Weekly Vulnerabilities Reports > February 19 to 25, 2024

Overview

217 new vulnerabilities reported during this period, including 24 critical vulnerabilities and 71 high severity vulnerabilities. This weekly summary report vulnerabilities in 109 products from 62 vendors including Linux, Apple, Liferay, Fedoraproject, and Google. Vulnerabilities are notably categorized as "Cross-site Scripting", "NULL Pointer Dereference", "Use After Free", "Improper Restriction of Operations within the Bounds of a Memory Buffer", and "Path Traversal".

  • 138 reported vulnerabilities are remotely exploitables.
  • 46 reported vulnerabilities are related to weaknesses in OWASP Top Ten.
  • 113 reported vulnerabilities are exploitable by an anonymous user.
  • Linux has the most reported vulnerabilities, with 48 reported vulnerabilities.
  • Code Projects has the most reported critical vulnerabilities, with 6 reported vulnerabilities.

TOTAL
VULNERABILITIES
CRITICAL RISK
VULNERABILITIES
HIGH RISK
VULNERABILITIES
MEDIUM RISK
VULNERABILITIES
LOW RISK
VULNERABILITIES
REMOTELY
EXPLOITABLE
LOCALLY
EXPLOITABLE
EXPLOIT
AVAILABLE
EXPLOITABLE
ANONYMOUSLY
AFFECTING
WEB APPLICATION

Vulnerability Details

The following table list reported vulnerabilities for the period covered by this report:

Expand/Hide

24 Critical Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2024-02-21 CVE-2024-1709 Connectwise Unspecified vulnerability in Connectwise Screenconnect 22.7/23.8.4/23.8.5

ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Alternate Path or Channel vulnerability, which may allow an attacker direct access to confidential information or critical systems.

10.0
2024-02-23 CVE-2024-1832 Nelzkie15 Unspecified vulnerability in Nelzkie15 Complete File Management System 1.0

A vulnerability has been found in SourceCodester Complete File Management System 1.0 and classified as critical.

9.8
2024-02-23 CVE-2024-1833 Walterjnr1 Unspecified vulnerability in Walterjnr1 Employee Management System 1.0

A vulnerability was found in SourceCodester Employee Management System 1.0 and classified as critical.

9.8
2024-02-23 CVE-2024-1830 Code Projects Unspecified vulnerability in Code-Projects Library System 1.0

A vulnerability was found in code-projects Library System 1.0.

9.8
2024-02-23 CVE-2024-1831 Nelzkie15 Unspecified vulnerability in Nelzkie15 Complete File Management System 1.0

A vulnerability, which was classified as critical, was found in SourceCodester Complete File Management System 1.0.

9.8
2024-02-23 CVE-2024-1827 Code Projects Unspecified vulnerability in Code-Projects Library System 1.0

A vulnerability was found in code-projects Library System 1.0 and classified as critical.

9.8
2024-02-23 CVE-2024-1828 Code Projects Unspecified vulnerability in Code-Projects Library System 1.0

A vulnerability was found in code-projects Library System 1.0.

9.8
2024-02-23 CVE-2024-1829 Code Projects Unspecified vulnerability in Code-Projects Library System 1.0

A vulnerability was found in code-projects Library System 1.0.

9.8
2024-02-23 CVE-2024-1826 Code Projects Unspecified vulnerability in Code-Projects Library System 1.0

A vulnerability has been found in code-projects Library System 1.0 and classified as critical.

9.8
2024-02-23 CVE-2024-1820 Code Projects Unspecified vulnerability in Code-Projects Crime Reporting System 1.0

A vulnerability was found in code-projects Crime Reporting System 1.0.

9.8
2024-02-23 CVE-2024-1824 Codeastro Unspecified vulnerability in Codeastro House Rental Management System 1.0

A vulnerability, which was classified as critical, has been found in CodeAstro House Rental Management System 1.0.

9.8
2024-02-23 CVE-2024-1817 Demososo Unspecified vulnerability in Demososo DM Enterprise Website Building System

A vulnerability has been found in Demososo DM Enterprise Website Building System up to 2022.8 and classified as critical.

9.8
2024-02-22 CVE-2023-51388 Apache Injection vulnerability in Apache Hertzbeat

Hertzbeat is a real-time monitoring system.

9.8
2024-02-22 CVE-2023-51389 Apache Deserialization of Untrusted Data vulnerability in Apache Hertzbeat

Hertzbeat is a real-time monitoring system.

9.8
2024-02-22 CVE-2023-51653 Apache Injection vulnerability in Apache Hertzbeat

Hertzbeat is a real-time monitoring system.

9.8
2024-02-21 CVE-2024-1212 Progress OS Command Injection vulnerability in Progress Loadmaster

Unauthenticated remote attackers can access the system through the LoadMaster management interface, enabling arbitrary system command execution.

9.8
2024-02-20 CVE-2024-1297 Loomio OS Command Injection vulnerability in Loomio 2.22.0

Loomio version 2.22.0 allows executing arbitrary commands on the server. This is possible because the application is vulnerable to OS Command Injection.

9.8
2024-02-19 CVE-2024-25626 Linuxfoundation OS Command Injection vulnerability in Linuxfoundation Yocto

Yocto Project is an open source collaboration project that helps developers create custom Linux-based systems regardless of the hardware architecture.

9.8
2024-02-19 CVE-2024-1597 Postgresql
Fedoraproject
SQL Injection vulnerability in multiple products

pgjdbc, the PostgreSQL JDBC Driver, allows attacker to inject SQL if using PreferQueryMode=SIMPLE.

9.8
2024-02-23 CVE-2024-27132 Lfprojects Unspecified vulnerability in Lfprojects Mlflow

Insufficient sanitization in MLflow leads to XSS when running an untrusted recipe. This issue leads to a client-side RCE when running an untrusted recipe in Jupyter Notebook. The vulnerability stems from lack of sanitization over template variables.

9.6
2024-02-23 CVE-2024-27133 Lfprojects Unspecified vulnerability in Lfprojects Mlflow

Insufficient sanitization in MLflow leads to XSS when running a recipe that uses an untrusted dataset.

9.6
2024-02-23 CVE-2022-43842 IBM Unspecified vulnerability in IBM Aspera Console 3.4.0/3.4.1/3.4.2

IBM Aspera Console 3.4.0 through 3.4.2 is vulnerable to SQL injection.

9.1
2024-02-23 CVE-2024-27319 Linuxfoundation
Fedoraproject
Out-of-bounds Read vulnerability in multiple products

Versions of the package onnx before and including 1.15.0 are vulnerable to Out-of-bounds Read as the ONNX_ASSERT and ONNX_ASSERTM functions have an off by one string copy.

9.1
2024-02-19 CVE-2024-1638 Zephyrproject Unspecified vulnerability in Zephyrproject Zephyr

The documentation specifies that the BT_GATT_PERM_READ_LESC and BT_GATT_PERM_WRITE_LESC defines for a Bluetooth characteristic: Attribute read/write permission with LE Secure Connection encryption.

9.1

71 High Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2024-02-23 CVE-2024-1821 Code Projects Unspecified vulnerability in Code-Projects Crime Reporting System 1.0

A vulnerability was found in code-projects Crime Reporting System 1.0.

8.8
2024-02-22 CVE-2023-29181 Fortinet Use of Externally-Controlled Format String vulnerability in Fortinet Fortiproxy

A use of externally-controlled format string in Fortinet FortiOS 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.12, 6.2.0 through 6.2.14, 6.0.0 through 6.0.16, FortiProxy 7.2.0 through 7.2.4, 7.0.0 through 7.0.10, 2.0.0 through 2.0.12, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiPAM 1.0.0 through 1.0.3 allows attacker to execute unauthorized code or commands via specially crafted command.

8.8
2024-02-21 CVE-2024-1669 Google
Fedoraproject
Out-of-bounds Write vulnerability in multiple products

Out of bounds memory access in Blink in Google Chrome prior to 122.0.6261.57 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page.

8.8
2024-02-21 CVE-2024-1670 Google
Fedoraproject
Use After Free vulnerability in multiple products

Use after free in Mojo in Google Chrome prior to 122.0.6261.57 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

8.8
2024-02-21 CVE-2024-1673 Google
Fedoraproject
Use After Free vulnerability in multiple products

Use after free in Accessibility in Google Chrome prior to 122.0.6261.57 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via specific UI gestures.

8.8
2024-02-21 CVE-2024-1674 Google
Fedoraproject
Inappropriate implementation in Navigation in Google Chrome prior to 122.0.6261.57 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
8.8
2024-02-21 CVE-2024-1675 Google
Fedoraproject
Insufficient policy enforcement in Download in Google Chrome prior to 122.0.6261.57 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page.
8.8
2024-02-20 CVE-2024-26135 Meshcentral Origin Validation Error vulnerability in Meshcentral

MeshCentral is a full computer management web site.

8.8
2024-02-20 CVE-2023-42791 Fortinet Path Traversal vulnerability in Fortinet Fortimanager

A relative path traversal in Fortinet FortiManager version 7.4.0 and 7.2.0 through 7.2.3 and 7.0.0 through 7.0.8 and 6.4.0 through 6.4.12 and 6.2.0 through 6.2.11 allows attacker to execute unauthorized code or commands via crafted HTTP requests.

8.8
2024-02-20 CVE-2024-1644 Salesagility Unspecified vulnerability in Salesagility Suitecrm 7.14.2

Suite CRM version 7.14.2 allows including local php files.

8.8
2024-02-19 CVE-2024-25635 ALF Unspecified vulnerability in ALF 2.0M42304

alf.io is an open source ticket reservation system.

8.8
2024-02-19 CVE-2024-25982 Moodle
Fedoraproject
Cross-Site Request Forgery (CSRF) vulnerability in multiple products

The link to update all installed language packs did not include the necessary token to prevent a CSRF risk.

8.8
2024-02-19 CVE-2024-1580 Videolan
Apple
Fedoraproject
Integer Overflow or Wraparound vulnerability in multiple products

An integer overflow in dav1d AV1 decoder that can occur when decoding videos with large frame size.

8.8
2024-02-22 CVE-2024-1451 Gitlab Cross-site Scripting vulnerability in Gitlab 16.9.0

An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.9 before 16.9.1.

