Weekly Vulnerabilities Reports > March 4 to 10, 2024
Overview
201 new vulnerabilities reported during this period, including 16 critical vulnerabilities and 74 high severity vulnerabilities. This weekly summary report vulnerabilities in 537 products from 55 vendors including Apple, Linux, Qualcomm, Oretnom23, and Fedoraproject. Vulnerabilities are notably categorized as "Cross-site Scripting", "Out-of-bounds Write", "Use After Free", "Path Traversal", and "NULL Pointer Dereference".
- 82 reported vulnerabilities are remotely exploitables.
- 29 reported vulnerabilities are related to weaknesses in OWASP Top Ten.
- 110 reported vulnerabilities are exploitable by an anonymous user.
- Apple has the most reported vulnerabilities, with 70 reported vulnerabilities.
- Oretnom23 has the most reported critical vulnerabilities, with 3 reported vulnerabilities.
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
EXPLOITABLE
EXPLOITABLE
AVAILABLE
ANONYMOUSLY
WEB APPLICATION
Vulnerability Details
The following table list reported vulnerabilities for the period covered by this report:
16 Critical Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2024-03-08 | CVE-2024-21899 | Qnap | Unspecified vulnerability in Qnap QTS and Quts Hero An improper authentication vulnerability has been reported to affect several QNAP operating system versions. | 9.8 |
2024-03-07 | CVE-2023-41014 | Code Projects | SQL Injection vulnerability in Code-Projects Online JOB Portal 1.0 code-projects.org Online Job Portal 1.0 is vulnerable to SQL Injection via the Username parameter for "Employer." | 9.8 |
2024-03-07 | CVE-2024-0917 | Paddlepaddle | Unspecified vulnerability in Paddlepaddle 2.6.0 remote code execution in paddlepaddle/paddle 2.6.0 | 9.8 |
2024-03-07 | CVE-2024-28222 | Veritas | Path Traversal vulnerability in Veritas Netbackup and Netbackup Appliance In Veritas NetBackup before 8.1.2 and NetBackup Appliance before 3.1.2, the BPCD process inadequately validates the file path, allowing an unauthenticated attacker to upload and execute a custom file. | 9.8 |
2024-03-06 | CVE-2023-38944 | Multilaser | Improper Privilege Management vulnerability in Multilaser Re160V Firmware and Re163V Firmware An issue in Multilaser RE160V firmware v12.03.01.09_pt and Multilaser RE163V firmware v12.03.01.10_pt allows attackers to bypass the access control and gain complete access to the application via modifying a HTTP header. | 9.8 |
2024-03-06 | CVE-2023-38945 | Multilaser | Unspecified vulnerability in Multilaser Re160 Firmware, Re160V Firmware and Re163V Firmware Multilaser RE160 v5.07.51_pt_MTL01 and v5.07.52_pt_MTL01, Multilaser RE160V v12.03.01.08_pt and V12.03.01.09_pt, and Multilaser RE163V v12.03.01.08_pt allows attackers to bypass the access control and gain complete access to the application via supplying a crafted URL. | 9.8 |
2024-03-05 | CVE-2024-27764 | Jeewms | Path Traversal vulnerability in Jeewms An issue in Jeewms v.3.7 and before allows a remote attacker to escalate privileges via the AuthInterceptor component. | 9.8 |
2024-03-05 | CVE-2024-27565 | Dirk1983 | Server-Side Request Forgery (SSRF) vulnerability in Dirk1983 Chatgpt-Wechat-Personal 20230329 A Server-Side Request Forgery (SSRF) in weixin.php of ChatGPT-wechat-personal commit a0857f6 allows attackers to force the application to make arbitrary requests. | 9.8 |
2024-03-04 | CVE-2024-27198 | Jetbrains | Unspecified vulnerability in Jetbrains Teamcity In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible | 9.8 |
2024-03-04 | CVE-2023-43548 | Qualcomm | Out-of-bounds Write vulnerability in Qualcomm products Memory corruption while parsing qcp clip with invalid chunk data size. | 9.8 |
2024-03-04 | CVE-2024-2153 | Oretnom23 | Unspecified vulnerability in Oretnom23 Online Mobile Store Management System 1.0 A vulnerability, which was classified as critical, was found in SourceCodester Online Mobile Management Store 1.0. | 9.8 |
2024-03-04 | CVE-2024-2154 | Oretnom23 | Unspecified vulnerability in Oretnom23 Online Mobile Store Management System 1.0 A vulnerability has been found in SourceCodester Online Mobile Management Store 1.0 and classified as critical. | 9.8 |
2024-03-04 | CVE-2024-2156 | Mayurik | Unspecified vulnerability in Mayurik Best POS Management System 1.0 A vulnerability was found in SourceCodester Best POS Management System 1.0. | 9.8 |
2024-03-04 | CVE-2024-2152 | Oretnom23 | Unspecified vulnerability in Oretnom23 Online Mobile Store Management System 1.0 A vulnerability, which was classified as critical, has been found in SourceCodester Online Mobile Management Store 1.0. | 9.8 |
2024-03-07 | CVE-2024-0818 | Paddlepaddle | Unspecified vulnerability in Paddlepaddle Arbitrary File Overwrite Via Path Traversal in paddlepaddle/paddle before 2.6 | 9.1 |
2024-03-04 | CVE-2024-22463 | Dell | Unspecified vulnerability in Dell Powerscale Onefs Dell PowerScale OneFS 8.2.x through 9.6.0.x contains a use of a broken or risky cryptographic algorithm vulnerability. | 9.1 |
74 High Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2024-03-10 | CVE-2024-2353 | Totolink | Unspecified vulnerability in Totolink X6000R Firmware 9.4.0Cu.852B20230719 A vulnerability, which was classified as critical, has been found in Totolink X6000R 9.4.0cu.852_20230719. | 8.8 |
2024-03-08 | CVE-2024-23226 | Apple | Unspecified vulnerability in Apple products The issue was addressed with improved memory handling. | 8.8 |
2024-03-07 | CVE-2024-0815 | Paddlepaddle | Unspecified vulnerability in Paddlepaddle 2.6.0 Command injection in paddle.utils.download._wget_download (bypass filter) in paddlepaddle/paddle 2.6.0 | 8.8 |
2024-03-06 | CVE-2024-2173 | Google Fedoraproject | Out-of-bounds Write vulnerability in multiple products Out of bounds memory access in V8 in Google Chrome prior to 122.0.6261.111 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. | 8.8 |
2024-03-06 | CVE-2024-2174 | Google Fedoraproject | Out-of-bounds Write vulnerability in multiple products Inappropriate implementation in V8 in Google Chrome prior to 122.0.6261.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2024-03-06 | CVE-2024-2176 | Google Fedoraproject | Use After Free vulnerability in multiple products Use after free in FedCM in Google Chrome prior to 122.0.6261.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2024-03-06 | CVE-2023-38946 | Multilaser | Unspecified vulnerability in Multilaser Re160 Firmware 5.07.51Ptmtl01/5.07.52Ptmtl01 An issue in Multilaser RE160 firmware v5.07.51_pt_MTL01 and v5.07.52_pt_MTL01 allows attackers to bypass the access control and gain complete access to the application via supplying a crafted cookie. | 8.8 |
2024-03-06 | CVE-2023-43318 | TP Link | Unspecified vulnerability in Tp-Link Tl-Sg2210P Firmware 5.0 TP-Link JetStream Smart Switch TL-SG2210P 5.0 Build 20211201 allows attackers to escalate privileges via modification of the 'tid' and 'usrlvl' values in GET requests. | 8.8 |
2024-03-08 | CVE-2024-0258 | Apple | Unspecified vulnerability in Apple products The issue was addressed with improved memory handling. | 8.6 |
2024-03-08 | CVE-2024-23246 | Apple | Unspecified vulnerability in Apple products This issue was addressed by removing the vulnerable code. | 8.6 |
2024-03-08 | CVE-2024-23278 | Apple | Unspecified vulnerability in Apple products The issue was addressed with improved checks. | 8.6 |
2024-03-07 | CVE-2024-1170 | Themekraft | Unspecified vulnerability in Themekraft Post Form The Post Form – Registration Form – Profile Form for User Profiles – Frontend Content Forms for User Submissions (UGC) plugin for WordPress is vulnerable to unauthorized media file deletion due to a missing capability check on the handle_deleted_media function in all versions up to, and including, 2.8.7. | 8.2 |
2024-03-07 | CVE-2024-1299 | Gitlab | Unspecified vulnerability in Gitlab A privilege escalation vulnerability was discovered in GitLab affecting versions 16.8 prior to 16.8.4 and 16.9 prior to 16.9.2. | 8.1 |
2024-03-06 | CVE-2024-27915 | Sulu | Incorrect Authorization vulnerability in Sulu Sulu is a PHP content management system. | 8.1 |
2024-03-05 | CVE-2024-27561 | Wondercms | Server-Side Request Forgery (SSRF) vulnerability in Wondercms 3.1.3 A Server-Side Request Forgery (SSRF) in the installUpdateThemePluginAction function of WonderCMS v3.1.3 allows attackers to force the application to make arbitrary requests via injection of crafted URLs into the installThemePlugin parameter. | 8.1 |
