Weekly Vulnerabilities Reports > March 4 to 10, 2024

Overview

201 new vulnerabilities reported during this period, including 16 critical vulnerabilities and 74 high severity vulnerabilities. This weekly summary report vulnerabilities in 537 products from 55 vendors including Apple, Linux, Qualcomm, Oretnom23, and Fedoraproject. Vulnerabilities are notably categorized as "Cross-site Scripting", "Out-of-bounds Write", "Use After Free", "Path Traversal", and "NULL Pointer Dereference".

  • 82 reported vulnerabilities are remotely exploitables.
  • 29 reported vulnerabilities are related to weaknesses in OWASP Top Ten.
  • 110 reported vulnerabilities are exploitable by an anonymous user.
  • Apple has the most reported vulnerabilities, with 70 reported vulnerabilities.
  • Oretnom23 has the most reported critical vulnerabilities, with 3 reported vulnerabilities.

TOTAL
VULNERABILITIES
CRITICAL RISK
VULNERABILITIES
HIGH RISK
VULNERABILITIES
MEDIUM RISK
VULNERABILITIES
LOW RISK
VULNERABILITIES
REMOTELY
EXPLOITABLE
LOCALLY
EXPLOITABLE
EXPLOIT
AVAILABLE
EXPLOITABLE
ANONYMOUSLY
AFFECTING
WEB APPLICATION

Vulnerability Details

The following table list reported vulnerabilities for the period covered by this report:

Expand/Hide

16 Critical Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2024-03-08 CVE-2024-21899 Qnap Unspecified vulnerability in Qnap QTS and Quts Hero

An improper authentication vulnerability has been reported to affect several QNAP operating system versions.

9.8
2024-03-07 CVE-2023-41014 Code Projects SQL Injection vulnerability in Code-Projects Online JOB Portal 1.0

code-projects.org Online Job Portal 1.0 is vulnerable to SQL Injection via the Username parameter for "Employer."

9.8
2024-03-07 CVE-2024-0917 Paddlepaddle Unspecified vulnerability in Paddlepaddle 2.6.0

remote code execution in paddlepaddle/paddle 2.6.0

9.8
2024-03-07 CVE-2024-28222 Veritas Path Traversal vulnerability in Veritas Netbackup and Netbackup Appliance

In Veritas NetBackup before 8.1.2 and NetBackup Appliance before 3.1.2, the BPCD process inadequately validates the file path, allowing an unauthenticated attacker to upload and execute a custom file.

9.8
2024-03-06 CVE-2023-38944 Multilaser Improper Privilege Management vulnerability in Multilaser Re160V Firmware and Re163V Firmware

An issue in Multilaser RE160V firmware v12.03.01.09_pt and Multilaser RE163V firmware v12.03.01.10_pt allows attackers to bypass the access control and gain complete access to the application via modifying a HTTP header.

9.8
2024-03-06 CVE-2023-38945 Multilaser Unspecified vulnerability in Multilaser Re160 Firmware, Re160V Firmware and Re163V Firmware

Multilaser RE160 v5.07.51_pt_MTL01 and v5.07.52_pt_MTL01, Multilaser RE160V v12.03.01.08_pt and V12.03.01.09_pt, and Multilaser RE163V v12.03.01.08_pt allows attackers to bypass the access control and gain complete access to the application via supplying a crafted URL.

9.8
2024-03-05 CVE-2024-27764 Jeewms Path Traversal vulnerability in Jeewms

An issue in Jeewms v.3.7 and before allows a remote attacker to escalate privileges via the AuthInterceptor component.

9.8
2024-03-05 CVE-2024-27565 Dirk1983 Server-Side Request Forgery (SSRF) vulnerability in Dirk1983 Chatgpt-Wechat-Personal 20230329

A Server-Side Request Forgery (SSRF) in weixin.php of ChatGPT-wechat-personal commit a0857f6 allows attackers to force the application to make arbitrary requests.

9.8
2024-03-04 CVE-2024-27198 Jetbrains Unspecified vulnerability in Jetbrains Teamcity

In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible

9.8
2024-03-04 CVE-2023-43548 Qualcomm Out-of-bounds Write vulnerability in Qualcomm products

Memory corruption while parsing qcp clip with invalid chunk data size.

9.8
2024-03-04 CVE-2024-2153 Oretnom23 Unspecified vulnerability in Oretnom23 Online Mobile Store Management System 1.0

A vulnerability, which was classified as critical, was found in SourceCodester Online Mobile Management Store 1.0.

9.8
2024-03-04 CVE-2024-2154 Oretnom23 Unspecified vulnerability in Oretnom23 Online Mobile Store Management System 1.0

A vulnerability has been found in SourceCodester Online Mobile Management Store 1.0 and classified as critical.