8.7
2024-02-20 CVE-2024-25606 Liferay XXE vulnerability in Liferay Digital Experience Platform

XXE vulnerability in Liferay Portal 7.2.0 through 7.4.3.7, and older unsupported versions, and Liferay DXP 7.4 before update 4, 7.3 before update 12, 7.2 before fix pack 20, and older unsupported versions allows attackers with permission to deploy widgets/portlets/extensions to obtain sensitive information or consume system resources via the Java2WsddTask._format method.

8.7
2024-02-21 CVE-2023-42838 Apple Unspecified vulnerability in Apple Macos

An access issue was addressed with improvements to the sandbox.

8.6
2024-02-21 CVE-2024-1708 Connectwise Path Traversal vulnerability in Connectwise Screenconnect 22.7/23.8.4/23.8.5

ConnectWise ScreenConnect 23.9.7 and prior are affected by path-traversal vulnerability, which may allow an attacker the ability to execute remote code or directly impact confidential data or critical systems.

8.4
2024-02-20 CVE-2024-23830 Mantisbt Unspecified vulnerability in Mantisbt

MantisBT is an open source issue tracker.

8.3
2024-02-21 CVE-2024-1108 Davidcramer Missing Authorization vulnerability in Davidcramer Plugin Groups

The Plugin Groups plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the admin_init() function in all versions up to, and including, 2.0.6.

8.2
2024-02-22 CVE-2024-1750 Temmokumvc Unspecified vulnerability in Temmokumvc

A vulnerability, which was classified as critical, was found in TemmokuMVC up to 2.3.

8.1
2024-02-22 CVE-2023-51450 Basercms OS Command Injection vulnerability in Basercms

baserCMS is a website development framework.

8.1
2024-02-22 CVE-2024-1563 Mozilla Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Mozilla Firefox Focus

An attacker could have executed unauthorized scripts on top origin sites using a JavaScript URI when opening an external URL with a custom Firefox scheme and a timeout race condition.

8.1
2024-02-21 CVE-2024-1704 Crmeb Path Traversal vulnerability in Crmeb 5.2.2

A vulnerability was found in ZhongBangKeJi CRMEB 5.2.2.

8.1
2024-02-20 CVE-2023-52434 Linux
Debian
Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential OOBs in smb2_parse_contexts() Validate offsets and lengths before dereferencing create contexts in smb2_parse_contexts(). This fixes following oops when accessing invalid create contexts from server: BUG: unable to handle page fault for address: ffff8881178d8cc3 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 4a01067 P4D 4a01067 PUD 0 Oops: 0000 [#1] PREEMPT SMP NOPTI CPU: 3 PID: 1736 Comm: mount.cifs Not tainted 6.7.0-rc4 #1 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.2-3-gd478f380-rebuilt.opensuse.org 04/01/2014 RIP: 0010:smb2_parse_contexts+0xa0/0x3a0 [cifs] Code: f8 10 75 13 48 b8 93 ad 25 50 9c b4 11 e7 49 39 06 0f 84 d2 00 00 00 8b 45 00 85 c0 74 61 41 29 c5 48 01 c5 41 83 fd 0f 76 55 <0f> b7 7d 04 0f b7 45 06 4c 8d 74 3d 00 66 83 f8 04 75 bc ba 04 00 RSP: 0018:ffffc900007939e0 EFLAGS: 00010216 RAX: ffffc90000793c78 RBX: ffff8880180cc000 RCX: ffffc90000793c90 RDX: ffffc90000793cc0 RSI: ffff8880178d8cc0 RDI: ffff8880180cc000 RBP: ffff8881178d8cbf R08: ffffc90000793c22 R09: 0000000000000000 R10: ffff8880180cc000 R11: 0000000000000024 R12: 0000000000000000 R13: 0000000000000020 R14: 0000000000000000 R15: ffffc90000793c22 FS: 00007f873753cbc0(0000) GS:ffff88806bc00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff8881178d8cc3 CR3: 00000000181ca000 CR4: 0000000000750ef0 PKRU: 55555554 Call Trace: <TASK> ? __die+0x23/0x70 ? page_fault_oops+0x181/0x480 ? search_module_extables+0x19/0x60 ? srso_alias_return_thunk+0x5/0xfbef5 ? exc_page_fault+0x1b6/0x1c0 ? asm_exc_page_fault+0x26/0x30 ? smb2_parse_contexts+0xa0/0x3a0 [cifs] SMB2_open+0x38d/0x5f0 [cifs] ? smb2_is_path_accessible+0x138/0x260 [cifs] smb2_is_path_accessible+0x138/0x260 [cifs] cifs_is_path_remote+0x8d/0x230 [cifs] cifs_mount+0x7e/0x350 [cifs] cifs_smb3_do_mount+0x128/0x780 [cifs] smb3_get_tree+0xd9/0x290 [cifs] vfs_get_tree+0x2c/0x100 ? capable+0x37/0x70 path_mount+0x2d7/0xb80 ? srso_alias_return_thunk+0x5/0xfbef5 ? _raw_spin_unlock_irqrestore+0x44/0x60 __x64_sys_mount+0x11a/0x150 do_syscall_64+0x47/0xf0 entry_SYSCALL_64_after_hwframe+0x6f/0x77 RIP: 0033:0x7f8737657b1e

8.0
2024-02-23 CVE-2023-52455 Linux Unspecified vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: iommu: Don't reserve 0-length IOVA region When the bootloader/firmware doesn't setup the framebuffers, their address and size are 0 in "iommu-addresses" property.

7.8
2024-02-23 CVE-2023-52457 Linux Use After Free vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed Returning an error code from .remove() makes the driver core emit the little helpful error message: remove callback returned a non-zero value.

7.8
2024-02-23 CVE-2023-52464 Linux Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: EDAC/thunderx: Fix possible out-of-bounds string access Enabling -Wstringop-overflow globally exposes a warning for a common bug in the usage of strncat(): drivers/edac/thunderx_edac.c: In function 'thunderx_ocx_com_threaded_isr': drivers/edac/thunderx_edac.c:1136:17: error: 'strncat' specified bound 1024 equals destination size [-Werror=stringop-overflow=] 1136 | strncat(msg, other, OCX_MESSAGE_SIZE); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ... 1145 | strncat(msg, other, OCX_MESSAGE_SIZE); ... 1150 | strncat(msg, other, OCX_MESSAGE_SIZE); ... Apparently the author of this driver expected strncat() to behave the way that strlcat() does, which uses the size of the destination buffer as its third argument rather than the length of the source buffer.

7.8
2024-02-23 CVE-2024-26598 Linux
Debian
Use After Free vulnerability in multiple products

In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache There is a potential UAF scenario in the case of an LPI translation cache hit racing with an operation that invalidates the cache, such as a DISCARD ITS command.

7.8
2024-02-23 CVE-2024-26599 Linux Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: pwm: Fix out-of-bounds access in of_pwm_single_xlate() With args->args_count == 2 args->args[2] is not defined.

7.8
2024-02-22 CVE-2023-52444 Linux Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid dirent corruption As Al reported in link[1]: f2fs_rename() ... if (old_dir != new_dir && !whiteout) f2fs_set_link(old_inode, old_dir_entry, old_dir_page, new_dir); else f2fs_put_page(old_dir_page, 0); You want correct inumber in the ".." link.

7.8
2024-02-22 CVE-2023-52445 Linux Use After Free vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: media: pvrusb2: fix use after free on context disconnection Upon module load, a kthread is created targeting the pvr2_context_thread_func function, which may call pvr2_context_destroy and thus call kfree() on the context object.

7.8
2024-02-22 CVE-2023-52446 Linux Use After Free vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: bpf: Fix a race condition between btf_put() and map_free() When running `./test_progs -j` in my local vm with latest kernel, I once hit a kasan error like below: [ 1887.184724] BUG: KASAN: slab-use-after-free in bpf_rb_root_free+0x1f8/0x2b0 [ 1887.185599] Read of size 4 at addr ffff888106806910 by task kworker/u12:2/2830 [ 1887.186498] [ 1887.186712] CPU: 3 PID: 2830 Comm: kworker/u12:2 Tainted: G OEL 6.7.0-rc3-00699-g90679706d486-dirty #494 [ 1887.188034] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1887.189618] Workqueue: events_unbound bpf_map_free_deferred [ 1887.190341] Call Trace: [ 1887.190666] <TASK> [ 1887.190949] dump_stack_lvl+0xac/0xe0 [ 1887.191423] ? nf_tcp_handle_invalid+0x1b0/0x1b0 [ 1887.192019] ? panic+0x3c0/0x3c0 [ 1887.192449] print_report+0x14f/0x720 [ 1887.192930] ? preempt_count_sub+0x1c/0xd0 [ 1887.193459] ? __virt_addr_valid+0xac/0x120 [ 1887.194004] ? bpf_rb_root_free+0x1f8/0x2b0 [ 1887.194572] kasan_report+0xc3/0x100 [ 1887.195085] ? bpf_rb_root_free+0x1f8/0x2b0 [ 1887.195668] bpf_rb_root_free+0x1f8/0x2b0 [ 1887.196183] ? __bpf_obj_drop_impl+0xb0/0xb0 [ 1887.196736] ? preempt_count_sub+0x1c/0xd0 [ 1887.197270] ? preempt_count_sub+0x1c/0xd0 [ 1887.197802] ? _raw_spin_unlock+0x1f/0x40 [ 1887.198319] bpf_obj_free_fields+0x1d4/0x260 [ 1887.198883] array_map_free+0x1a3/0x260 [ 1887.199380] bpf_map_free_deferred+0x7b/0xe0 [ 1887.199943] process_scheduled_works+0x3a2/0x6c0 [ 1887.200549] worker_thread+0x633/0x890 [ 1887.201047] ? __kthread_parkme+0xd7/0xf0 [ 1887.201574] ? kthread+0x102/0x1d0 [ 1887.202020] kthread+0x1ab/0x1d0 [ 1887.202447] ? pr_cont_work+0x270/0x270 [ 1887.202954] ? kthread_blkcg+0x50/0x50 [ 1887.203444] ret_from_fork+0x34/0x50 [ 1887.203914] ? kthread_blkcg+0x50/0x50 [ 1887.204397] ret_from_fork_asm+0x11/0x20 [ 1887.204913] </TASK> [ 1887.204913] </TASK> [ 1887.205209] [ 1887.205416] Allocated by task 2197: [ 1887.205881] kasan_set_track+0x3f/0x60 [ 1887.206366] __kasan_kmalloc+0x6e/0x80 [ 1887.206856] __kmalloc+0xac/0x1a0 [ 1887.207293] btf_parse_fields+0xa15/0x1480 [ 1887.207836] btf_parse_struct_metas+0x566/0x670 [ 1887.208387] btf_new_fd+0x294/0x4d0 [ 1887.208851] __sys_bpf+0x4ba/0x600 [ 1887.209292] __x64_sys_bpf+0x41/0x50 [ 1887.209762] do_syscall_64+0x4c/0xf0 [ 1887.210222] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1887.210868] [ 1887.211074] Freed by task 36: [ 1887.211460] kasan_set_track+0x3f/0x60 [ 1887.211951] kasan_save_free_info+0x28/0x40 [ 1887.212485] ____kasan_slab_free+0x101/0x180 [ 1887.213027] __kmem_cache_free+0xe4/0x210 [ 1887.213514] btf_free+0x5b/0x130 [ 1887.213918] rcu_core+0x638/0xcc0 [ 1887.214347] __do_softirq+0x114/0x37e The error happens at bpf_rb_root_free+0x1f8/0x2b0: 00000000000034c0 <bpf_rb_root_free>: ; { 34c0: f3 0f 1e fa endbr64 34c4: e8 00 00 00 00 callq 0x34c9 <bpf_rb_root_free+0x9> 34c9: 55 pushq %rbp 34ca: 48 89 e5 movq %rsp, %rbp ... ; if (rec && rec->refcount_off >= 0 && 36aa: 4d 85 ed testq %r13, %r13 36ad: 74 a9 je 0x3658 <bpf_rb_root_free+0x198> 36af: 49 8d 7d 10 leaq 0x10(%r13), %rdi 36b3: e8 00 00 00 00 callq 0x36b8 <bpf_rb_root_free+0x1f8> <==== kasan function 36b8: 45 8b 7d 10 movl 0x10(%r13), %r15d <==== use-after-free load 36bc: 45 85 ff testl %r15d, %r15d 36bf: 78 8c js 0x364d <bpf_rb_root_free+0x18d> So the problem ---truncated---