2024-03-04 | CVE-2024-28088 | Langchain | Path Traversal vulnerability in Langchain LangChain through 0.1.10 allows ../ directory traversal by an actor who is able to control the final part of the path parameter in a load_chain call. | 8.1 |
2024-03-09 | CVE-2024-25951 | Dell | Command Injection vulnerability in Dell Idrac8 2.50.50.50/2.52.52.52/2.60.60.60 A command injection vulnerability exists in local RACADM. | 8.0 |
2024-03-07 | CVE-2024-0199 | Gitlab | Incorrect Authorization vulnerability in Gitlab An authorization bypass vulnerability was discovered in GitLab affecting versions 11.3 prior to 16.7.7, 16.7.6 prior to 16.8.4, and 16.8.3 prior to 16.9.2. | 8.0 |
2024-03-08 | CVE-2024-23233 | Apple | Unspecified vulnerability in Apple Macos This issue was addressed with improved checks. | 7.8 |
2024-03-08 | CVE-2024-23244 | Apple | Unspecified vulnerability in Apple Macos A logic issue was addressed with improved restrictions. | 7.8 |
2024-03-08 | CVE-2024-23247 | Apple | Unspecified vulnerability in Apple Macos The issue was addressed with improved memory handling. | 7.8 |
2024-03-08 | CVE-2024-23258 | Apple | Out-of-bounds Read vulnerability in Apple Macos and Visionos An out-of-bounds read was addressed with improved input validation. | 7.8 |
2024-03-08 | CVE-2024-23265 | Apple | Out-of-bounds Write vulnerability in Apple products A memory corruption vulnerability was addressed with improved locking. | 7.8 |
2024-03-08 | CVE-2024-23268 | Apple | Injection vulnerability in Apple Macos An injection issue was addressed with improved input validation. | 7.8 |
2024-03-08 | CVE-2024-23270 | Apple | Unspecified vulnerability in Apple products The issue was addressed with improved memory handling. | 7.8 |
2024-03-08 | CVE-2024-23274 | Apple | Injection vulnerability in Apple Macos An injection issue was addressed with improved input validation. | 7.8 |
2024-03-08 | CVE-2024-23276 | Apple | Unspecified vulnerability in Apple Macos A logic issue was addressed with improved checks. | 7.8 |
2024-03-08 | CVE-2024-23286 | Apple | Classic Buffer Overflow vulnerability in Apple products A buffer overflow issue was addressed with improved memory handling. | 7.8 |
2024-03-08 | CVE-2024-23288 | Apple | Unspecified vulnerability in Apple products This issue was addressed by removing the vulnerable code. | 7.8 |
2024-03-08 | CVE-2024-23294 | Apple | Unspecified vulnerability in Apple Macos This issue was addressed by removing the vulnerable code. | 7.8 |
2024-03-07 | CVE-2024-28115 | Amazon | Unspecified vulnerability in Amazon Freertos FreeRTOS is a real-time operating system for microcontrollers. | 7.8 |
2024-03-07 | CVE-2024-0817 | Paddlepaddle | Unspecified vulnerability in Paddlepaddle 2.6.0 Command injection in IrGraph.draw in paddlepaddle/paddle 2.6.0 | 7.8 |
2024-03-06 | CVE-2023-52594 | Linux | Improper Validation of Array Index vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() Fix an array-index-out-of-bounds read in ath9k_htc_txstatus(). | 7.8 |
2024-03-06 | CVE-2023-52599 | Linux | Improper Validation of Array Index vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: jfs: fix array-index-out-of-bounds in diNewExt [Syz report] UBSAN: array-index-out-of-bounds in fs/jfs/jfs_imap.c:2360:2 index -878706688 is out of range for type 'struct iagctl[128]' CPU: 1 PID: 5065 Comm: syz-executor282 Not tainted 6.7.0-rc4-syzkaller-00009-gbee0e7762ad2 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e7/0x2d0 lib/dump_stack.c:106 ubsan_epilogue lib/ubsan.c:217 [inline] __ubsan_handle_out_of_bounds+0x11c/0x150 lib/ubsan.c:348 diNewExt+0x3cf3/0x4000 fs/jfs/jfs_imap.c:2360 diAllocExt fs/jfs/jfs_imap.c:1949 [inline] diAllocAG+0xbe8/0x1e50 fs/jfs/jfs_imap.c:1666 diAlloc+0x1d3/0x1760 fs/jfs/jfs_imap.c:1587 ialloc+0x8f/0x900 fs/jfs/jfs_inode.c:56 jfs_mkdir+0x1c5/0xb90 fs/jfs/namei.c:225 vfs_mkdir+0x2f1/0x4b0 fs/namei.c:4106 do_mkdirat+0x264/0x3a0 fs/namei.c:4129 __do_sys_mkdir fs/namei.c:4149 [inline] __se_sys_mkdir fs/namei.c:4147 [inline] __x64_sys_mkdir+0x6e/0x80 fs/namei.c:4147 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x45/0x110 arch/x86/entry/common.c:82 entry_SYSCALL_64_after_hwframe+0x63/0x6b RIP: 0033:0x7fcb7e6a0b57 Code: ff ff 77 07 31 c0 c3 0f 1f 40 00 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffd83023038 EFLAGS: 00000286 ORIG_RAX: 0000000000000053 RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007fcb7e6a0b57 RDX: 00000000000a1020 RSI: 00000000000001ff RDI: 0000000020000140 RBP: 0000000020000140 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000286 R12: 00007ffd830230d0 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [Analysis] When the agstart is too large, it can cause agno overflow. [Fix] After obtaining agno, if the value is invalid, exit the subsequent process. Modified the test from agno > MAXAG to agno >= MAXAG based on linux-next report by kernel test robot (Dan Carpenter). | 7.8 |
2024-03-06 | CVE-2023-52600 | Linux | Use After Free vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: jfs: fix uaf in jfs_evict_inode When the execution of diMount(ipimap) fails, the object ipimap that has been released may be accessed in diFreeSpecial(). | 7.8 |
2024-03-06 | CVE-2023-52603 | Linux | Improper Validation of Array Index vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: UBSAN: array-index-out-of-bounds in dtSplitRoot Syzkaller reported the following issue: oop0: detected capacity change from 0 to 32768 UBSAN: array-index-out-of-bounds in fs/jfs/jfs_dtree.c:1971:9 index -2 is out of range for type 'struct dtslot [128]' CPU: 0 PID: 3613 Comm: syz-executor270 Not tainted 6.0.0-syzkaller-09423-g493ffd6605b2 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1b1/0x28e lib/dump_stack.c:106 ubsan_epilogue lib/ubsan.c:151 [inline] __ubsan_handle_out_of_bounds+0xdb/0x130 lib/ubsan.c:283 dtSplitRoot+0x8d8/0x1900 fs/jfs/jfs_dtree.c:1971 dtSplitUp fs/jfs/jfs_dtree.c:985 [inline] dtInsert+0x1189/0x6b80 fs/jfs/jfs_dtree.c:863 jfs_mkdir+0x757/0xb00 fs/jfs/namei.c:270 vfs_mkdir+0x3b3/0x590 fs/namei.c:4013 do_mkdirat+0x279/0x550 fs/namei.c:4038 __do_sys_mkdirat fs/namei.c:4053 [inline] __se_sys_mkdirat fs/namei.c:4051 [inline] __x64_sys_mkdirat+0x85/0x90 fs/namei.c:4051 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7fcdc0113fd9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffeb8bc67d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fcdc0113fd9 RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000000000003 RBP: 00007fcdc00d37a0 R08: 0000000000000000 R09: 00007fcdc00d37a0 R10: 00005555559a72c0 R11: 0000000000000246 R12: 00000000f8008000 R13: 0000000000000000 R14: 00083878000000f8 R15: 0000000000000000 </TASK> The issue is caused when the value of fsi becomes less than -1. The check to break the loop when fsi value becomes -1 is present but syzbot was able to produce value less than -1 which cause the error. This patch simply add the change for the values less than 0. The patch is tested via syzbot. | 7.8 |
2024-03-06 | CVE-2023-52604 | Linux | Improper Validation of Array Index vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree Syzkaller reported the following issue: UBSAN: array-index-out-of-bounds in fs/jfs/jfs_dmap.c:2867:6 index 196694 is out of range for type 's8[1365]' (aka 'signed char[1365]') CPU: 1 PID: 109 Comm: jfsCommit Not tainted 6.6.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e7/0x2d0 lib/dump_stack.c:106 ubsan_epilogue lib/ubsan.c:217 [inline] __ubsan_handle_out_of_bounds+0x11c/0x150 lib/ubsan.c:348 dbAdjTree+0x474/0x4f0 fs/jfs/jfs_dmap.c:2867 dbJoin+0x210/0x2d0 fs/jfs/jfs_dmap.c:2834 dbFreeBits+0x4eb/0xda0 fs/jfs/jfs_dmap.c:2331 dbFreeDmap fs/jfs/jfs_dmap.c:2080 [inline] dbFree+0x343/0x650 fs/jfs/jfs_dmap.c:402 txFreeMap+0x798/0xd50 fs/jfs/jfs_txnmgr.c:2534 txUpdateMap+0x342/0x9e0 txLazyCommit fs/jfs/jfs_txnmgr.c:2664 [inline] jfs_lazycommit+0x47a/0xb70 fs/jfs/jfs_txnmgr.c:2732 kthread+0x2d3/0x370 kernel/kthread.c:388 ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304 </TASK> ================================================================================ Kernel panic - not syncing: UBSAN: panic_on_warn set ... CPU: 1 PID: 109 Comm: jfsCommit Not tainted 6.6.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e7/0x2d0 lib/dump_stack.c:106 panic+0x30f/0x770 kernel/panic.c:340 check_panic_on_warn+0x82/0xa0 kernel/panic.c:236 ubsan_epilogue lib/ubsan.c:223 [inline] __ubsan_handle_out_of_bounds+0x13c/0x150 lib/ubsan.c:348 dbAdjTree+0x474/0x4f0 fs/jfs/jfs_dmap.c:2867 dbJoin+0x210/0x2d0 fs/jfs/jfs_dmap.c:2834 dbFreeBits+0x4eb/0xda0 fs/jfs/jfs_dmap.c:2331 dbFreeDmap fs/jfs/jfs_dmap.c:2080 [inline] dbFree+0x343/0x650 fs/jfs/jfs_dmap.c:402 txFreeMap+0x798/0xd50 fs/jfs/jfs_txnmgr.c:2534 txUpdateMap+0x342/0x9e0 txLazyCommit fs/jfs/jfs_txnmgr.c:2664 [inline] jfs_lazycommit+0x47a/0xb70 fs/jfs/jfs_txnmgr.c:2732 kthread+0x2d3/0x370 kernel/kthread.c:388 ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304 </TASK> Kernel Offset: disabled Rebooting in 86400 seconds.. The issue is caused when the value of lp becomes greater than CTLTREESIZE which is the max size of stree. | 7.8 |