9.8
2024-03-04 CVE-2024-2156 Mayurik Unspecified vulnerability in Mayurik Best POS Management System 1.0

A vulnerability was found in SourceCodester Best POS Management System 1.0.

9.8
2024-03-04 CVE-2024-2152 Oretnom23 Unspecified vulnerability in Oretnom23 Online Mobile Store Management System 1.0

A vulnerability, which was classified as critical, has been found in SourceCodester Online Mobile Management Store 1.0.

9.8
2024-03-07 CVE-2024-0818 Paddlepaddle Unspecified vulnerability in Paddlepaddle

Arbitrary File Overwrite Via Path Traversal in paddlepaddle/paddle before 2.6

9.1
2024-03-04 CVE-2024-22463 Dell Unspecified vulnerability in Dell Powerscale Onefs

Dell PowerScale OneFS 8.2.x through 9.6.0.x contains a use of a broken or risky cryptographic algorithm vulnerability.

9.1

74 High Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2024-03-10 CVE-2024-2353 Totolink Unspecified vulnerability in Totolink X6000R Firmware 9.4.0Cu.852B20230719

A vulnerability, which was classified as critical, has been found in Totolink X6000R 9.4.0cu.852_20230719.

8.8
2024-03-08 CVE-2024-23226 Apple Unspecified vulnerability in Apple products

The issue was addressed with improved memory handling.

8.8
2024-03-07 CVE-2024-0815 Paddlepaddle Unspecified vulnerability in Paddlepaddle 2.6.0

Command injection in paddle.utils.download._wget_download (bypass filter) in paddlepaddle/paddle 2.6.0

8.8
2024-03-06 CVE-2024-2173 Google
Fedoraproject
Out-of-bounds Write vulnerability in multiple products

Out of bounds memory access in V8 in Google Chrome prior to 122.0.6261.111 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page.

8.8
2024-03-06 CVE-2024-2174 Google
Fedoraproject
Out-of-bounds Write vulnerability in multiple products

Inappropriate implementation in V8 in Google Chrome prior to 122.0.6261.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

8.8
2024-03-06 CVE-2024-2176 Google
Fedoraproject
Use After Free vulnerability in multiple products

Use after free in FedCM in Google Chrome prior to 122.0.6261.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

8.8
2024-03-06 CVE-2023-38946 Multilaser Unspecified vulnerability in Multilaser Re160 Firmware 5.07.51Ptmtl01/5.07.52Ptmtl01

An issue in Multilaser RE160 firmware v5.07.51_pt_MTL01 and v5.07.52_pt_MTL01 allows attackers to bypass the access control and gain complete access to the application via supplying a crafted cookie.

8.8
2024-03-06 CVE-2023-43318 TP Link Unspecified vulnerability in Tp-Link Tl-Sg2210P Firmware 5.0

TP-Link JetStream Smart Switch TL-SG2210P 5.0 Build 20211201 allows attackers to escalate privileges via modification of the 'tid' and 'usrlvl' values in GET requests.

8.8
2024-03-08 CVE-2024-0258 Apple Unspecified vulnerability in Apple products

The issue was addressed with improved memory handling.

8.6
2024-03-08 CVE-2024-23246 Apple Unspecified vulnerability in Apple products

This issue was addressed by removing the vulnerable code.

8.6
2024-03-08 CVE-2024-23278 Apple Unspecified vulnerability in Apple products

The issue was addressed with improved checks.

8.6
2024-03-07 CVE-2024-1170 Themekraft Unspecified vulnerability in Themekraft Post Form

The Post Form – Registration Form – Profile Form for User Profiles – Frontend Content Forms for User Submissions (UGC) plugin for WordPress is vulnerable to unauthorized media file deletion due to a missing capability check on the handle_deleted_media function in all versions up to, and including, 2.8.7.

8.2
2024-03-07 CVE-2024-1299 Gitlab Unspecified vulnerability in Gitlab

A privilege escalation vulnerability was discovered in GitLab affecting versions 16.8 prior to 16.8.4 and 16.9 prior to 16.9.2.

8.1
2024-03-06 CVE-2024-27915 Sulu Incorrect Authorization vulnerability in Sulu

Sulu is a PHP content management system.

8.1
2024-03-05 CVE-2024-27561 Wondercms Server-Side Request Forgery (SSRF) vulnerability in Wondercms 3.1.3

A Server-Side Request Forgery (SSRF) in the installUpdateThemePluginAction function of WonderCMS v3.1.3 allows attackers to force the application to make arbitrary requests via injection of crafted URLs into the installThemePlugin parameter.

8.1
2024-03-04 CVE-2024-28088 Langchain Path Traversal vulnerability in Langchain

LangChain through 0.1.10 allows ../ directory traversal by an actor who is able to control the final part of the path parameter in a load_chain call.