7.8
2024-02-22 CVE-2023-52451 Linux Improper Validation of Array Index vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: powerpc/pseries/memhp: Fix access beyond end of drmem array dlpar_memory_remove_by_index() may access beyond the bounds of the drmem lmb array when the LMB lookup fails to match an entry with the given DRC index.

7.8
2024-02-22 CVE-2023-52452 Linux Improper Initialization vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: bpf: Fix accesses to uninit stack slots Privileged programs are supposed to be able to read uninitialized stack memory (ever since 6715df8d5) but, before this patch, these accesses were permitted inconsistently.

7.8
2024-02-22 CVE-2024-26588 Linux Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: LoongArch: BPF: Prevent out-of-bounds memory access The test_tag test triggers an unhandled page fault: # ./test_tag [ 130.640218] CPU 0 Unable to handle kernel paging request at virtual address ffff80001b898004, era == 9000000003137f7c, ra == 9000000003139e70 [ 130.640501] Oops[#3]: [ 130.640553] CPU: 0 PID: 1326 Comm: test_tag Tainted: G D O 6.7.0-rc4-loong-devel-gb62ab1a397cf #47 61985c1d94084daa2432f771daa45b56b10d8d2a [ 130.640764] Hardware name: QEMU QEMU Virtual Machine, BIOS unknown 2/2/2022 [ 130.640874] pc 9000000003137f7c ra 9000000003139e70 tp 9000000104cb4000 sp 9000000104cb7a40 [ 130.641001] a0 ffff80001b894000 a1 ffff80001b897ff8 a2 000000006ba210be a3 0000000000000000 [ 130.641128] a4 000000006ba210be a5 00000000000000f1 a6 00000000000000b3 a7 0000000000000000 [ 130.641256] t0 0000000000000000 t1 00000000000007f6 t2 0000000000000000 t3 9000000004091b70 [ 130.641387] t4 000000006ba210be t5 0000000000000004 t6 fffffffffffffff0 t7 90000000040913e0 [ 130.641512] t8 0000000000000005 u0 0000000000000dc0 s9 0000000000000009 s0 9000000104cb7ae0 [ 130.641641] s1 00000000000007f6 s2 0000000000000009 s3 0000000000000095 s4 0000000000000000 [ 130.641771] s5 ffff80001b894000 s6 ffff80001b897fb0 s7 9000000004090c50 s8 0000000000000000 [ 130.641900] ra: 9000000003139e70 build_body+0x1fcc/0x4988 [ 130.642007] ERA: 9000000003137f7c build_body+0xd8/0x4988 [ 130.642112] CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE) [ 130.642261] PRMD: 00000004 (PPLV0 +PIE -PWE) [ 130.642353] EUEN: 00000003 (+FPE +SXE -ASXE -BTE) [ 130.642458] ECFG: 00071c1c (LIE=2-4,10-12 VS=7) [ 130.642554] ESTAT: 00010000 [PIL] (IS= ECode=1 EsubCode=0) [ 130.642658] BADV: ffff80001b898004 [ 130.642719] PRID: 0014c010 (Loongson-64bit, Loongson-3A5000) [ 130.642815] Modules linked in: [last unloaded: bpf_testmod(O)] [ 130.642924] Process test_tag (pid: 1326, threadinfo=00000000f7f4015f, task=000000006499f9fd) [ 130.643062] Stack : 0000000000000000 9000000003380724 0000000000000000 0000000104cb7be8 [ 130.643213] 0000000000000000 25af8d9b6e600558 9000000106250ea0 9000000104cb7ae0 [ 130.643378] 0000000000000000 0000000000000000 9000000104cb7be8 90000000049f6000 [ 130.643538] 0000000000000090 9000000106250ea0 ffff80001b894000 ffff80001b894000 [ 130.643685] 00007ffffb917790 900000000313ca94 0000000000000000 0000000000000000 [ 130.643831] ffff80001b894000 0000000000000ff7 0000000000000000 9000000100468000 [ 130.643983] 0000000000000000 0000000000000000 0000000000000040 25af8d9b6e600558 [ 130.644131] 0000000000000bb7 ffff80001b894048 0000000000000000 0000000000000000 [ 130.644276] 9000000104cb7be8 90000000049f6000 0000000000000090 9000000104cb7bdc [ 130.644423] ffff80001b894000 0000000000000000 00007ffffb917790 90000000032acfb0 [ 130.644572] ... [ 130.644629] Call Trace: [ 130.644641] [<9000000003137f7c>] build_body+0xd8/0x4988 [ 130.644785] [<900000000313ca94>] bpf_int_jit_compile+0x228/0x4ec [ 130.644891] [<90000000032acfb0>] bpf_prog_select_runtime+0x158/0x1b0 [ 130.645003] [<90000000032b3504>] bpf_prog_load+0x760/0xb44 [ 130.645089] [<90000000032b6744>] __sys_bpf+0xbb8/0x2588 [ 130.645175] [<90000000032b8388>] sys_bpf+0x20/0x2c [ 130.645259] [<9000000003f6ab38>] do_syscall+0x7c/0x94 [ 130.645369] [<9000000003121c5c>] handle_syscall+0xbc/0x158 [ 130.645507] [ 130.645539] Code: 380839f6 380831f9 28412bae <24000ca6> 004081ad 0014cb50 004083e8 02bff34c 58008e91 [ 130.645729] [ 130.646418] ---[ end trace 0000000000000000 ]--- On my machine, which has CONFIG_PAGE_SIZE_16KB=y, the test failed at loading a BPF prog with 2039 instructions: prog = (struct bpf_prog *)ffff80001b894000 insn = (struct bpf_insn *)(prog->insnsi)fff ---truncated---

7.8
2024-02-22 CVE-2024-26589 Linux Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS For PTR_TO_FLOW_KEYS, check_flow_keys_access() only uses fixed off for validation.

7.8
2024-02-22 CVE-2024-26592 Linux Use After Free vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix UAF issue in ksmbd_tcp_new_connection() The race is between the handling of a new TCP connection and its disconnection.

7.8
2024-02-21 CVE-2024-26582 Linux Use After Free vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: net: tls: fix use-after-free with partial reads and async decrypt tls_decrypt_sg doesn't take a reference on the pages from clear_skb, so the put_page() in tls_decrypt_done releases them, and we trigger a use-after-free in process_rx_list when we try to read from the partially-read skb.

7.8
2024-02-21 CVE-2023-52440 Linux Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix slub overflow in ksmbd_decode_ntlmssp_auth_blob() If authblob->SessionKey.Length is bigger than session key size(CIFS_KEY_SIZE), slub overflow can happen in key exchange codes. cifs_arc4_crypt copy to session key array from SessionKey from client.

7.8
2024-02-21 CVE-2023-52441 Linux Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix out of bounds in init_smb2_rsp_hdr() If client send smb2 negotiate request and then send smb1 negotiate request, init_smb2_rsp_hdr is called for smb1 negotiate request since need_neg is set to false.

7.8
2024-02-21 CVE-2023-42848 Apple Out-of-bounds Write vulnerability in Apple products

The issue was addressed with improved bounds checks.

7.8
2024-02-21 CVE-2023-42873 Apple Unspecified vulnerability in Apple products

The issue was addressed with improved bounds checks.

7.8
2024-02-21 CVE-2023-42928 Apple Unspecified vulnerability in Apple Iphone OS

The issue was addressed with improved bounds checks.

7.8
2024-02-21 CVE-2023-42942 Apple Link Following vulnerability in Apple products

This issue was addressed with improved handling of symlinks.

7.8
2024-02-20 CVE-2023-52436 Linux Unspecified vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: f2fs: explicitly null-terminate the xattr list When setting an xattr, explicitly null-terminate the xattr list.

7.8
2024-02-20 CVE-2023-52438 Linux Use After Free vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: binder: fix use-after-free in shinker's callback The mmap read lock is used during the shrinker's callback, which means that using alloc->vma pointer isn't safe as it can race with munmap(). As of commit dd2283f2605e ("mm: mmap: zap pages with read mmap_sem in munmap") the mmap lock is downgraded after the vma has been isolated. I was able to reproduce this issue by manually adding some delays and triggering page reclaiming through the shrinker's debug sysfs.