2024-03-06 | CVE-2024-26625 | Linux Debian | Use After Free vulnerability in multiple products In the Linux kernel, the following vulnerability has been resolved: llc: call sock_orphan() at release time syzbot reported an interesting trace [1] caused by a stale sk->sk_wq pointer in a closed llc socket. In commit ff7b11aa481f ("net: socket: set sock->sk to NULL after calling proto_ops::release()") Eric Biggers hinted that some protocols are missing a sock_orphan(), we need to perform a full audit. In net-next, I plan to clear sock->sk from sock_orphan() and amend Eric patch to add a warning. [1] BUG: KASAN: slab-use-after-free in list_empty include/linux/list.h:373 [inline] BUG: KASAN: slab-use-after-free in waitqueue_active include/linux/wait.h:127 [inline] BUG: KASAN: slab-use-after-free in sock_def_write_space_wfree net/core/sock.c:3384 [inline] BUG: KASAN: slab-use-after-free in sock_wfree+0x9a8/0x9d0 net/core/sock.c:2468 Read of size 8 at addr ffff88802f4fc880 by task ksoftirqd/1/27 CPU: 1 PID: 27 Comm: ksoftirqd/1 Not tainted 6.8.0-rc1-syzkaller-00049-g6098d87eaf31 #0 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xd9/0x1b0 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:377 [inline] print_report+0xc4/0x620 mm/kasan/report.c:488 kasan_report+0xda/0x110 mm/kasan/report.c:601 list_empty include/linux/list.h:373 [inline] waitqueue_active include/linux/wait.h:127 [inline] sock_def_write_space_wfree net/core/sock.c:3384 [inline] sock_wfree+0x9a8/0x9d0 net/core/sock.c:2468 skb_release_head_state+0xa3/0x2b0 net/core/skbuff.c:1080 skb_release_all net/core/skbuff.c:1092 [inline] napi_consume_skb+0x119/0x2b0 net/core/skbuff.c:1404 e1000_unmap_and_free_tx_resource+0x144/0x200 drivers/net/ethernet/intel/e1000/e1000_main.c:1970 e1000_clean_tx_irq drivers/net/ethernet/intel/e1000/e1000_main.c:3860 [inline] e1000_clean+0x4a1/0x26e0 drivers/net/ethernet/intel/e1000/e1000_main.c:3801 __napi_poll.constprop.0+0xb4/0x540 net/core/dev.c:6576 napi_poll net/core/dev.c:6645 [inline] net_rx_action+0x956/0xe90 net/core/dev.c:6778 __do_softirq+0x21a/0x8de kernel/softirq.c:553 run_ksoftirqd kernel/softirq.c:921 [inline] run_ksoftirqd+0x31/0x60 kernel/softirq.c:913 smpboot_thread_fn+0x660/0xa10 kernel/smpboot.c:164 kthread+0x2c6/0x3a0 kernel/kthread.c:388 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:242 </TASK> Allocated by task 5167: kasan_save_stack+0x33/0x50 mm/kasan/common.c:47 kasan_save_track+0x14/0x30 mm/kasan/common.c:68 unpoison_slab_object mm/kasan/common.c:314 [inline] __kasan_slab_alloc+0x81/0x90 mm/kasan/common.c:340 kasan_slab_alloc include/linux/kasan.h:201 [inline] slab_post_alloc_hook mm/slub.c:3813 [inline] slab_alloc_node mm/slub.c:3860 [inline] kmem_cache_alloc_lru+0x142/0x6f0 mm/slub.c:3879 alloc_inode_sb include/linux/fs.h:3019 [inline] sock_alloc_inode+0x25/0x1c0 net/socket.c:308 alloc_inode+0x5d/0x220 fs/inode.c:260 new_inode_pseudo+0x16/0x80 fs/inode.c:1005 sock_alloc+0x40/0x270 net/socket.c:634 __sock_create+0xbc/0x800 net/socket.c:1535 sock_create net/socket.c:1622 [inline] __sys_socket_create net/socket.c:1659 [inline] __sys_socket+0x14c/0x260 net/socket.c:1706 __do_sys_socket net/socket.c:1720 [inline] __se_sys_socket net/socket.c:1718 [inline] __x64_sys_socket+0x72/0xb0 net/socket.c:1718 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xd3/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x63/0x6b Freed by task 0: kasan_save_stack+0x33/0x50 mm/kasan/common.c:47 kasan_save_track+0x14/0x30 mm/kasan/common.c:68 kasan_save_free_info+0x3f/0x60 mm/kasan/generic.c:640 poison_slab_object mm/kasan/common.c:241 [inline] __kasan_slab_free+0x121/0x1b0 mm/kasan/common.c:257 kasan_slab_free include/linux/kasan.h:184 [inline] slab_free_hook mm/slub.c:2121 [inlin ---truncated--- | 7.8 |
2024-03-06 | CVE-2024-25817 | EZA Rock | Classic Buffer Overflow vulnerability in Eza.Rock EZA Buffer Overflow vulnerability in eza before version 0.18.2, allows local attackers to execute arbitrary code via the .git/HEAD, .git/refs, and .git/objects components. | 7.8 |
2024-03-05 | CVE-2024-23225 | Apple | Out-of-bounds Write vulnerability in Apple products A memory corruption issue was addressed with improved validation. | 7.8 |
2024-03-05 | CVE-2024-23296 | Apple | Out-of-bounds Write vulnerability in Apple products A memory corruption issue was addressed with improved validation. | 7.8 |
2024-03-05 | CVE-2024-24098 | Fabianros | SQL Injection vulnerability in Fabianros Scholars Tracking System 1.0 Code-projects Scholars Tracking System 1.0 is vulnerable to SQL Injection via the News Feed. | 7.8 |
2024-03-05 | CVE-2024-20838 | Samsung | Unspecified vulnerability in Samsung Internet Improper validation vulnerability in Samsung Internet prior to version 24.0.3.2 allows local attackers to execute arbitrary code. | 7.8 |
2024-03-04 | CVE-2021-47106 | Linux | Use After Free vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fix use-after-free in nft_set_catchall_destroy() We need to use list_for_each_entry_safe() iterator because we can not access @catchall after kfree_rcu() call. syzbot reported: BUG: KASAN: use-after-free in nft_set_catchall_destroy net/netfilter/nf_tables_api.c:4486 [inline] BUG: KASAN: use-after-free in nft_set_destroy net/netfilter/nf_tables_api.c:4504 [inline] BUG: KASAN: use-after-free in nft_set_destroy+0x3fd/0x4f0 net/netfilter/nf_tables_api.c:4493 Read of size 8 at addr ffff8880716e5b80 by task syz-executor.3/8871 CPU: 1 PID: 8871 Comm: syz-executor.3 Not tainted 5.16.0-rc5-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_address_description.constprop.0.cold+0x8d/0x2ed mm/kasan/report.c:247 __kasan_report mm/kasan/report.c:433 [inline] kasan_report.cold+0x83/0xdf mm/kasan/report.c:450 nft_set_catchall_destroy net/netfilter/nf_tables_api.c:4486 [inline] nft_set_destroy net/netfilter/nf_tables_api.c:4504 [inline] nft_set_destroy+0x3fd/0x4f0 net/netfilter/nf_tables_api.c:4493 __nft_release_table+0x79f/0xcd0 net/netfilter/nf_tables_api.c:9626 nft_rcv_nl_event+0x4f8/0x670 net/netfilter/nf_tables_api.c:9688 notifier_call_chain+0xb5/0x200 kernel/notifier.c:83 blocking_notifier_call_chain kernel/notifier.c:318 [inline] blocking_notifier_call_chain+0x67/0x90 kernel/notifier.c:306 netlink_release+0xcb6/0x1dd0 net/netlink/af_netlink.c:788 __sock_release+0xcd/0x280 net/socket.c:649 sock_close+0x18/0x20 net/socket.c:1314 __fput+0x286/0x9f0 fs/file_table.c:280 task_work_run+0xdd/0x1a0 kernel/task_work.c:164 tracehook_notify_resume include/linux/tracehook.h:189 [inline] exit_to_user_mode_loop kernel/entry/common.c:175 [inline] exit_to_user_mode_prepare+0x27e/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f75fbf28adb Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44 RSP: 002b:00007ffd8da7ec10 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00007f75fbf28adb RDX: 00007f75fc08e828 RSI: ffffffffffffffff RDI: 0000000000000003 RBP: 00007f75fc08a960 R08: 0000000000000000 R09: 00007f75fc08e830 R10: 00007ffd8da7ed10 R11: 0000000000000293 R12: 00000000002067c3 R13: 00007ffd8da7ed10 R14: 00007f75fc088f60 R15: 0000000000000032 </TASK> Allocated by task 8886: kasan_save_stack+0x1e/0x50 mm/kasan/common.c:38 kasan_set_track mm/kasan/common.c:46 [inline] set_alloc_info mm/kasan/common.c:434 [inline] ____kasan_kmalloc mm/kasan/common.c:513 [inline] ____kasan_kmalloc mm/kasan/common.c:472 [inline] __kasan_kmalloc+0xa6/0xd0 mm/kasan/common.c:522 kasan_kmalloc include/linux/kasan.h:269 [inline] kmem_cache_alloc_trace+0x1ea/0x4a0 mm/slab.c:3575 kmalloc include/linux/slab.h:590 [inline] nft_setelem_catchall_insert net/netfilter/nf_tables_api.c:5544 [inline] nft_setelem_insert net/netfilter/nf_tables_api.c:5562 [inline] nft_add_set_elem+0x232e/0x2f40 net/netfilter/nf_tables_api.c:5936 nf_tables_newsetelem+0x6ff/0xbb0 net/netfilter/nf_tables_api.c:6032 nfnetlink_rcv_batch+0x1710/0x25f0 net/netfilter/nfnetlink.c:513 nfnetlink_rcv_skb_batch net/netfilter/nfnetlink.c:634 [inline] nfnetlink_rcv+0x3af/0x420 net/netfilter/nfnetlink.c:652 netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline] netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1345 netlink_sendmsg+0x904/0xdf0 net/netlink/af_netlink.c:1921 sock_sendmsg_nosec net/ ---truncated--- | 7.8 |