8.1
2024-03-09 CVE-2024-25951 Dell Command Injection vulnerability in Dell Idrac8 2.50.50.50/2.52.52.52/2.60.60.60

A command injection vulnerability exists in local RACADM.

8.0
2024-03-07 CVE-2024-0199 Gitlab Incorrect Authorization vulnerability in Gitlab

An authorization bypass vulnerability was discovered in GitLab affecting versions 11.3 prior to 16.7.7, 16.7.6 prior to 16.8.4, and 16.8.3 prior to 16.9.2.

8.0
2024-03-08 CVE-2024-23233 Apple Unspecified vulnerability in Apple Macos

This issue was addressed with improved checks.

7.8
2024-03-08 CVE-2024-23244 Apple Unspecified vulnerability in Apple Macos

A logic issue was addressed with improved restrictions.

7.8
2024-03-08 CVE-2024-23247 Apple Unspecified vulnerability in Apple Macos

The issue was addressed with improved memory handling.

7.8
2024-03-08 CVE-2024-23258 Apple Out-of-bounds Read vulnerability in Apple Macos and Visionos

An out-of-bounds read was addressed with improved input validation.

7.8
2024-03-08 CVE-2024-23265 Apple Out-of-bounds Write vulnerability in Apple products

A memory corruption vulnerability was addressed with improved locking.

7.8
2024-03-08 CVE-2024-23268 Apple Injection vulnerability in Apple Macos

An injection issue was addressed with improved input validation.

7.8
2024-03-08 CVE-2024-23270 Apple Unspecified vulnerability in Apple products

The issue was addressed with improved memory handling.

7.8
2024-03-08 CVE-2024-23274 Apple Injection vulnerability in Apple Macos

An injection issue was addressed with improved input validation.

7.8
2024-03-08 CVE-2024-23276 Apple Unspecified vulnerability in Apple Macos

A logic issue was addressed with improved checks.

7.8
2024-03-08 CVE-2024-23286 Apple Classic Buffer Overflow vulnerability in Apple products

A buffer overflow issue was addressed with improved memory handling.

7.8
2024-03-08 CVE-2024-23288 Apple Unspecified vulnerability in Apple products

This issue was addressed by removing the vulnerable code.

7.8
2024-03-08 CVE-2024-23294 Apple Unspecified vulnerability in Apple Macos

This issue was addressed by removing the vulnerable code.

7.8
2024-03-07 CVE-2024-28115 Amazon Unspecified vulnerability in Amazon Freertos

FreeRTOS is a real-time operating system for microcontrollers.

7.8
2024-03-07 CVE-2024-0817 Paddlepaddle Unspecified vulnerability in Paddlepaddle 2.6.0

Command injection in IrGraph.draw in paddlepaddle/paddle 2.6.0

7.8
2024-03-06 CVE-2023-52594 Linux Improper Validation of Array Index vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() Fix an array-index-out-of-bounds read in ath9k_htc_txstatus().

7.8
2024-03-06 CVE-2023-52599 Linux Improper Validation of Array Index vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: jfs: fix array-index-out-of-bounds in diNewExt [Syz report] UBSAN: array-index-out-of-bounds in fs/jfs/jfs_imap.c:2360:2 index -878706688 is out of range for type 'struct iagctl[128]' CPU: 1 PID: 5065 Comm: syz-executor282 Not tainted 6.7.0-rc4-syzkaller-00009-gbee0e7762ad2 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e7/0x2d0 lib/dump_stack.c:106 ubsan_epilogue lib/ubsan.c:217 [inline] __ubsan_handle_out_of_bounds+0x11c/0x150 lib/ubsan.c:348 diNewExt+0x3cf3/0x4000 fs/jfs/jfs_imap.c:2360 diAllocExt fs/jfs/jfs_imap.c:1949 [inline] diAllocAG+0xbe8/0x1e50 fs/jfs/jfs_imap.c:1666 diAlloc+0x1d3/0x1760 fs/jfs/jfs_imap.c:1587 ialloc+0x8f/0x900 fs/jfs/jfs_inode.c:56 jfs_mkdir+0x1c5/0xb90 fs/jfs/namei.c:225 vfs_mkdir+0x2f1/0x4b0 fs/namei.c:4106 do_mkdirat+0x264/0x3a0 fs/namei.c:4129 __do_sys_mkdir fs/namei.c:4149 [inline] __se_sys_mkdir fs/namei.c:4147 [inline] __x64_sys_mkdir+0x6e/0x80 fs/namei.c:4147 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x45/0x110 arch/x86/entry/common.c:82 entry_SYSCALL_64_after_hwframe+0x63/0x6b RIP: 0033:0x7fcb7e6a0b57 Code: ff ff 77 07 31 c0 c3 0f 1f 40 00 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffd83023038 EFLAGS: 00000286 ORIG_RAX: 0000000000000053 RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007fcb7e6a0b57 RDX: 00000000000a1020 RSI: 00000000000001ff RDI: 0000000020000140 RBP: 0000000020000140 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000286 R12: 00007ffd830230d0 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [Analysis] When the agstart is too large, it can cause agno overflow. [Fix] After obtaining agno, if the value is invalid, exit the subsequent process. Modified the test from agno > MAXAG to agno >= MAXAG based on linux-next report by kernel test robot (Dan Carpenter).