7.8
2024-02-20 CVE-2023-52439 Linux Double Free vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: uio: Fix use-after-free in uio_open core-1 core-2 ------------------------------------------------------- uio_unregister_device uio_open idev = idr_find() device_unregister(&idev->dev) put_device(&idev->dev) uio_device_release get_device(&idev->dev) kfree(idev) uio_free_minor(minor) uio_release put_device(&idev->dev) kfree(idev) ------------------------------------------------------- In the core-1 uio_unregister_device(), the device_unregister will kfree idev when the idev->dev kobject ref is 1.

7.8
2024-02-20 CVE-2024-26581 Linux Unspecified vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_rbtree: skip end interval element from gc rbtree lazy gc on insert might collect an end interval element that has been just added in this transactions, skip end interval elements that are not yet active.

7.8
2024-02-22 CVE-2024-0410 Gitlab Unspecified vulnerability in Gitlab

An authorization bypass vulnerability was discovered in GitLab affecting versions 15.1 prior to 16.7.6, 16.8 prior to 16.8.3, and 16.9 prior to 16.9.1.

7.7
2024-02-19 CVE-2024-25623 Joinmastodon Unrestricted Upload of File with Dangerous Type vulnerability in Joinmastodon Mastodon

Mastodon is a free, open-source social network server based on ActivityPub.

7.7
2024-02-23 CVE-2024-27318 Linuxfoundation
Fedoraproject
Path Traversal vulnerability in multiple products

Versions of the package onnx before and including 1.15.0 are vulnerable to Directory Traversal as the external_data field of the tensor proto can have a path to the file which is outside the model current directory or user-provided directory.

7.5
2024-02-23 CVE-2024-1786 Dlink Unspecified vulnerability in Dlink Dir-600M Firmware 3.08

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, has been found in D-Link DIR-600M C1 3.08.

7.5
2024-02-22 CVE-2024-1748 Vanderschaar LAB Unspecified vulnerability in Vanderschaar-Lab Autoprognosis 0.1.21

A vulnerability classified as critical was found in van_der_Schaar LAB AutoPrognosis 0.1.21.

7.5
2024-02-22 CVE-2023-52161 Intel Improper Authentication vulnerability in Intel Inet Wireless Daemon

The Access Point functionality in eapol_auth_key_handle in eapol.c in iNet wireless daemon (IWD) before 2.14 allows attackers to gain unauthorized access to a protected Wi-Fi network.

7.5
2024-02-22 CVE-2023-29180 Fortinet NULL Pointer Dereference vulnerability in Fortinet Fortiproxy

A null pointer dereference in Fortinet FortiOS version 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.12, 6.2.0 through 6.2.14, 6.0.0 through 6.0.16, FortiProxy 7.2.0 through 7.2.3, 7.0.0 through 7.0.10, 2.0.0 through 2.0.12, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7 allows attacker to denial of service via specially crafted HTTP requests.

7.5
2024-02-21 CVE-2024-26147 Helm Use of Uninitialized Resource vulnerability in Helm

Helm is a package manager for Charts for Kubernetes.

7.5
2024-02-21 CVE-2022-45177 Liveboxcloud Information Exposure Through Discrepancy vulnerability in Liveboxcloud Vdesk 018/031

An issue was discovered in LIVEBOX Collaboration vDesk through v031.

7.5
2024-02-21 CVE-2023-42835 Apple Unspecified vulnerability in Apple Macos

A logic issue was addressed with improved checks.

7.5
2024-02-20 CVE-2024-1552 Mozilla
Debian
Incorrect Conversion between Numeric Types vulnerability in multiple products

Incorrect code generation could have led to unexpected numeric conversions and potential undefined behavior.*Note:* This issue only affects 32-bit ARM devices.

7.5
2024-02-20 CVE-2023-51770 Apache Unspecified vulnerability in Apache Dolphinscheduler

Arbitrary File Read Vulnerability in Apache Dolphinscheduler. This issue affects Apache DolphinScheduler: before 3.2.1.

7.5
2024-02-20 CVE-2024-25607 Liferay Use of Password Hash With Insufficient Computational Effort vulnerability in Liferay Digital Experience Platform

The default password hashing algorithm (PBKDF2-HMAC-SHA1) in Liferay Portal 7.2.0 through 7.4.3.15, and older unsupported versions, and Liferay DXP 7.4 before update 16, 7.3 before update 4, 7.2 before fix pack 17, and older unsupported versions defaults to a low work factor, which allows attackers to quickly crack password hashes.

7.5
2024-02-19 CVE-2024-26134 Agronholm
Fedoraproject
Classic Buffer Overflow vulnerability in multiple products

cbor2 provides encoding and decoding for the Concise Binary Object Representation (CBOR) (RFC 8949) serialization format.

7.5
2024-02-19 CVE-2024-25978 Moodle
Fedoraproject
Allocation of Resources Without Limits or Throttling vulnerability in multiple products

Insufficient file size checks resulted in a denial of service risk in the file picker's unzip functionality.

7.5
2024-02-20 CVE-2023-48220 Decidim
Scambra
Operation on a Resource after Expiration or Release vulnerability in multiple products

Decidim is a participatory democracy framework.

7.4
2024-02-23 CVE-2024-1683 Tenable OS Command Injection vulnerability in Tenable Identity Exposure

A DLL injection vulnerability exists where an authenticated, low-privileged local attacker could modify application files on the TIE Secure Relay host, which could allow for overriding of the configuration and running of new Secure Relay services.

7.3
2024-02-23 CVE-2024-1818 Codeastro Unspecified vulnerability in Codeastro Membership Management System 1.0

A vulnerability was found in CodeAstro Membership Management System 1.0 and classified as critical.

7.2
2024-02-23 CVE-2024-1819 Codeastro Unspecified vulnerability in Codeastro Membership Management System 1.0

A vulnerability was found in CodeAstro Membership Management System 1.0.

7.2
2024-02-23 CVE-2024-1776 Zestard SQL Injection vulnerability in Zestard Admin Side Data Storage for Contact Form 7 1.0.0/1.1.0/1.1.1

The Admin side data storage for Contact Form 7 plugin for WordPress is vulnerable to SQL Injection via the 'form-id' parameter in all versions up to, and including, 1.1.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.

7.2
2024-02-23 CVE-2024-26597 Linux Out-of-bounds Read vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: net: qualcomm: rmnet: fix global oob in rmnet_policy The variable rmnet_link_ops assign a *bigger* maxtype which leads to a global out-of-bounds read when parsing the netlink attributes.

7.1
2024-02-23 CVE-2024-26594 Linux Out-of-bounds Read vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: ksmbd: validate mech token in session setup If client send invalid mech token in session setup request, ksmbd validate and make the error if it is invalid.

7.1
2024-02-23 CVE-2024-26593 Linux Out-of-bounds Read vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: i2c: i801: Fix block process call transactions According to the Intel datasheets, software must reset the block buffer index twice for block process call transactions: once before writing the outgoing data to the buffer, and once again before reading the incoming data from the buffer. The driver is currently missing the second reset, causing the wrong portion of the block buffer to be read.

7.1

119 Medium Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2024-02-22 CVE-2023-52447 Linux Use After Free vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: bpf: Defer the free of inner map when necessary When updating or deleting an inner map in map array or map htab, the map may still be accessed by non-sleepable program or sleepable program. However bpf_map_fd_put_ptr() decreases the ref-counter of the inner map directly through bpf_map_put(), if the ref-counter is the last one (which is true for most cases), the inner map will be freed by ops->map_free() in a kworker.

6.7
2024-02-22 CVE-2024-26586 Linux Out-of-bounds Write vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_acl_tcam: Fix stack corruption When tc filters are first added to a net device, the corresponding local port gets bound to an ACL group in the device.

6.7
2024-02-22 CVE-2023-6477 Gitlab Unspecified vulnerability in Gitlab

An issue has been discovered in GitLab EE affecting all versions starting from 16.5 before 16.7.6, all versions starting from 16.8 before 16.8.3, all versions starting from 16.9 before 16.9.1.

6.7
2024-02-22 CVE-2023-52160 Debian
Redhat
Fedoraproject
W1 FI
Improper Authentication vulnerability in multiple products

The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass.

6.5
2024-02-22 CVE-2023-29179 Fortinet Unspecified vulnerability in Fortinet Fortios and Fortiproxy

A null pointer dereference in Fortinet FortiOS version 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.12, Fortiproxy version 7.2.0 through 7.2.4, 7.0.0 through 7.0.10 allows attacker to denial of service via specially crafted HTTP requests.

6.5
2024-02-21 CVE-2024-1671 Google Unspecified vulnerability in Google Chrome

Inappropriate implementation in Site Isolation in Google Chrome prior to 122.0.6261.57 allowed a remote attacker to bypass content security policy via a crafted HTML page.

6.5
2024-02-20 CVE-2024-1547 Mozilla
Debian
Through a series of API calls and redirects, an attacker-controlled alert dialog could have been displayed on another website (with the victim website's URL shown).
6.5
2024-02-20 CVE-2024-26265 Liferay Allocation of Resources Without Limits or Throttling vulnerability in Liferay Portal

The Image Uploader module in Liferay Portal 7.2.0 through 7.4.3.15, and older unsupported versions, and Liferay DXP 7.4 before update 16, 7.3 before update 4, 7.2 before fix pack 19, and older unsupported versions relies on a request parameter to limit the size of files that can be uploaded, which allows remote authenticated users to upload arbitrarily large files to the system's temp folder by modifying the `maxFileSize` parameter.

6.5
2024-02-20 CVE-2024-25604 Liferay Incorrect Authorization vulnerability in Liferay Digital Experience Platform and Liferay Portal

Liferay Portal 7.2.0 through 7.4.3.4, and older unsupported versions, and Liferay DXP 7.4.13, 7.3 before service pack 3, 7.2 before fix pack 17, and older unsupported versions does not properly check user permissions, which allows remote authenticated users with the VIEW user permission to edit their own permission via the User and Organizations section of the Control Panel.