2024-03-04 | CVE-2021-47082 | Linux | Double Free vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: tun: avoid double free in tun_free_netdev Avoid double free in tun_free_netdev() by moving the dev->tstats and tun->security allocs to a new ndo_init routine (tun_net_init()) that will be called by register_netdevice(). ndo_init is paired with the desctructor (tun_free_netdev()), so if there's an error in register_netdevice() the destructor will handle the frees. BUG: KASAN: double-free or invalid-free in selinux_tun_dev_free_security+0x1a/0x20 security/selinux/hooks.c:5605 CPU: 0 PID: 25750 Comm: syz-executor416 Not tainted 5.16.0-rc2-syzk #1 Hardware name: Red Hat KVM, BIOS Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x89/0xb5 lib/dump_stack.c:106 print_address_description.constprop.9+0x28/0x160 mm/kasan/report.c:247 kasan_report_invalid_free+0x55/0x80 mm/kasan/report.c:372 ____kasan_slab_free mm/kasan/common.c:346 [inline] __kasan_slab_free+0x107/0x120 mm/kasan/common.c:374 kasan_slab_free include/linux/kasan.h:235 [inline] slab_free_hook mm/slub.c:1723 [inline] slab_free_freelist_hook mm/slub.c:1749 [inline] slab_free mm/slub.c:3513 [inline] kfree+0xac/0x2d0 mm/slub.c:4561 selinux_tun_dev_free_security+0x1a/0x20 security/selinux/hooks.c:5605 security_tun_dev_free_security+0x4f/0x90 security/security.c:2342 tun_free_netdev+0xe6/0x150 drivers/net/tun.c:2215 netdev_run_todo+0x4df/0x840 net/core/dev.c:10627 rtnl_unlock+0x13/0x20 net/core/rtnetlink.c:112 __tun_chr_ioctl+0x80c/0x2870 drivers/net/tun.c:3302 tun_chr_ioctl+0x2f/0x40 drivers/net/tun.c:3311 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:874 [inline] __se_sys_ioctl fs/ioctl.c:860 [inline] __x64_sys_ioctl+0x19d/0x220 fs/ioctl.c:860 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x3a/0x80 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae | 7.8 |
2024-03-04 | CVE-2021-47087 | Linux | Release of Invalid Pointer or Reference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: tee: optee: Fix incorrect page free bug Pointer to the allocated pages (struct page *page) has already progressed towards the end of allocation. | 7.8 |
2024-03-04 | CVE-2021-47098 | Linux | Integer Overflow or Wraparound vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: hwmon: (lm90) Prevent integer overflow/underflow in hysteresis calculations Commit b50aa49638c7 ("hwmon: (lm90) Prevent integer underflows of temperature calculations") addressed a number of underflow situations when writing temperature limits. | 7.8 |
2024-03-04 | CVE-2024-0155 | Dell | Unspecified vulnerability in Dell Digital Delivery Dell Digital Delivery, versions prior to 5.2.0.0, contain a Use After Free Vulnerability. | 7.8 |
2024-03-04 | CVE-2024-0156 | Dell | Classic Buffer Overflow vulnerability in Dell Digital Delivery Dell Digital Delivery, versions prior to 5.2.0.0, contain a Buffer Overflow Vulnerability. | 7.8 |
2024-03-04 | CVE-2024-22452 | Dell | Unspecified vulnerability in Dell Display and Peripheral Manager Dell Display and Peripheral Manager for macOS prior to 1.3 contains an improper access control vulnerability. | 7.8 |
2024-03-04 | CVE-2023-28578 | Qualcomm | Out-of-bounds Write vulnerability in Qualcomm products Memory corruption in Core Services while executing the command for removing a single event listener. | 7.8 |
2024-03-04 | CVE-2023-33066 | Qualcomm | Out-of-bounds Write vulnerability in Qualcomm products Memory corruption in Audio while processing RT proxy port register driver. | 7.8 |
2024-03-04 | CVE-2023-43540 | Qualcomm | Out-of-bounds Write vulnerability in Qualcomm products Memory corruption while processing the IOCTL FM HCI WRITE request. | 7.8 |
2024-03-04 | CVE-2023-43541 | Qualcomm | NULL Pointer Dereference vulnerability in Qualcomm products Memory corruption while invoking the SubmitCommands call on Gfx engine during the graphics render. | 7.8 |
2024-03-04 | CVE-2023-43546 | Qualcomm | Use After Free vulnerability in Qualcomm products Memory corruption while invoking HGSL IOCTL context create. | 7.8 |
2024-03-04 | CVE-2023-43547 | Qualcomm | Use After Free vulnerability in Qualcomm products Memory corruption while invoking IOCTLs calls in Automotive Multimedia. | 7.8 |
2024-03-04 | CVE-2023-43549 | Qualcomm | Out-of-bounds Write vulnerability in Qualcomm products Memory corruption while processing TPC target power table in FTM TPC. | 7.8 |
2024-03-04 | CVE-2023-46708 | Openatom | Use After Free vulnerability in Openatom Openharmony in OpenHarmony v3.2.4 and prior versions allow a local attacker arbitrary code execution in any apps through use after free. | 7.8 |
2024-03-04 | CVE-2024-26622 | Linux | Use After Free vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: tomoyo: fix UAF write bug in tomoyo_write_control() Since tomoyo_write_control() updates head->write_buf when write() of long lines is requested, we need to fetch head->write_buf after head->io_sem is held. | 7.8 |
2024-03-07 | CVE-2024-1169 | Themekraft | Unspecified vulnerability in Themekraft Post Form The Post Form – Registration Form – Profile Form for User Profiles – Frontend Content Forms for User Submissions (UGC) plugin for WordPress is vulnerable to unauthorized media upload due to a missing capability check on the buddyforms_upload_handle_dropped_media function in all versions up to, and including, 2.8.7. | 7.5 |
2024-03-07 | CVE-2024-1931 | Nlnetlabs Fedoraproject | Infinite Loop vulnerability in multiple products NLnet Labs Unbound version 1.18.0 up to and including version 1.19.1 contain a vulnerability that can cause denial of service by a certain code path that can lead to an infinite loop. | 7.5 |
2024-03-06 | CVE-2024-24761 | Galette | Incorrect Authorization vulnerability in Galette 1.0.0/1.0.1 Galette is a membership management web application for non profit organizations. | 7.5 |
2024-03-06 | CVE-2023-33677 | Oretnom23 | SQL Injection vulnerability in Oretnom23 Lost and Found Information System 1.0 Sourcecodester Lost and Found Information System's Version 1.0 is vulnerable to unauthenticated SQL Injection at "?page=items/view&id=*". | 7.5 |
2024-03-06 | CVE-2024-22889 | Plone | Incorrect Default Permissions vulnerability in Plone 6.0.9 Due to incorrect access control in Plone version v6.0.9, remote attackers can view and list all files hosted on the website via sending a crafted request. | 7.5 |
2024-03-05 | CVE-2024-27765 | Jeewms | Path Traversal vulnerability in Jeewms Directory Traversal vulnerability in Jeewms v.3.7 and before allows a remote attacker to obtain sensitive information via the cgformTemplateController component. | 7.5 |
2024-03-04 | CVE-2023-32331 | IBM | Classic Buffer Overflow vulnerability in IBM Sterling Connect:Express for Unix 1.5.0 IBM Connect:Express for UNIX 1.5.0 is vulnerable to a buffer overflow that could allow a remote attacker to cause a denial of service through its browser UI. | 7.5 |
2024-03-04 | CVE-2024-27199 | Jetbrains | Path Traversal vulnerability in Jetbrains Teamcity In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions was possible | 7.3 |
2024-03-08 | CVE-2024-23216 | Apple | Path Traversal vulnerability in Apple Macos A path handling issue was addressed with improved validation. | 7.1 |
2024-03-08 | CVE-2024-23248 | Apple | Unspecified vulnerability in Apple Macos The issue was addressed with improved memory handling. | 7.1 |
2024-03-08 | CVE-2024-23249 | Apple | Unspecified vulnerability in Apple Macos The issue was addressed with improved memory handling. | 7.1 |
2024-03-05 | CVE-2024-27929 | Sixlabors | Use After Free vulnerability in Sixlabors Imagesharp ImageSharp is a managed, cross-platform, 2D graphics library. | 7.1 |
2024-03-04 | CVE-2021-47083 | Linux | Out-of-bounds Read vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: pinctrl: mediatek: fix global-out-of-bounds issue When eint virtual eint number is greater than gpio number, it maybe produce 'desc[eint_n]' size globle-out-of-bounds issue. | 7.1 |
