Appointment Booking Calendar allows SQL Injection. This issue affects Appointment Booking Calendar: from n/a through 1.3.92.
CVSS: HIGH (8.2) EPSS Score: 0.02%
April 22nd, 2025 (2 months ago)
|
CVE-2025-3519 |
Description: An authorization bypass in Unblu Spark allows a participant of a conversation to replace an existing, uploaded file.
Every uploaded file in Unblu gets assigned with a randomly generated Universally Unique ID (UUID). In case a participant of this or another conversation gets access to such a file ID, it can be used to replace the file without changing the file name and details or the name of the user who uploaded the file. During the upload, file interception and allowed file type rules are still applied correctly.
CVSS: HIGH (7.0) EPSS Score: 0.04%
April 22nd, 2025 (2 months ago)
|
CVE-2024-55549 |
Description:
Nessus Plugin ID 234704 with High Severity
Synopsis
The remote Amazon Linux AMI host is missing a security update.
Description
The version of libxslt installed on the remote host is prior to 1.1.28-6.16. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS-2025-1968 advisory. xsltGetInheritedNsList in libxslt before 1.1.43 has a use-after-free issue related to exclusion of result prefixes. (CVE-2024-55549) numbers.c in libxslt before 1.1.43 has a use-after-free because, in nested XPath evaluations, an XPath context node can be modified but never restored. This is related to xsltNumberFormatGetValue, xsltEvalXPathPredicate, xsltEvalXPathStringNs, and xsltComputeSortResultInternal. (CVE-2025-24855)Tenable has extracted the preceding description block directly from the tested product security advisory.Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
Solution
Run 'yum update libxslt' to update your system.
Read more at https://www.tenable.com/plugins/nessus/234704
CVSS: HIGH (7.8)
April 22nd, 2025 (2 months ago)
|