6.5
2024-02-20 CVE-2023-6399 Zyxel Unspecified vulnerability in Zyxel products

A format string vulnerability in Zyxel ATP series firmware versions from 4.32 through 5.37 Patch 1, USG FLEX series firmware versions from 4.50 through 5.37 Patch 1, USG FLEX 50(W) series firmware versions from 4.16 through 5.37 Patch 1, USG20(W)-VPN series firmware versions from 4.16 through 5.37 Patch 1, and USG FLEX H series firmware versions from 1.10 through 1.10 Patch 1 could allow an authenticated IPSec VPN user to cause DoS conditions against the “deviceid” daemon by sending a crafted hostname to an affected device if it has the “Device Insight” feature enabled.

6.5
2024-02-19 CVE-2024-25634 ALF Unspecified vulnerability in ALF 2.0M42304

alf.io is an open source ticket reservation system.

6.5
2024-02-24 CVE-2024-22395 Sonicwall Unspecified vulnerability in Sonicwall products

Improper access control vulnerability has been identified in the SMA100 SSL-VPN virtual office portal, which in specific conditions could potentially enable a remote authenticated attacker to associate another user's MFA mobile application.

6.3
2024-02-23 CVE-2024-1834 Oretnom23 Unspecified vulnerability in Oretnom23 Simple Student Attendance System 1.0

A vulnerability was found in SourceCodester Simple Student Attendance System 1.0.

6.1
2024-02-23 CVE-2024-1825 Codeastro Unspecified vulnerability in Codeastro House Rental Management System 1.0

A vulnerability, which was classified as problematic, was found in CodeAstro House Rental Management System 1.0.

6.1
2024-02-23 CVE-2024-1822 Phpgurukul Unspecified vulnerability in PHPgurukul Tourism Management System 1.0

A vulnerability classified as problematic has been found in PHPGurukul Tourism Management System 1.0.

6.1
2024-02-22 CVE-2023-44379 Basercms Cross-site Scripting vulnerability in Basercms

baserCMS is a website development framework.

6.1
2024-02-22 CVE-2024-26284 Mozilla Cross-site Scripting vulnerability in Mozilla Firefox Focus

Utilizing a 302 redirect, an attacker could have conducted a Universal Cross-Site Scripting (UXSS) on a victim website, if the victim had a link to the attacker's website.

6.1
2024-02-21 CVE-2024-1474 Progress Cross-site Scripting vulnerability in Progress WS FTP Server

In WS_FTP Server versions before 8.8.5, reflected cross-site scripting issues have been identified on various user supplied inputs on the WS_FTP Server administrative interface.

6.1
2024-02-21 CVE-2023-40191 Liferay Cross-site Scripting vulnerability in Liferay Portal

Reflected cross-site scripting (XSS) vulnerability in the instance settings for Accounts in Liferay Portal 7.4.3.44 through 7.4.3.97, and Liferay DXP 2023.Q3 before patch 6, and 7.4 update 44 through 92 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into the “Blocked Email Domains” text field

6.1
2024-02-21 CVE-2023-42496 Liferay Cross-site Scripting vulnerability in Liferay Portal

Reflected cross-site scripting (XSS) vulnerability on the add assignees to a role page in Liferay Portal 7.3.3 through 7.4.3.97, and Liferay DXP 2023.Q3 before patch 6, 7.4 GA through update 92, and 7.3 before update 34 allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_roles_admin_web_portlet_RolesAdminPortlet_tabs2 parameter.

6.1
2024-02-21 CVE-2023-42498 Liferay Cross-site Scripting vulnerability in Liferay Portal

Reflected cross-site scripting (XSS) vulnerability in the Language Override edit screen in Liferay Portal 7.4.3.8 through 7.4.3.97, and Liferay DXP 2023.Q3 before patch 5, and 7.4 update 4 through 92 allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_portal_language_override_web_internal_portlet_PLOPortlet_key parameter.

6.1
2024-02-21 CVE-2024-26269 Liferay Cross-site Scripting vulnerability in Liferay Portal

Cross-site scripting (XSS) vulnerability in the Frontend JS module's portlet.js in Liferay Portal 7.2.0 through 7.4.3.37, and Liferay DXP 7.4 before update 38, 7.3 before update 11, 7.2 before fix pack 20, and older unsupported versions allows remote attackers to inject arbitrary web script or HTML via the anchor (hash) part of a URL.

6.1
2024-02-21 CVE-2024-25147 Liferay Cross-site Scripting vulnerability in Liferay Portal

Cross-site scripting (XSS) vulnerability in HtmlUtil.escapeJsLink in Liferay Portal 7.2.0 through 7.4.1, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 15, and older unsupported versions allows remote attackers to inject arbitrary web script or HTML via crafted javascript: style links.

6.1
2024-02-20 CVE-2024-24763 Fit2Cloud Open Redirect vulnerability in Fit2Cloud Jumpserver

JumpServer is an open source bastion host and an operation and maintenance security audit system.

6.1
2024-02-20 CVE-2024-1550 Mozilla
Debian
Improper Restriction of Rendered UI Layers or Frames vulnerability in multiple products

A malicious website could have used a combination of exiting fullscreen mode and `requestPointerLock` to cause the user's mouse to be re-positioned unexpectedly, which could have led to user confusion and inadvertently granting permissions they did not intend to grant.

6.1
2024-02-20 CVE-2024-25608 Liferay Open Redirect vulnerability in Liferay Digital Experience Platform

HtmlUtil.escapeRedirect in Liferay Portal 7.2.0 through 7.4.3.18, and older unsupported versions, and Liferay DXP 7.4 before update 19, 7.3 before update 4, 7.2 before fix pack 19, and older unsupported versions can be circumvented by using the 'REPLACEMENT CHARACTER' (U+FFFD), which allows remote attackers to redirect users to arbitrary external URLs via the (1) 'redirect` parameter (2) `FORWARD_URL` parameter, (3) `noSuchEntryRedirect` parameter, and (4) others parameters that rely on HtmlUtil.escapeRedirect.

6.1
2024-02-20 CVE-2024-25609 Liferay Open Redirect vulnerability in Liferay Digital Experience Platform

HtmlUtil.escapeRedirect in Liferay Portal 7.2.0 through 7.4.3.12, and older unsupported versions, and Liferay DXP 7.4 before update 9, 7.3 service pack 3, 7.2 fix pack 15 through 18, and older unsupported versions can be circumvented by using two forward slashes, which allows remote attackers to redirect users to arbitrary external URLs via the (1) 'redirect` parameter (2) `FORWARD_URL` parameter, and (3) others parameters that rely on HtmlUtil.escapeRedirect.

6.1
2024-02-20 CVE-2023-44308 Liferay Open Redirect vulnerability in Liferay Digital Experience Platform

Open redirect vulnerability in adaptive media administration page in Liferay DXP 2023.Q3 before patch 6, and 7.4 GA through update 92 allows remote attackers to redirect users to arbitrary external URLs via the _com_liferay_adaptive_media_web_portlet_AMPortlet_redirect parameter.

6.1
2024-02-20 CVE-2023-5190 Liferay Open Redirect vulnerability in Liferay Digital Experience Platform 2023.Q3.0/2023.Q3.1/7.4

Open redirect vulnerability in the Countries Management’s edit region page in Liferay Portal 7.4.3.45 through 7.4.3.101, and Liferay DXP 2023.Q3 before patch 6, and 7.4 update 45 through 92 allows remote attackers to redirect users to arbitrary external URLs via the _com_liferay_address_web_internal_portlet_CountriesManagementAdminPortlet_redirect parameter.

6.1
2024-02-22 CVE-2024-26578 Apache Unspecified vulnerability in Apache Answer

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability in Apache Answer.This issue affects Apache Answer: through 1.2.1. Repeated submission during registration resulted in the registration of the same user.

5.9
2024-02-20 CVE-2023-47635 Decidim Cross-Site Request Forgery (CSRF) vulnerability in Decidim

Decidim is a participatory democracy framework.

5.7
2024-02-23 CVE-2023-52453 Linux Unspecified vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: hisi_acc_vfio_pci: Update migration data pointer correctly on saving/resume When the optional PRE_COPY support was added to speed up the device compatibility check, it failed to update the saving/resuming data pointers based on the fd offset.

5.5
2024-02-23 CVE-2023-52454 Linux NULL Pointer Dereference vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length If the host sends an H2CData command with an invalid DATAL, the kernel may crash in nvmet_tcp_build_pdu_iovec(). Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000 lr : nvmet_tcp_io_work+0x6ac/0x718 [nvmet_tcp] Call trace: process_one_work+0x174/0x3c8 worker_thread+0x2d0/0x3e8 kthread+0x104/0x110 Fix the bug by raising a fatal error if DATAL isn't coherent with the packet size. Also, the PDU length should never exceed the MAXH2CDATA parameter which has been communicated to the host in nvmet_tcp_handle_icreq().

5.5
2024-02-23 CVE-2023-52456 Linux Improper Locking vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: serial: imx: fix tx statemachine deadlock When using the serial port as RS485 port, the tx statemachine is used to control the RTS pin to drive the RS485 transceiver TX_EN pin.

5.5
2024-02-23 CVE-2023-52458 Linux NULL Pointer Dereference vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: block: add check that partition length needs to be aligned with block size Before calling add partition or resize partition, there is no check on whether the length is aligned with the logical block size. If the logical block size of the disk is larger than 512 bytes, then the partition size maybe not the multiple of the logical block size, and when the last sector is read, bio_truncate() will adjust the bio size, resulting in an IO error if the size of the read command is smaller than the logical block size.If integrity data is supported, this will also result in a null pointer dereference when calling bio_integrity_free.

5.5
2024-02-23 CVE-2023-52459 Linux NULL Pointer Dereference vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: media: v4l: async: Fix duplicated list deletion The list deletion call dropped here is already called from the helper function in the line before.

5.5
2024-02-23 CVE-2023-52460 Linux NULL Pointer Dereference vulnerability in Linux Kernel 6.7.1

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix NULL pointer dereference at hibernate During hibernate sequence the source context might not have a clk_mgr. So don't use it to look for DML2 support.

5.5
2024-02-23 CVE-2023-52462 Linux Unspecified vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: bpf: fix check for attempt to corrupt spilled pointer When register is spilled onto a stack as a 1/2/4-byte register, we set slot_type[BPF_REG_SIZE - 1] (plus potentially few more below it, depending on actual spill size).

5.5
2024-02-23 CVE-2023-52463 Linux NULL Pointer Dereference vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: efivarfs: force RO when remounting if SetVariable is not supported If SetVariable at runtime is not supported by the firmware we never assign a callback for that function.