2024-03-04 | CVE-2021-47101 | Linux | Use of Uninitialized Resource vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: asix: fix uninit-value in asix_mdio_read() asix_read_cmd() may read less than sizeof(smsr) bytes and in this case smsr will be uninitialized. Fail log: BUG: KMSAN: uninit-value in asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline] BUG: KMSAN: uninit-value in asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline] drivers/net/usb/asix_common.c:497 BUG: KMSAN: uninit-value in asix_mdio_read+0x3c1/0xb00 drivers/net/usb/asix_common.c:497 drivers/net/usb/asix_common.c:497 asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline] asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline] drivers/net/usb/asix_common.c:497 asix_mdio_read+0x3c1/0xb00 drivers/net/usb/asix_common.c:497 drivers/net/usb/asix_common.c:497 | 7.1 |
2024-03-04 | CVE-2021-47088 | Linux | Use After Free vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: mm/damon/dbgfs: protect targets destructions with kdamond_lock DAMON debugfs interface iterates current monitoring targets in 'dbgfs_target_ids_read()' while holding the corresponding 'kdamond_lock'. | 7.0 |
95 Medium Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2024-03-08 | CVE-2024-23234 | Apple | Out-of-bounds Write vulnerability in Apple Macos An out-of-bounds write issue was addressed with improved input validation. | 6.7 |
2024-03-04 | CVE-2024-20022 | Linuxfoundation Rdkcentral Openwrt | In lk, there is a possible escalation of privilege due to a missing bounds check. | 6.7 |
2024-03-08 | CVE-2024-21900 | Qnap | Unspecified vulnerability in Qnap QTS and Quts Hero An injection vulnerability has been reported to affect several QNAP operating system versions. | 6.5 |
2024-03-08 | CVE-2024-1851 | Servit | Missing Authorization vulnerability in Servit Affiliate-Toolkit The affiliate-toolkit – WordPress Affiliate Plugin plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the atkp_create_list() function in all versions up to, and including, 3.5.4. | 6.5 |
2024-03-08 | CVE-2024-23254 | Apple Fedoraproject Wpewebkit Webkitgtk | The issue was addressed with improved UI handling. | 6.5 |
2024-03-08 | CVE-2024-23259 | Apple | Unspecified vulnerability in Apple Iphone OS The issue was addressed with improved checks. | 6.5 |
2024-03-08 | CVE-2024-23263 | Apple Wpewebkit Webkitgtk Fedoraproject | A logic issue was addressed with improved validation. | 6.5 |
2024-03-08 | CVE-2024-23280 | Apple Fedoraproject Wpewebkit Webkitgtk | Injection vulnerability in multiple products An injection issue was addressed with improved validation. | 6.5 |
2024-03-08 | CVE-2024-23284 | Apple Fedoraproject Wpewebkit Webkitgtk | A logic issue was addressed with improved state management. | 6.5 |
2024-03-07 | CVE-2024-28229 | Jetbrains | Incorrect Authorization vulnerability in Jetbrains Youtrack In JetBrains YouTrack before 2024.1.25893 user without appropriate permissions could restore issues and articles | 6.5 |
2024-03-07 | CVE-2024-28230 | Jetbrains | Missing Authorization vulnerability in Jetbrains Youtrack In JetBrains YouTrack before 2024.1.25893 attaching/detaching workflow to a project was possible without project admin permissions | 6.5 |
2024-03-06 | CVE-2024-28154 | Jenkins | Unspecified vulnerability in Jenkins MQ Notifier Jenkins MQ Notifier Plugin 1.4.0 and earlier logs potentially sensitive build parameters as part of debug information in build logs by default. | 6.5 |
2024-03-05 | CVE-2022-22399 | IBM | Improper Encoding or Escaping of Output vulnerability in IBM Aspera Faspex 5.0.0/5.0.1 IBM Aspera Faspex 5.0.0 and 5.0.1 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. | 6.5 |
2024-03-05 | CVE-2024-27564 | Dirk1983 | Server-Side Request Forgery (SSRF) vulnerability in Dirk1983 Chatgpt 20230523 A Server-Side Request Forgery (SSRF) in pictureproxy.php of ChatGPT commit f9f4bbc allows attackers to force the application to make arbitrary requests via injection of crafted URLs into the urlparameter. | 6.5 |
2024-03-05 | CVE-2024-27931 | Deno | Unspecified vulnerability in Deno Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. | 6.5 |
2024-03-09 | CVE-2024-1320 | Metagauss | Cross-site Scripting vulnerability in Metagauss Eventprime The EventPrime – Events Calendar, Bookings and Tickets plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'offline_status' parameter in all versions up to, and including, 3.4.3 due to insufficient input sanitization and output escaping. | 6.1 |
2024-03-07 | CVE-2024-1720 | Wpuserregistration | Cross-site Scripting vulnerability in Wpuserregistration User Registration & Membership The User Registration – Custom Registration Form, Login Form, and User Profile WordPress Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Display Name' parameter in all versions up to, and including, 3.1.4 due to insufficient input sanitization and output escaping. | 6.1 |
2024-03-06 | CVE-2023-49971 | Oretnom23 | Cross-site Scripting vulnerability in Oretnom23 Customer Support System 1.0 A cross-site scripting (XSS) vulnerability in Customer Support System v1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the firstname parameter at /customer_support/index.php?page=customer_list. | 6.1 |
2024-03-06 | CVE-2023-49973 | Oretnom23 | Cross-site Scripting vulnerability in Oretnom23 Customer Support System 1.0 A cross-site scripting (XSS) vulnerability in Customer Support System v1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the email parameter at /customer_support/index.php?page=customer_list. | 6.1 |
2024-03-05 | CVE-2022-46088 | Oretnom23 | Cross-site Scripting vulnerability in Oretnom23 Online Flight Booking Management System 1.0 Online Flight Booking Management System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the feedback form. | 6.1 |
2024-03-04 | CVE-2023-38360 | IBM | Unspecified vulnerability in IBM Cics TX 10.1 IBM CICS TX Advanced 10.1 is vulnerable to cross-site scripting. | 6.1 |
2024-03-08 | CVE-2024-23277 | Apple | Unspecified vulnerability in Apple Ipad OS, Iphone OS and Macos The issue was addressed with improved checks. | 5.9 |
2024-03-06 | CVE-2024-28174 | Jetbrains | Incorrect Authorization vulnerability in Jetbrains Teamcity In JetBrains TeamCity before 2023.11.4 presigned URL generation requests in S3 Artifact Storage plugin were authorized improperly | 5.8 |
2024-03-08 | CVE-2022-43855 | IBM | Unspecified vulnerability in IBM Spss Statistics 26.0.0.0/27.0.1.0/28.0.0.0 IBM SPSS Statistics 26.0, 27.0.1, and 28.0 could allow a local user to create multiple files that could exhaust the file handles capacity and cause a denial of service. | 5.5 |
2024-03-08 | CVE-2023-28826 | Apple | Unspecified vulnerability in Apple Iphone OS and Macos This issue was addressed with improved redaction of sensitive information. | 5.5 |
2024-03-08 | CVE-2024-23201 | Apple | Incorrect Default Permissions vulnerability in Apple products A permissions issue was addressed with additional restrictions. | 5.5 |
2024-03-08 | CVE-2024-23205 | Apple | Unspecified vulnerability in Apple Ipad OS and Iphone OS A privacy issue was addressed with improved private data redaction for log entries. | 5.5 |
2024-03-08 | CVE-2024-23220 | Apple | Unspecified vulnerability in Apple Ipad OS and Iphone OS The issue was addressed with improved handling of caches. | 5.5 |
2024-03-08 | CVE-2024-23230 | Apple | Unspecified vulnerability in Apple Macos This issue was addressed with improved file handling. | 5.5 |
2024-03-08 | CVE-2024-23231 | Apple | Unspecified vulnerability in Apple products A privacy issue was addressed with improved private data redaction for log entries. | 5.5 |
2024-03-08 | CVE-2024-23241 | Apple | Unspecified vulnerability in Apple products This issue was addressed through improved state management. | 5.5 |
2024-03-08 | CVE-2024-23250 | Apple | Unspecified vulnerability in Apple products An access issue was addressed with improved access restrictions. | 5.5 |
2024-03-08 | CVE-2024-23260 | Apple | Unspecified vulnerability in Apple Macos This issue was addressed by removing additional entitlements. | 5.5 |
2024-03-08 | CVE-2024-23264 | Apple | Unspecified vulnerability in Apple products A validation issue was addressed with improved input sanitization. | 5.5 |
2024-03-08 | CVE-2024-23266 | Apple | Unspecified vulnerability in Apple Macos The issue was addressed with improved checks. | 5.5 |
2024-03-08 | CVE-2024-23267 | Apple | Unspecified vulnerability in Apple Macos The issue was addressed with improved checks. | 5.5 |
2024-03-08 | CVE-2024-23269 | Apple | Unspecified vulnerability in Apple Macos A downgrade issue affecting Intel-based Mac computers was addressed with additional code-signing restrictions. | 5.5 |
2024-03-08 | CVE-2024-23272 | Apple | Unspecified vulnerability in Apple Macos A logic issue was addressed with improved checks. | 5.5 |
2024-03-08 | CVE-2024-23279 | Apple | Unspecified vulnerability in Apple Macos A privacy issue was addressed with improved private data redaction for log entries. | 5.5 |
2024-03-08 | CVE-2024-23281 | Apple | Unspecified vulnerability in Apple Macos This issue was addressed with improved state management. | 5.5 |
2024-03-08 | CVE-2024-23283 | Apple | Unspecified vulnerability in Apple Iphone OS A privacy issue was addressed with improved private data redaction for log entries. | 5.5 |
2024-03-08 | CVE-2024-23285 | Apple | Link Following vulnerability in Apple Macos This issue was addressed with improved handling of symlinks. | 5.5 |
2024-03-08 | CVE-2024-23287 | Apple | Unspecified vulnerability in Apple products A privacy issue was addressed with improved handling of temporary files. | 5.5 |
2024-03-08 | CVE-2024-23290 | Apple | Unspecified vulnerability in Apple products A logic issue was addressed with improved restrictions. | 5.5 |
2024-03-08 | CVE-2024-23295 | Apple | Incorrect Default Permissions vulnerability in Apple Visionos 1.0.2 A permissions issue was addressed to help ensure Personas are always protected This issue is fixed in visionOS 1.1. | 5.5 |
2024-03-08 | CVE-2024-23297 | Apple | Unspecified vulnerability in Apple products The issue was addressed with improved checks. | 5.5 |
2024-03-06 | CVE-2023-52583 | Linux Debian | Improper Locking vulnerability in multiple products In the Linux kernel, the following vulnerability has been resolved: ceph: fix deadlock or deadcode of misusing dget() The lock order is incorrect between denty and its parent, we should always make sure that the parent get the lock first. But since this deadcode is never used and the parent dir will always be set from the callers, let's just remove it. | 5.5 |
2024-03-06 | CVE-2023-52593 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() Since 'ieee80211_beacon_get()' can return NULL, 'wfx_set_mfp_ap()' should check the return value before examining skb data. | 5.5 |
2024-03-06 | CVE-2023-52595 | Linux | Improper Locking vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: wifi: rt2x00: restart beacon queue when hardware reset When a hardware reset is triggered, all registers are reset, so all queues are forced to stop in hardware interface. | 5.5 |
2024-03-06 | CVE-2024-26626 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: ipmr: fix kernel panic when forwarding mcast packets The stacktrace was: [ 86.305548] BUG: kernel NULL pointer dereference, address: 0000000000000092 [ 86.306815] #PF: supervisor read access in kernel mode [ 86.307717] #PF: error_code(0x0000) - not-present page [ 86.308624] PGD 0 P4D 0 [ 86.309091] Oops: 0000 [#1] PREEMPT SMP NOPTI [ 86.309883] CPU: 2 PID: 3139 Comm: pimd Tainted: G U 6.8.0-6wind-knet #1 [ 86.311027] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.11.1-0-g0551a4be2c-prebuilt.qemu-project.org 04/01/2014 [ 86.312728] RIP: 0010:ip_mr_forward (/build/work/knet/net/ipv4/ipmr.c:1985) [ 86.313399] Code: f9 1f 0f 87 85 03 00 00 48 8d 04 5b 48 8d 04 83 49 8d 44 c5 00 48 8b 40 70 48 39 c2 0f 84 d9 00 00 00 49 8b 46 58 48 83 e0 fe <80> b8 92 00 00 00 00 0f 84 55 ff ff ff 49 83 47 38 01 45 85 e4 0f [ 86.316565] RSP: 0018:ffffad21c0583ae0 EFLAGS: 00010246 [ 86.317497] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 86.318596] RDX: ffff9559cb46c000 RSI: 0000000000000000 RDI: 0000000000000000 [ 86.319627] RBP: ffffad21c0583b30 R08: 0000000000000000 R09: 0000000000000000 [ 86.320650] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001 [ 86.321672] R13: ffff9559c093a000 R14: ffff9559cc00b800 R15: ffff9559c09c1d80 [ 86.322873] FS: 00007f85db661980(0000) GS:ffff955a79d00000(0000) knlGS:0000000000000000 [ 86.324291] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 86.325314] CR2: 0000000000000092 CR3: 000000002f13a000 CR4: 0000000000350ef0 [ 86.326589] Call Trace: [ 86.327036] <TASK> [ 86.327434] ? show_regs (/build/work/knet/arch/x86/kernel/dumpstack.c:479) [ 86.328049] ? __die (/build/work/knet/arch/x86/kernel/dumpstack.c:421 /build/work/knet/arch/x86/kernel/dumpstack.c:434) [ 86.328508] ? page_fault_oops (/build/work/knet/arch/x86/mm/fault.c:707) [ 86.329107] ? do_user_addr_fault (/build/work/knet/arch/x86/mm/fault.c:1264) [ 86.329756] ? srso_return_thunk (/build/work/knet/arch/x86/lib/retpoline.S:223) [ 86.330350] ? __irq_work_queue_local (/build/work/knet/kernel/irq_work.c:111 (discriminator 1)) [ 86.331013] ? exc_page_fault (/build/work/knet/./arch/x86/include/asm/paravirt.h:693 /build/work/knet/arch/x86/mm/fault.c:1515 /build/work/knet/arch/x86/mm/fault.c:1563) [ 86.331702] ? asm_exc_page_fault (/build/work/knet/./arch/x86/include/asm/idtentry.h:570) [ 86.332468] ? ip_mr_forward (/build/work/knet/net/ipv4/ipmr.c:1985) [ 86.333183] ? srso_return_thunk (/build/work/knet/arch/x86/lib/retpoline.S:223) [ 86.333920] ipmr_mfc_add (/build/work/knet/./include/linux/rcupdate.h:782 /build/work/knet/net/ipv4/ipmr.c:1009 /build/work/knet/net/ipv4/ipmr.c:1273) [ 86.334583] ? __pfx_ipmr_hash_cmp (/build/work/knet/net/ipv4/ipmr.c:363) [ 86.335357] ip_mroute_setsockopt (/build/work/knet/net/ipv4/ipmr.c:1470) [ 86.336135] ? srso_return_thunk (/build/work/knet/arch/x86/lib/retpoline.S:223) [ 86.336854] ? ip_mroute_setsockopt (/build/work/knet/net/ipv4/ipmr.c:1470) [ 86.337679] do_ip_setsockopt (/build/work/knet/net/ipv4/ip_sockglue.c:944) [ 86.338408] ? __pfx_unix_stream_read_actor (/build/work/knet/net/unix/af_unix.c:2862) [ 86.339232] ? srso_return_thunk (/build/work/knet/arch/x86/lib/retpoline.S:223) [ 86.339809] ? aa_sk_perm (/build/work/knet/security/apparmor/include/cred.h:153 /build/work/knet/security/apparmor/net.c:181) [ 86.340342] ip_setsockopt (/build/work/knet/net/ipv4/ip_sockglue.c:1415) [ 86.340859] raw_setsockopt (/build/work/knet/net/ipv4/raw.c:836) [ 86.341408] ? security_socket_setsockopt (/build/work/knet/security/security.c:4561 (discriminator 13)) [ 86.342116] sock_common_setsockopt (/build/work/knet/net/core/sock.c:3716) [ 86.342747] do_sock_setsockopt (/build/work/knet/net/socket.c:2313) [ 86.343363] __sys_setsockopt (/build/work/knet/./include/linux/file.h:32 /build/work/kn ---truncated--- | 5.5 |
2024-03-05 | CVE-2022-48630 | Linux | Infinite Loop vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ The commit referenced in the Fixes tag removed the 'break' from the else branch in qcom_rng_read(), causing an infinite loop whenever 'max' is not a multiple of WORD_SZ. | 5.5 |
2024-03-04 | CVE-2021-47104 | Linux | Memory Leak vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: IB/qib: Fix memory leak in qib_user_sdma_queue_pkts() The wrong goto label was used for the error case and missed cleanup of the pkt allocation. Addresses-Coverity-ID: 1493352 ("Resource leak") | 5.5 |
2024-03-04 | CVE-2021-47108 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: drm/mediatek: hdmi: Perform NULL pointer check for mtk_hdmi_conf In commit 41ca9caaae0b ("drm/mediatek: hdmi: Add check for CEA modes only") a check for CEA modes was added to function mtk_hdmi_bridge_mode_valid() in order to address possible issues on MT8167; moreover, with commit c91026a938c2 ("drm/mediatek: hdmi: Add optional limit on maximal HDMI mode clock") another similar check was introduced. Unfortunately though, at the time of writing, MT8173 does not provide any mtk_hdmi_conf structure and this is crashing the kernel with NULL pointer upon entering mtk_hdmi_bridge_mode_valid(), which happens as soon as a HDMI cable gets plugged in. To fix this regression, add a NULL pointer check for hdmi->conf in the said function, restoring HDMI functionality and avoiding NULL pointer kernel panics. | 5.5 |
2024-03-04 | CVE-2021-47086 | Linux | Unspecified vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: phonet/pep: refuse to enable an unbound pipe This ioctl() implicitly assumed that the socket was already bound to a valid local socket name, i.e. | 5.5 |
2024-03-04 | CVE-2021-47091 | Linux | Improper Locking vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: mac80211: fix locking in ieee80211_start_ap error path We need to hold the local->mtx to release the channel context, as even encoded by the lockdep_assert_held() there. | 5.5 |