5.5
2024-02-23 CVE-2024-26595 Linux NULL Pointer Dereference vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path When calling mlxsw_sp_acl_tcam_region_destroy() from an error path after failing to attach the region to an ACL group, we hit a NULL pointer dereference upon 'region->group->tcam' [1]. Fix by retrieving the 'tcam' pointer using mlxsw_sp_acl_to_tcam(). [1] BUG: kernel NULL pointer dereference, address: 0000000000000000 [...] RIP: 0010:mlxsw_sp_acl_tcam_region_destroy+0xa0/0xd0 [...] Call Trace: mlxsw_sp_acl_tcam_vchunk_get+0x88b/0xa20 mlxsw_sp_acl_tcam_ventry_add+0x25/0xe0 mlxsw_sp_acl_rule_add+0x47/0x240 mlxsw_sp_flower_replace+0x1a9/0x1d0 tc_setup_cb_add+0xdc/0x1c0 fl_hw_replace_filter+0x146/0x1f0 fl_change+0xc17/0x1360 tc_new_tfilter+0x472/0xb90 rtnetlink_rcv_msg+0x313/0x3b0 netlink_rcv_skb+0x58/0x100 netlink_unicast+0x244/0x390 netlink_sendmsg+0x1e4/0x440 ____sys_sendmsg+0x164/0x260 ___sys_sendmsg+0x9a/0xe0 __sys_sendmsg+0x7a/0xc0 do_syscall_64+0x40/0xe0 entry_SYSCALL_64_after_hwframe+0x63/0x6b

5.5
2024-02-23 CVE-2024-26596 Linux Unspecified vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: net: dsa: fix netdev_priv() dereference before check on non-DSA netdevice events After the blamed commit, we started doing this dereference for every NETDEV_CHANGEUPPER and NETDEV_PRECHANGEUPPER event in the system. static inline struct dsa_port *dsa_user_to_port(const struct net_device *dev) { struct dsa_user_priv *p = netdev_priv(dev); return p->dp; } Which is obviously bogus, because not all net_devices have a netdev_priv() of type struct dsa_user_priv.

5.5
2024-02-22 CVE-2023-52443 Linux NULL Pointer Dereference vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: apparmor: avoid crash when parsed profile name is empty When processing a packed profile in unpack_profile() described like "profile :ns::samba-dcerpcd /usr/lib*/samba/{,samba/}samba-dcerpcd {...}" a string ":samba-dcerpcd" is unpacked as a fully-qualified name and then passed to aa_splitn_fqname(). aa_splitn_fqname() treats ":samba-dcerpcd" as only containing a namespace. Thus it returns NULL for tmpname, meanwhile tmpns is non-NULL.

5.5
2024-02-22 CVE-2023-52448 Linux NULL Pointer Dereference vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump Syzkaller has reported a NULL pointer dereference when accessing rgd->rd_rgl in gfs2_rgrp_dump().

5.5
2024-02-22 CVE-2023-52449 Linux NULL Pointer Dereference vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: mtd: Fix gluebi NULL pointer dereference caused by ftl notifier If both ftl.ko and gluebi.ko are loaded, the notifier of ftl triggers NULL pointer dereference when trying to access ‘gluebi->desc’ in gluebi_read(). ubi_gluebi_init ubi_register_volume_notifier ubi_enumerate_volumes ubi_notify_all gluebi_notify nb->notifier_call() gluebi_create mtd_device_register mtd_device_parse_register add_mtd_device blktrans_notify_add not->add() ftl_add_mtd tr->add_mtd() scan_header mtd_read mtd_read_oob mtd_read_oob_std gluebi_read mtd->read() gluebi->desc - NULL Detailed reproduction information available at the Link [1], In the normal case, obtain gluebi->desc in the gluebi_get_device(), and access gluebi->desc in the gluebi_read().

5.5
2024-02-22 CVE-2023-52450 Linux NULL Pointer Dereference vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology() Get logical socket id instead of physical id in discover_upi_topology() to avoid out-of-bound access on 'upi = &type->topology[nid][idx];' line that leads to NULL pointer dereference in upi_fill_topology()

5.5
2024-02-22 CVE-2024-26587 Linux NULL Pointer Dereference vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: net: netdevsim: don't try to destroy PHC on VFs PHC gets initialized in nsim_init_netdevsim(), which is only called if (nsim_dev_port_is_pf()). Create a counterpart of nsim_init_netdevsim() and move the mock_phc_destroy() there. This fixes a crash trying to destroy netdevsim with VFs instantiated, as caught by running the devlink.sh test: BUG: kernel NULL pointer dereference, address: 00000000000000b8 RIP: 0010:mock_phc_destroy+0xd/0x30 Call Trace: <TASK> nsim_destroy+0x4a/0x70 [netdevsim] __nsim_dev_port_del+0x47/0x70 [netdevsim] nsim_dev_reload_destroy+0x105/0x120 [netdevsim] nsim_drv_remove+0x2f/0xb0 [netdevsim] device_release_driver_internal+0x1a1/0x210 bus_remove_device+0xd5/0x120 device_del+0x159/0x490 device_unregister+0x12/0x30 del_device_store+0x11a/0x1a0 [netdevsim] kernfs_fop_write_iter+0x130/0x1d0 vfs_write+0x30b/0x4b0 ksys_write+0x69/0xf0 do_syscall_64+0xcc/0x1e0 entry_SYSCALL_64_after_hwframe+0x6f/0x77

5.5
2024-02-22 CVE-2024-26590 Linux NULL Pointer Dereference vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: erofs: fix inconsistent per-file compression format EROFS can select compression algorithms on a per-file basis, and each per-file compression algorithm needs to be marked in the on-disk superblock for initialization. However, syzkaller can generate inconsistent crafted images that use an unsupported algorithmtype for specific inodes, e.g.

5.5
2024-02-22 CVE-2024-26591 Linux NULL Pointer Dereference vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: bpf: Fix re-attachment branch in bpf_tracing_prog_attach The following case can cause a crash due to missing attach_btf: 1) load rawtp program 2) load fentry program with rawtp as target_fd 3) create tracing link for fentry program with target_fd = 0 4) repeat 3 In the end we have: - prog->aux->dst_trampoline == NULL - tgt_prog == NULL (because we did not provide target_fd to link_create) - prog->aux->attach_btf == NULL (the program was loaded with attach_prog_fd=X) - the program was loaded for tgt_prog but we have no way to find out which one BUG: kernel NULL pointer dereference, address: 0000000000000058 Call Trace: <TASK> ? __die+0x20/0x70 ? page_fault_oops+0x15b/0x430 ? fixup_exception+0x22/0x330 ? exc_page_fault+0x6f/0x170 ? asm_exc_page_fault+0x22/0x30 ? bpf_tracing_prog_attach+0x279/0x560 ? btf_obj_id+0x5/0x10 bpf_tracing_prog_attach+0x439/0x560 __sys_bpf+0x1cf4/0x2de0 __x64_sys_bpf+0x1c/0x30 do_syscall_64+0x41/0xf0 entry_SYSCALL_64_after_hwframe+0x6e/0x76 Return -EINVAL in this situation.

5.5
2024-02-21 CVE-2024-26584 Linux Improper Handling of Exceptional Conditions vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: net: tls: handle backlogging of crypto requests Since we're setting the CRYPTO_TFM_REQ_MAY_BACKLOG flag on our requests to the crypto API, crypto_aead_{encrypt,decrypt} can return -EBUSY instead of -EINPROGRESS in valid situations.

5.5
2024-02-21 CVE-2023-52442 Linux Unspecified vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: ksmbd: validate session id and tree id in compound request `smb2_get_msg()` in smb2_get_ksmbd_tcon() and smb2_check_user_session() will always return the first request smb2 header in a compound request. if `SMB2_TREE_CONNECT_HE` is the first command in compound request, will return 0, i.e.

5.5
2024-02-21 CVE-2023-42823 Apple Insecure Storage of Sensitive Information vulnerability in Apple products

The issue was resolved by sanitizing logging This issue is fixed in watchOS 10.1, macOS Sonoma 14.1, tvOS 17.1, macOS Monterey 12.7.1, iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1, macOS Ventura 13.6.1.

5.5
2024-02-21 CVE-2023-42834 Apple Unspecified vulnerability in Apple products

A privacy issue was addressed with improved handling of files.

5.5
2024-02-21 CVE-2023-42839 Apple Insecure Storage of Sensitive Information vulnerability in Apple products

This issue was addressed with improved state management.

5.5
2024-02-21 CVE-2023-42840 Apple Unspecified vulnerability in Apple Macos

The issue was addressed with improved checks.

5.5
2024-02-21 CVE-2023-42853 Apple Unspecified vulnerability in Apple Macos

A logic issue was addressed with improved checks.

5.5
2024-02-21 CVE-2023-42858 Apple Unspecified vulnerability in Apple Macos

The issue was addressed with improved checks.

5.5
2024-02-21 CVE-2023-42859 Apple Unspecified vulnerability in Apple Macos

The issue was addressed with improved checks.

5.5
2024-02-21 CVE-2023-42860 Apple Incorrect Authorization vulnerability in Apple Macos

A permissions issue was addressed with additional restrictions.

5.5
2024-02-21 CVE-2023-42877 Apple Unspecified vulnerability in Apple Macos

The issue was addressed with improved checks.

5.5
2024-02-21 CVE-2023-42878 Apple Unspecified vulnerability in Apple products

A privacy issue was addressed with improved private data redaction for log entries.

5.5
2024-02-21 CVE-2023-42889 Apple Unspecified vulnerability in Apple Macos

The issue was addressed with improved checks.

5.5
2024-02-21 CVE-2023-42945 Apple Incorrect Default Permissions vulnerability in Apple Macos 14.0

A permissions issue was addressed with additional restrictions.

5.5
2024-02-21 CVE-2023-42946 Apple Unspecified vulnerability in Apple products

This issue was addressed with improved redaction of sensitive information.

5.5
2024-02-21 CVE-2023-42953 Apple Incorrect Default Permissions vulnerability in Apple products

A permissions issue was addressed with additional restrictions.