2024-03-04 | CVE-2021-47093 | Linux | Memory Leak vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: platform/x86: intel_pmc_core: fix memleak on registration failure In case device registration fails during module initialisation, the platform device structure needs to be freed using platform_device_put() to properly free all resources (e.g. | 5.5 |
2024-03-04 | CVE-2021-47095 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: ipmi: ssif: initialize ssif_info->client early During probe ssif_info->client is dereferenced in error path. | 5.5 |
2024-03-04 | CVE-2021-47100 | Linux | Use After Free vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module Hi, When testing install and uninstall of ipmi_si.ko and ipmi_msghandler.ko, the system crashed. The log as follows: [ 141.087026] BUG: unable to handle kernel paging request at ffffffffc09b3a5a [ 141.087241] PGD 8fe4c0d067 P4D 8fe4c0d067 PUD 8fe4c0f067 PMD 103ad89067 PTE 0 [ 141.087464] Oops: 0010 [#1] SMP NOPTI [ 141.087580] CPU: 67 PID: 668 Comm: kworker/67:1 Kdump: loaded Not tainted 4.18.0.x86_64 #47 [ 141.088009] Workqueue: events 0xffffffffc09b3a40 [ 141.088009] RIP: 0010:0xffffffffc09b3a5a [ 141.088009] Code: Bad RIP value. [ 141.088009] RSP: 0018:ffffb9094e2c3e88 EFLAGS: 00010246 [ 141.088009] RAX: 0000000000000000 RBX: ffff9abfdb1f04a0 RCX: 0000000000000000 [ 141.088009] RDX: 0000000000000000 RSI: 0000000000000246 RDI: 0000000000000246 [ 141.088009] RBP: 0000000000000000 R08: ffff9abfffee3cb8 R09: 00000000000002e1 [ 141.088009] R10: ffffb9094cb73d90 R11: 00000000000f4240 R12: ffff9abfffee8700 [ 141.088009] R13: 0000000000000000 R14: ffff9abfdb1f04a0 R15: ffff9abfdb1f04a8 [ 141.088009] FS: 0000000000000000(0000) GS:ffff9abfffec0000(0000) knlGS:0000000000000000 [ 141.088009] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 141.088009] CR2: ffffffffc09b3a30 CR3: 0000008fe4c0a001 CR4: 00000000007606e0 [ 141.088009] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 141.088009] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 141.088009] PKRU: 55555554 [ 141.088009] Call Trace: [ 141.088009] ? process_one_work+0x195/0x390 [ 141.088009] ? worker_thread+0x30/0x390 [ 141.088009] ? process_one_work+0x390/0x390 [ 141.088009] ? kthread+0x10d/0x130 [ 141.088009] ? kthread_flush_work_fn+0x10/0x10 [ 141.088009] ? ret_from_fork+0x35/0x40] BUG: unable to handle kernel paging request at ffffffffc0b28a5a [ 200.223240] PGD 97fe00d067 P4D 97fe00d067 PUD 97fe00f067 PMD a580cbf067 PTE 0 [ 200.223464] Oops: 0010 [#1] SMP NOPTI [ 200.223579] CPU: 63 PID: 664 Comm: kworker/63:1 Kdump: loaded Not tainted 4.18.0.x86_64 #46 [ 200.224008] Workqueue: events 0xffffffffc0b28a40 [ 200.224008] RIP: 0010:0xffffffffc0b28a5a [ 200.224008] Code: Bad RIP value. [ 200.224008] RSP: 0018:ffffbf3c8e2a3e88 EFLAGS: 00010246 [ 200.224008] RAX: 0000000000000000 RBX: ffffa0799ad6bca0 RCX: 0000000000000000 [ 200.224008] RDX: 0000000000000000 RSI: 0000000000000246 RDI: 0000000000000246 [ 200.224008] RBP: 0000000000000000 R08: ffff9fe43fde3cb8 R09: 00000000000000d5 [ 200.224008] R10: ffffbf3c8cb53d90 R11: 00000000000f4240 R12: ffff9fe43fde8700 [ 200.224008] R13: 0000000000000000 R14: ffffa0799ad6bca0 R15: ffffa0799ad6bca8 [ 200.224008] FS: 0000000000000000(0000) GS:ffff9fe43fdc0000(0000) knlGS:0000000000000000 [ 200.224008] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 200.224008] CR2: ffffffffc0b28a30 CR3: 00000097fe00a002 CR4: 00000000007606e0 [ 200.224008] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 200.224008] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 200.224008] PKRU: 55555554 [ 200.224008] Call Trace: [ 200.224008] ? process_one_work+0x195/0x390 [ 200.224008] ? worker_thread+0x30/0x390 [ 200.224008] ? process_one_work+0x390/0x390 [ 200.224008] ? kthread+0x10d/0x130 [ 200.224008] ? kthread_flush_work_fn+0x10/0x10 [ 200.224008] ? ret_from_fork+0x35/0x40 [ 200.224008] kernel fault(0x1) notification starting on CPU 63 [ 200.224008] kernel fault(0x1) notification finished on CPU 63 [ 200.224008] CR2: ffffffffc0b28a5a [ 200.224008] ---[ end trace c82a412d93f57412 ]--- The reason is as follows: T1: rmmod ipmi_si. ->ipmi_unregister_smi() -> ipmi_bmc_unregister() -> __ipmi_bmc_unregister() -> kref_put(&bmc->usecount, cleanup_bmc_device); -> schedule_work(&bmc->remove_work); T2: rmmod ipmi_msghandl ---truncated--- | 5.5 |
2024-03-04 | CVE-2023-33078 | Qualcomm | Out-of-bounds Read vulnerability in Qualcomm products Information Disclosure while processing IOCTL request in FastRPC. | 5.5 |
2024-03-04 | CVE-2023-25176 | Openatom | Out-of-bounds Read vulnerability in Openatom Openharmony in OpenHarmony v3.2.4 and prior versions allow a local attacker cause information leak through out-of-bounds Read. | 5.5 |
2024-03-04 | CVE-2023-49602 | Openatom | Type Confusion vulnerability in Openatom Openharmony in OpenHarmony v3.2.4 and prior versions allow a local attacker cause apps crash through type confusion. | 5.5 |
2024-03-04 | CVE-2024-21816 | Openatom | Improper Preservation of Permissions vulnerability in Openatom Openharmony 4.0 in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through improper preservation of permissions. | 5.5 |
2024-03-04 | CVE-2024-21826 | Openatom | Insecure Storage of Sensitive Information vulnerability in Openatom Openharmony in OpenHarmony v3.2.4 and prior versions allow a local attacker cause sensitive information leak through insecure storage. | 5.5 |
2024-03-09 | CVE-2024-1767 | Creativethemes | Cross-site Scripting vulnerability in Creativethemes Blocksy The Blocksy theme for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's blocks in all versions up to, and including, 2.0.26 due to insufficient input sanitization and output escaping on user supplied attributes like 'className' and 'radius'. | 5.4 |
2024-03-07 | CVE-2024-1802 | Wpdeveloper | Cross-site Scripting vulnerability in Wpdeveloper Embedpress The EmbedPress – Embed PDF, Google Docs, Vimeo, Wistia, Embed YouTube Videos, Audios, Maps & Embed Any Documents in Gutenberg & Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Wistia embed block in all versions up to, and including, 3.9.10 due to insufficient input sanitization and output escaping on the user supplied url. | 5.4 |
2024-03-07 | CVE-2024-2128 | Wpdeveloper | Cross-site Scripting vulnerability in Wpdeveloper Embedpress The EmbedPress – Embed PDF, Google Docs, Vimeo, Wistia, Embed YouTube Videos, Audios, Maps & Embed Any Documents in Gutenberg & Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's embed widget in all versions up to, and including, 3.9.10 due to insufficient input sanitization and output escaping on user supplied attributes. | 5.4 |
2024-03-07 | CVE-2024-1534 | Booster | Cross-site Scripting vulnerability in Booster for Woocommerce The Booster for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 7.1.7 due to insufficient input sanitization and output escaping on user supplied attributes. | 5.4 |
2024-03-07 | CVE-2024-2136 | Wpkoi | Cross-site Scripting vulnerability in Wpkoi Templates for Elementor The WPKoi Templates for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Advanced Heading widget in all versions up to, and including, 2.5.6 due to insufficient input sanitization and output escaping. | 5.4 |
2024-03-07 | CVE-2024-1506 | Bdthemes | Cross-site Scripting vulnerability in Bdthemes Prime Slider The Prime Slider – Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'title_tags' attribute of the Fiestar widget in all versions up to, and including, 3.13.1 due to insufficient input sanitization and output escaping. | 5.4 |
2024-03-07 | CVE-2024-1366 | Leevio | Cross-site Scripting vulnerability in Leevio Happy Addons for Elementor The Happy Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘archive_title_tag’ attribute of the Archive Title widget in all versions up to, and including, 3.10.3 due to insufficient input sanitization and output escaping. | 5.4 |
2024-03-07 | CVE-2024-1377 | Leevio | Cross-site Scripting vulnerability in Leevio Happy Addons for Elementor The Happy Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘author_meta_tag’ attribute of the Author Meta widget in all versions up to, and including, 3.10.3 due to insufficient input sanitization and output escaping. | 5.4 |
2024-03-07 | CVE-2024-1761 | Ninjateam | Cross-site Scripting vulnerability in Ninjateam WP Chat APP The WP Chat App plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's widget/block in all versions up to, and including, 3.6.1 due to insufficient input sanitization and output escaping on user supplied attributes such as 'buttonColor' and 'phoneNumber'. | 5.4 |
2024-03-06 | CVE-2024-28153 | Jenkins | Cross-site Scripting vulnerability in Jenkins Owasp Dependency-Check Jenkins OWASP Dependency-Check Plugin 5.4.5 and earlier does not escape vulnerability metadata from Dependency-Check reports, resulting in a stored cross-site scripting (XSS) vulnerability. | 5.4 |
2024-03-06 | CVE-2024-28156 | Jenkins | Cross-site Scripting vulnerability in Jenkins Build Monitor View Jenkins Build Monitor View Plugin 1.14-860.vd06ef2568b_3f and earlier does not escape Build Monitor View names, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure Build Monitor Views. | 5.4 |
2024-03-06 | CVE-2024-27278 | Openpne | Cross-site Scripting vulnerability in Openpne Optimelineplugin OpenPNE Plugin "opTimelinePlugin" 1.2.11 and earlier contains a cross-site scripting vulnerability. | 5.4 |
2024-03-09 | CVE-2024-1125 | Metagauss | Missing Authorization vulnerability in Metagauss Eventprime The EventPrime – Events Calendar, Bookings and Tickets plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the calendar_events_delete() function in all versions up to, and including, 3.4.3. | 5.3 |
2024-03-07 | CVE-2024-28228 | Jetbrains | Authentication Bypass by Spoofing vulnerability in Jetbrains Youtrack In JetBrains YouTrack before 2024.1.25893 creation comments on behalf of an arbitrary user in HelpDesk was possible | 5.3 |
2024-03-05 | CVE-2024-27563 | Wondercms | Server-Side Request Forgery (SSRF) vulnerability in Wondercms 3.1.3 A Server-Side Request Forgery (SSRF) in the getFileFromRepo function of WonderCMS v3.1.3 allows attackers to force the application to make arbitrary requests via injection of crafted URLs into the pluginThemeUrl parameter. | 5.3 |
2024-03-05 | CVE-2024-20837 | Samsung | Unspecified vulnerability in Samsung Internet Improper handling of granting permission for Trusted Web Activities in Samsung Internet prior to version 24.0.0.41 allows local attackers to grant permission to their own TWA WebApps without user interaction. | 5.3 |
2024-03-04 | CVE-2023-38362 | IBM | Information Exposure Through Discrepancy vulnerability in IBM Cics TX 10.1 IBM CICS TX Advanced 10.1 could disclose sensitive information to a remote attacker due to observable discrepancy in HTTP responses. | 5.3 |
2024-03-04 | CVE-2024-2151 | Oretnom23 | Unspecified vulnerability in Oretnom23 Online Mobile Store Management System 1.0 A vulnerability classified as problematic was found in SourceCodester Online Mobile Management Store 1.0. | 5.3 |
2024-03-05 | CVE-2024-2179 | Concretecms | Cross-site Scripting vulnerability in Concretecms Concrete CMS Concrete CMS version 9 before 9.2.7 is vulnerable to Stored XSS via the Name field of a Group type since there is insufficient validation of administrator provided data for that field. | 4.8 |
2024-03-08 | CVE-2024-21901 | Qnap | Unspecified vulnerability in Qnap QTS A SQL injection vulnerability has been reported to affect myQNAPcloud. | 4.7 |
2024-03-08 | CVE-2024-23235 | Apple | Race Condition vulnerability in Apple products A race condition was addressed with additional validation. | 4.7 |
2024-03-08 | CVE-2024-23239 | Apple | Race Condition vulnerability in Apple products A race condition was addressed with improved state handling. | 4.7 |
2024-03-08 | CVE-2024-23275 | Apple | Race Condition vulnerability in Apple Macos A race condition was addressed with additional validation. | 4.7 |
2024-03-06 | CVE-2024-1760 | Nsquared | Cross-Site Request Forgery (CSRF) vulnerability in Nsquared Simply Schedule Appointments 1.6.6.16/1.6.6.20/1.6.6.7 The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.6.6.20. | 4.7 |
2024-03-08 | CVE-2024-23293 | Apple | Unspecified vulnerability in Apple products This issue was addressed through improved state management. | 4.6 |
2024-03-05 | CVE-2024-20839 | Samsung | Unspecified vulnerability in Samsung Voice Recorder Improper access control in Samsung Voice Recorder prior to versions 21.5.16.01 in Android 12 and Android 13, 21.4.51.02 in Android 14 allows physical attackers to access recording files on the lock screen. | 4.6 |
2024-03-04 | CVE-2024-20020 | Out-of-bounds Write vulnerability in Google Android 13.0 In OPTEE, there is a possible out of bounds write due to an incorrect bounds check. | 4.4 | |
2024-03-08 | CVE-2024-23273 | Apple | Unspecified vulnerability in Apple products This issue was addressed through improved state management. | 4.3 |
2024-03-07 | CVE-2024-22256 | Vmware | Unspecified vulnerability in VMWare Cloud Director 10.4.0/10.5 VMware Cloud Director contains a partial information disclosure vulnerability. A malicious actor can potentially gather information about organization names based on the behavior of the instance. | 4.3 |
2024-03-06 | CVE-2024-28155 | Jenkins | Missing Authorization vulnerability in Jenkins Appspider Jenkins AppSpider Plugin 1.0.16 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to obtain information about available scan config names, engine group names, and client names. | 4.3 |
2024-03-06 | CVE-2024-28173 | Jetbrains | Unspecified vulnerability in Jetbrains Teamcity In JetBrains TeamCity between 2023.11 and 2023.11.4 custom build parameters of the "password" type could be disclosed | 4.3 |
2024-03-05 | CVE-2023-26282 | IBM | Unspecified vulnerability in IBM Watson Cp4D Data Stores IBM Watson CP4D Data Stores 4.6.0 through 4.6.3 could allow a user with physical access and specific knowledge of the system to modify files or data on the system. | 4.2 |
16 Low Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2024-03-08 | CVE-2024-23227 | Apple | Unspecified vulnerability in Apple Macos This issue was addressed with improved redaction of sensitive information. | 3.3 |
2024-03-08 | CVE-2024-23232 | Apple | Unspecified vulnerability in Apple Macos A privacy issue was addressed with improved handling of temporary files. | 3.3 |
2024-03-08 | CVE-2024-23238 | Apple | Unspecified vulnerability in Apple Macos An access issue was addressed with improved access restrictions. | 3.3 |
2024-03-08 | CVE-2024-23242 | Apple | Information Exposure Through Log Files vulnerability in Apple Ipad OS and Iphone OS A privacy issue was addressed by not logging contents of text fields. | 3.3 |
2024-03-08 | CVE-2024-23245 | Apple | Unspecified vulnerability in Apple Macos This issue was addressed by adding an additional prompt for user consent. | 3.3 |
2024-03-08 | CVE-2024-23253 | Apple | Incorrect Default Permissions vulnerability in Apple Macos A permissions issue was addressed with additional restrictions. | 3.3 |
2024-03-08 | CVE-2024-23257 | Apple | Unspecified vulnerability in Apple products The issue was addressed with improved memory handling. | 3.3 |
2024-03-08 | CVE-2024-23262 | Apple | Unspecified vulnerability in Apple Iphone OS This issue was addressed with additional entitlement checks. | 3.3 |
2024-03-08 | CVE-2024-23289 | Apple | Unspecified vulnerability in Apple products A lock screen issue was addressed with improved state management. | 3.3 |
2024-03-08 | CVE-2024-23291 | Apple | Unspecified vulnerability in Apple products A privacy issue was addressed with improved private data redaction for log entries. | 3.3 |
2024-03-08 | CVE-2024-23292 | Apple | Unspecified vulnerability in Apple Iphone OS This issue was addressed with improved data protection. | 3.3 |
2024-03-05 | CVE-2024-23243 | Apple | Unspecified vulnerability in Apple Ipad OS and Iphone OS A privacy issue was addressed with improved private data redaction for log entries. | 3.3 |
2024-03-05 | CVE-2024-23256 | Apple | Unspecified vulnerability in Apple Ipad OS and Iphone OS A logic issue was addressed with improved state management. | 3.3 |
2024-03-08 | CVE-2024-23240 | Apple | Unspecified vulnerability in Apple Ipad OS and Iphone OS The issue was addressed with improved checks. | 2.4 |
2024-03-08 | CVE-2024-23255 | Apple | Improper Authentication vulnerability in Apple Ipad OS and Iphone OS An authentication issue was addressed with improved state management. | 2.4 |
2024-03-04 | CVE-2024-24901 | Dell | Unspecified vulnerability in Dell Powerscale Onefs Dell PowerScale OneFS 8.2.x through 9.6.0.x contain an insufficient logging vulnerability. | 2.3 |