5.5
2024-02-20 CVE-2023-52435 Linux Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: net: prevent mss overflow in skb_segment() Once again syzbot is able to crash the kernel in skb_segment() [1] GSO_BY_FRAGS is a forbidden value, but unfortunately the following computation in skb_segment() can reach it quite easily : mss = mss * partial_segs; 65535 = 3 * 5 * 17 * 257, so many initial values of mss can lead to a bad final result. Make sure to limit segmentation so that the new mss value is smaller than GSO_BY_FRAGS. [1] general protection fault, probably for non-canonical address 0xdffffc000000000e: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000070-0x0000000000000077] CPU: 1 PID: 5079 Comm: syz-executor993 Not tainted 6.7.0-rc4-syzkaller-00141-g1ae4cd3cbdd0 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 RIP: 0010:skb_segment+0x181d/0x3f30 net/core/skbuff.c:4551 Code: 83 e3 02 e9 fb ed ff ff e8 90 68 1c f9 48 8b 84 24 f8 00 00 00 48 8d 78 70 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 8a 21 00 00 48 8b 84 24 f8 00 RSP: 0018:ffffc900043473d0 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: 0000000000010046 RCX: ffffffff886b1597 RDX: 000000000000000e RSI: ffffffff886b2520 RDI: 0000000000000070 RBP: ffffc90004347578 R08: 0000000000000005 R09: 000000000000ffff R10: 000000000000ffff R11: 0000000000000002 R12: ffff888063202ac0 R13: 0000000000010000 R14: 000000000000ffff R15: 0000000000000046 FS: 0000555556e7e380(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020010000 CR3: 0000000027ee2000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <TASK> udp6_ufo_fragment+0xa0e/0xd00 net/ipv6/udp_offload.c:109 ipv6_gso_segment+0x534/0x17e0 net/ipv6/ip6_offload.c:120 skb_mac_gso_segment+0x290/0x610 net/core/gso.c:53 __skb_gso_segment+0x339/0x710 net/core/gso.c:124 skb_gso_segment include/net/gso.h:83 [inline] validate_xmit_skb+0x36c/0xeb0 net/core/dev.c:3626 __dev_queue_xmit+0x6f3/0x3d60 net/core/dev.c:4338 dev_queue_xmit include/linux/netdevice.h:3134 [inline] packet_xmit+0x257/0x380 net/packet/af_packet.c:276 packet_snd net/packet/af_packet.c:3087 [inline] packet_sendmsg+0x24c6/0x5220 net/packet/af_packet.c:3119 sock_sendmsg_nosec net/socket.c:730 [inline] __sock_sendmsg+0xd5/0x180 net/socket.c:745 __sys_sendto+0x255/0x340 net/socket.c:2190 __do_sys_sendto net/socket.c:2202 [inline] __se_sys_sendto net/socket.c:2198 [inline] __x64_sys_sendto+0xe0/0x1b0 net/socket.c:2198 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x40/0x110 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x63/0x6b RIP: 0033:0x7f8692032aa9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 d1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fff8d685418 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f8692032aa9 RDX: 0000000000010048 RSI: 00000000200000c0 RDI: 0000000000000003 RBP: 00000000000f4240 R08: 0000000020000540 R09: 0000000000000014 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff8d685480 R13: 0000000000000001 R14: 00007fff8d685480 R15: 0000000000000003 </TASK> Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:skb_segment+0x181d/0x3f30 net/core/skbuff.c:4551 Code: 83 e3 02 e9 fb ed ff ff e8 90 68 1c f9 48 8b 84 24 f8 00 00 00 48 8d 78 70 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 8a 21 00 00 48 8b 84 24 f8 00 RSP: 0018:ffffc900043473d0 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: 0000000000010046 RCX: ffffffff886b1597 RDX: 000000000000000e RSI: ffffffff886b2520 RDI: 0000000000000070 RBP: ffffc90004347578 R0 ---truncated---

5.5
2024-02-20 CVE-2024-1661 Totolink Unspecified vulnerability in Totolink X6000R Firmware 9.4.0Cu.852B20230719

A vulnerability classified as problematic was found in Totolink X6000R 9.4.0cu.852_B20230719.

5.5
2024-02-19 CVE-2024-25710 Apache Unspecified vulnerability in Apache Commons Compress

Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in Apache Commons Compress.This issue affects Apache Commons Compress: from 1.3 through 1.25.0. Users are recommended to upgrade to version 1.26.0 which fixes the issue.

5.5
2024-02-19 CVE-2024-26308 Apache Unspecified vulnerability in Apache Commons Compress

Allocation of Resources Without Limits or Throttling vulnerability in Apache Commons Compress.This issue affects Apache Commons Compress: from 1.21 before 1.26. Users are recommended to upgrade to version 1.26, which fixes the issue.

5.5
2024-02-23 CVE-2024-1590 Pagelayer Cross-site Scripting vulnerability in Pagelayer

The Page Builder: Pagelayer – Drag and Drop website builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Button Widget in all versions up to, and including, 1.8.2 due to insufficient input sanitization and output escaping on user supplied attributes.

5.4
2024-02-22 CVE-2024-26128 Basercms Cross-site Scripting vulnerability in Basercms

baserCMS is a website development framework.

5.4
2024-02-22 CVE-2024-23349 Apache Unspecified vulnerability in Apache Answer

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache Answer.This issue affects Apache Answer: through 1.2.1. XSS attack when user enters summary.

5.4
2024-02-21 CVE-2023-3509 Gitlab Unspecified vulnerability in Gitlab

An issue has been discovered in GitLab affecting all versions before 16.7.6, all versions starting from 16.8 before 16.8.3, all versions starting from 16.9 before 16.9.1.

5.4
2024-02-21 CVE-2022-45169 Liveboxcloud Open Redirect vulnerability in Liveboxcloud Vdesk 018/031

An issue was discovered in LIVEBOX Collaboration vDesk through v031.

5.4
2024-02-21 CVE-2022-45179 Liveboxcloud Cross-site Scripting vulnerability in Liveboxcloud Vdesk 018/031

An issue was discovered in LIVEBOX Collaboration vDesk through v031.

5.4
2024-02-21 CVE-2023-33843 IBM Unspecified vulnerability in IBM Infosphere Information Server 11.7

IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scripting.

5.4
2024-02-21 CVE-2023-47795 Liferay Cross-site Scripting vulnerability in Liferay Portal

Stored cross-site scripting (XSS) vulnerability in the Document and Media widget in Liferay Portal 7.4.3.18 through 7.4.3.101, and Liferay DXP 2023.Q3 before patch 6, and 7.4 update 18 through 92 allows remote authenticated users to inject arbitrary web script or HTML via a crafted payload injected into a document's “Title” text field.

5.4
2024-02-21 CVE-2024-1081 3Dflipbook Cross-site Scripting vulnerability in 3Dflipbook 3D Flipbook

The 3D FlipBook – PDF Flipbook WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's bookmark feature in all versions up to, and including, 1.15.3 due to insufficient input sanitization and output escaping.

5.4
2024-02-21 CVE-2024-1672 Google
Fedoraproject
Inappropriate implementation in Content Security Policy in Google Chrome prior to 122.0.6261.57 allowed a remote attacker to bypass content security policy via a crafted HTML page.
5.4
2024-02-21 CVE-2024-1676 Google
Fedoraproject
Cross-site Scripting vulnerability in multiple products

Inappropriate implementation in Navigation in Google Chrome prior to 122.0.6261.57 allowed a remote attacker to spoof security UI via a crafted HTML page.

5.4
2024-02-21 CVE-2024-25151 Liferay Cross-site Scripting vulnerability in Liferay Digital Experience Platform and Liferay Portal

The Calendar module in Liferay Portal 7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 15, and older unsupported versions does not escape user supplied data in the default notification email template, which allows remote authenticated users to inject arbitrary web script or HTML via the title of a calendar event or the user's name.

5.4
2024-02-21 CVE-2024-25603 Liferay Cross-site Scripting vulnerability in Liferay Digital Experience Platform and Liferay Portal

Stored cross-site scripting (XSS) vulnerability in the Dynamic Data Mapping module's DDMForm in Liferay Portal 7.2.0 through 7.4.3.4, and older unsupported versions, and Liferay DXP 7.4.13, 7.3 before update 4, 7.2 before fix pack 17, and older unsupported versions allows remote authenticated users to inject arbitrary web script or HTML via the instanceId parameter.

5.4
2024-02-21 CVE-2024-26266 Liferay Cross-site Scripting vulnerability in Liferay Portal

Multiple stored cross-site scripting (XSS) vulnerabilities in Liferay Portal 7.2.0 through 7.4.3.13, and older unsupported versions, and Liferay DXP 7.4 before update 10, 7.3 before update 4, 7.2 before fix pack 17, and older unsupported versions allow remote authenticated users to inject arbitrary web script or HTML via a crafted payload injected into the first/middle/last name text field of the user who creates an entry in the (1) Announcement widget, or (2) Alerts widget.

5.4
2024-02-21 CVE-2024-25152 Liferay Cross-site Scripting vulnerability in Liferay Portal

Stored cross-site scripting (XSS) vulnerability in Message Board widget in Liferay Portal 7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 17, and older unsupported versions allows remote authenticated users to inject arbitrary web script or HTML via the filename of an attachment.

5.4
2024-02-21 CVE-2024-25601 Liferay Cross-site Scripting vulnerability in Liferay Portal

Stored cross-site scripting (XSS) vulnerability in Expando module's geolocation custom fields in Liferay Portal 7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 17, and older unsupported versions allows remote authenticated users to inject arbitrary web script or HTML via a crafted payload injected into the name text field of a geolocation custom field.

5.4
2024-02-21 CVE-2024-25602 Liferay Cross-site Scripting vulnerability in Liferay Portal

Stored cross-site scripting (XSS) vulnerability in Users Admin module's edit user page in Liferay Portal 7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 17, and older unsupported versions allows remote authenticated users to inject arbitrary web script or HTML via a crafted payload injected into an organization’s “Name” text field

5.4
2024-02-20 CVE-2023-51447 Decidim Cross-site Scripting vulnerability in Decidim

Decidim is a participatory democracy framework.

5.4
2024-02-20 CVE-2024-25610 Liferay Insecure Default Initialization of Resource vulnerability in Liferay Digital Experience Platform

In Liferay Portal 7.2.0 through 7.4.3.12, and older unsupported versions, and Liferay DXP 7.4 before update 9, 7.3 before update 4, 7.2 before fix pack 19, and older unsupported versions, the default configuration does not sanitize blog entries of JavaScript, which allows remote authenticated users to inject arbitrary web script or HTML (XSS) via a crafted payload injected into a blog entry’s content text field.

5.4
2024-02-20 CVE-2024-25149 Liferay Incorrect Authorization vulnerability in Liferay Digital Experience Platform and Liferay Portal

Liferay Portal 7.2.0 through 7.4.1, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 15, and older unsupported versions does not properly restrict membership of a child site when the "Limit membership to members of the parent site" option is enabled, which allows remote authenticated users to add users who are not a member of the parent site to a child site.

5.4
2024-02-20 CVE-2024-1510 Getshortcodes Cross-site Scripting vulnerability in Getshortcodes Shortcodes Ultimate

The WP Shortcodes Plugin — Shortcodes Ultimate plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's su_tooltip shortcode in all versions up to, and including, 7.0.2 due to insufficient input sanitization and output escaping on user supplied attributes and user supplied tags.

5.4
2024-02-19 CVE-2024-25640 Dfir Iris Cross-site Scripting vulnerability in Dfir-Iris Iris

Iris is a web collaborative platform that helps incident responders share technical details during investigations.

5.4
2024-02-23 CVE-2024-1823 Codeastro Unspecified vulnerability in Codeastro Simple Voting System 1.0

A vulnerability classified as critical was found in CodeAstro Simple Voting System 1.0.

5.3
2024-02-23 CVE-2024-1778 Zestard Missing Authorization vulnerability in Zestard Admin Side Data Storage for Contact Form 7 1.0.0/1.1.0/1.1.1

The Admin side data storage for Contact Form 7 plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the zt_dcfcf_change_bookmark() function in all versions up to, and including, 1.1.1.

5.3
2024-02-22 CVE-2024-1525 Gitlab Unspecified vulnerability in Gitlab

An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.1 before 16.7.6, all versions starting from 16.8 before 16.8.3, all versions starting from 16.9 before 16.9.1.

5.3
2024-02-21 CVE-2024-1703 Crmeb Path Traversal vulnerability in Crmeb 5.2.2

A vulnerability was found in ZhongBangKeJi CRMEB 5.2.2.

5.3
2024-02-21 CVE-2023-42836 Apple Unspecified vulnerability in Apple Iphone OS and Macos

A logic issue was addressed with improved checks.

5.3
2024-02-20 CVE-2024-25630 Cilium Cleartext Transmission of Sensitive Information vulnerability in Cilium 1.14.0/1.14.1/1.14.2

Cilium is a networking, observability, and security solution with an eBPF-based dataplane.

5.3
2024-02-20 CVE-2024-25631 Cilium Cleartext Transmission of Sensitive Information vulnerability in Cilium 1.14.0/1.14.1/1.14.2

Cilium is a networking, observability, and security solution with an eBPF-based dataplane.

5.3
2024-02-20 CVE-2024-26268 Liferay Information Exposure Through Discrepancy vulnerability in Liferay Portal

User enumeration vulnerability in Liferay Portal 7.2.0 through 7.4.3.26, and older unsupported versions, and Liferay DXP 7.4 before update 27, 7.3 before update 8, 7.2 before fix pack 20, and older unsupported versions allows remote attackers to determine if an account exist in the application by comparing the request's response time.

5.3
2024-02-20 CVE-2024-26270 Liferay Unspecified vulnerability in Liferay Digital Experience Platform and Liferay Portal

The Account Settings page in Liferay Portal 7.4.3.76 through 7.4.3.99, and Liferay DXP 2023.Q3 before patch 5, and 7.4 update 76 through 92 embeds the user’s hashed password in the page’s HTML source, which allows man-in-the-middle attackers to steal a user's hashed password.

5.3
2024-02-20 CVE-2024-26267 Liferay Insecure Default Initialization of Resource vulnerability in Liferay Portal

In Liferay Portal 7.2.0 through 7.4.3.25, and older unsupported versions, and Liferay DXP 7.4 before update 26, 7.3 before update 5, 7.2 before fix pack 19, and older unsupported versions the default value of the portal property `http.header.version.verbosity` is set to `full`, which allows remote attackers to easily identify the version of the application that is running and the vulnerabilities that affect that version via 'Liferay-Portal` response header.

5.3
2024-02-20 CVE-2024-25605 Liferay Incorrect Default Permissions vulnerability in Liferay Digital Experience Platform and Liferay Portal

The Journal module in Liferay Portal 7.2.0 through 7.4.3.4, and older unsupported versions, and Liferay DXP 7.4.13, 7.3 before service pack 3, 7.2 before fix pack 17, and older unsupported versions grants guest users view permission to web content templates by default, which allows remote attackers to view any template via the UI or API.

5.3
2024-02-20 CVE-2023-6397 Zyxel Unspecified vulnerability in Zyxel products

A null pointer dereference vulnerability in Zyxel ATP series firmware versions from 4.32 through 5.37 Patch 1 and USG FLEX series firmware versions from 4.50 through 5.37 Patch 1 could allow a LAN-based attacker to cause denial-of-service (DoS) conditions by downloading a crafted RAR compressed file onto a LAN-side host if the firewall has the “Anti-Malware” feature enabled.

5.3
2024-02-19 CVE-2024-26129 Prestashop Path Traversal vulnerability in Prestashop

PrestaShop is an open-source e-commerce platform.

5.3
2024-02-19 CVE-2024-25979 Moodle
Fedoraproject
The URL parameters accepted by forum search were not limited to the allowed parameters.
5.3
2024-02-19 CVE-2024-25980 Moodle
Fedoraproject
Separate Groups mode restrictions were not honored in the H5P attempts report, which would display users from other groups.
5.3
2024-02-19 CVE-2024-25981 Moodle
Fedoraproject
Separate Groups mode restrictions were not honored when performing a forum export, which would export forum data for all groups.
5.3
2024-02-19 CVE-2024-25983 Moodle
Fedoraproject
Authorization Bypass Through User-Controlled Key vulnerability in multiple products

Insufficient checks in a web service made it possible to add comments to the comments block on another user's dashboard when it was not otherwise available (e.g., on their profile page).

5.3
2024-02-21 CVE-2024-26133 EventStoreDB (ESDB) is an operational database built to store events.
4.9
2024-02-22 CVE-2024-1749 Bdtask Unspecified vulnerability in Bdtask Bhojon 2.9

A vulnerability, which was classified as problematic, has been found in Bdtask Bhojon Best Restaurant Management Software 2.9.

4.8
2024-02-21 CVE-2024-26583 Linux Race Condition vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: tls: fix race between async notify and socket close The submitting thread (one which called recvmsg/sendmsg) may exit as soon as the async crypto handler calls complete() so any code past that point risks touching already freed data. Try to avoid the locking and extra flags altogether. Have the main thread hold an extra reference, this way we can depend solely on the atomic ref counter for synchronization. Don't futz with reiniting the completion, either, we are now tightly controlling when completion fires.

4.7
2024-02-21 CVE-2024-26585 Linux Race Condition vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: tls: fix race between tx work scheduling and socket close Similarly to previous commit, the submitting thread (recvmsg/sendmsg) may exit as soon as the async crypto handler calls complete(). Reorder scheduling the work before calling complete(). This seems more logical in the first place, as it's the inverse order of what the submitting thread will do.

4.7
2024-02-21 CVE-2023-42855 Apple Unspecified vulnerability in Apple Iphone OS

This issue was addressed with improved state management.

4.6
2024-02-21 CVE-2023-42952 Apple Unspecified vulnerability in Apple Iphone OS and Macos

The issue was addressed with improved checks.

4.4
2024-02-23 CVE-2024-1777 Zestard Cross-Site Request Forgery (CSRF) vulnerability in Zestard Admin Side Data Storage for Contact Form 7 1.0.0/1.1.0/1.1.1

The Admin side data storage for Contact Form 7 plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.1.

4.3
2024-02-22 CVE-2023-4895 Gitlab Unspecified vulnerability in Gitlab

An issue has been discovered in GitLab EE affecting all versions starting from 12.0 to 16.7.6, all versions starting from 16.8 before 16.8.3, all versions starting from 16.9 before 16.9.1.

4.3
2024-02-22 CVE-2024-0861 Gitlab Unspecified vulnerability in Gitlab

An issue has been discovered in GitLab EE affecting all versions starting from 16.4 before 16.7.6, all versions starting from 16.8 before 16.8.3, all versions starting from 16.9 before 16.9.1.

4.3
2024-02-21 CVE-2023-42843 Apple
Fedoraproject
Wpewebkit
Webkitgtk
Authentication Bypass by Spoofing vulnerability in multiple products

An inconsistent user interface issue was addressed with improved state management.

4.3
2024-02-21 CVE-2023-42951 Apple Unspecified vulnerability in Apple Iphone OS

The issue was addressed with improved handling of caches.

4.3
2024-02-20 CVE-2024-25150 Liferay Unspecified vulnerability in Liferay Digital Experience Platform and Liferay Portal

Information disclosure vulnerability in the Control Panel in Liferay Portal 7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP 7.3 before update 4, 7.2 before fix pack 19, and older unsupported versions allows remote authenticated users to obtain a user's full name from the page's title by enumerating user screen names.

4.3

3 Low Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2024-02-21 CVE-2023-42939 Apple Unspecified vulnerability in Apple Iphone OS

A logic issue was addressed with improved checks.

3.3
2024-02-21 CVE-2023-50955 IBM Path Traversal vulnerability in IBM Infosphere Information Server 11.7

IBM InfoSphere Information Server 11.7 could allow an authenticated privileged user to obtain the absolute path of the web server installation which could aid in further attacks against the system.

2.7
2024-02-19 CVE-2024-1633 Renesas Integer Overflow or Wraparound vulnerability in Renesas Arm-Trusted-Firmware Rcargen32.5

During the secure boot, bl2 (the second stage of the bootloader) loops over images defined in the table “bl2_mem_params_descs”. For each image, the bl2 reads the image length and destination from the image’s certificate. Because of the way of reading from the image, which base on 32-bit unsigned integer value, it can result to an integer overflow. An attacker can bypass memory range restriction and write data out of buffer bounds, which could result in bypass of secure boot. Affected git version from c2f286820471ed276c57e603762bd831873e5a17 until (not 

2.0