7.8
2024-03-06 CVE-2023-52600 Linux Use After Free vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: jfs: fix uaf in jfs_evict_inode When the execution of diMount(ipimap) fails, the object ipimap that has been released may be accessed in diFreeSpecial().

7.8
2024-03-06 CVE-2023-52603 Linux Improper Validation of Array Index vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: UBSAN: array-index-out-of-bounds in dtSplitRoot Syzkaller reported the following issue: oop0: detected capacity change from 0 to 32768 UBSAN: array-index-out-of-bounds in fs/jfs/jfs_dtree.c:1971:9 index -2 is out of range for type 'struct dtslot [128]' CPU: 0 PID: 3613 Comm: syz-executor270 Not tainted 6.0.0-syzkaller-09423-g493ffd6605b2 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1b1/0x28e lib/dump_stack.c:106 ubsan_epilogue lib/ubsan.c:151 [inline] __ubsan_handle_out_of_bounds+0xdb/0x130 lib/ubsan.c:283 dtSplitRoot+0x8d8/0x1900 fs/jfs/jfs_dtree.c:1971 dtSplitUp fs/jfs/jfs_dtree.c:985 [inline] dtInsert+0x1189/0x6b80 fs/jfs/jfs_dtree.c:863 jfs_mkdir+0x757/0xb00 fs/jfs/namei.c:270 vfs_mkdir+0x3b3/0x590 fs/namei.c:4013 do_mkdirat+0x279/0x550 fs/namei.c:4038 __do_sys_mkdirat fs/namei.c:4053 [inline] __se_sys_mkdirat fs/namei.c:4051 [inline] __x64_sys_mkdirat+0x85/0x90 fs/namei.c:4051 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7fcdc0113fd9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffeb8bc67d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fcdc0113fd9 RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000000000003 RBP: 00007fcdc00d37a0 R08: 0000000000000000 R09: 00007fcdc00d37a0 R10: 00005555559a72c0 R11: 0000000000000246 R12: 00000000f8008000 R13: 0000000000000000 R14: 00083878000000f8 R15: 0000000000000000 </TASK> The issue is caused when the value of fsi becomes less than -1. The check to break the loop when fsi value becomes -1 is present but syzbot was able to produce value less than -1 which cause the error. This patch simply add the change for the values less than 0. The patch is tested via syzbot.

7.8
2024-03-06 CVE-2023-52604 Linux Improper Validation of Array Index vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree Syzkaller reported the following issue: UBSAN: array-index-out-of-bounds in fs/jfs/jfs_dmap.c:2867:6 index 196694 is out of range for type 's8[1365]' (aka 'signed char[1365]') CPU: 1 PID: 109 Comm: jfsCommit Not tainted 6.6.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e7/0x2d0 lib/dump_stack.c:106 ubsan_epilogue lib/ubsan.c:217 [inline] __ubsan_handle_out_of_bounds+0x11c/0x150 lib/ubsan.c:348 dbAdjTree+0x474/0x4f0 fs/jfs/jfs_dmap.c:2867 dbJoin+0x210/0x2d0 fs/jfs/jfs_dmap.c:2834 dbFreeBits+0x4eb/0xda0 fs/jfs/jfs_dmap.c:2331 dbFreeDmap fs/jfs/jfs_dmap.c:2080 [inline] dbFree+0x343/0x650 fs/jfs/jfs_dmap.c:402 txFreeMap+0x798/0xd50 fs/jfs/jfs_txnmgr.c:2534 txUpdateMap+0x342/0x9e0 txLazyCommit fs/jfs/jfs_txnmgr.c:2664 [inline] jfs_lazycommit+0x47a/0xb70 fs/jfs/jfs_txnmgr.c:2732 kthread+0x2d3/0x370 kernel/kthread.c:388 ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304 </TASK> ================================================================================ Kernel panic - not syncing: UBSAN: panic_on_warn set ... CPU: 1 PID: 109 Comm: jfsCommit Not tainted 6.6.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e7/0x2d0 lib/dump_stack.c:106 panic+0x30f/0x770 kernel/panic.c:340 check_panic_on_warn+0x82/0xa0 kernel/panic.c:236 ubsan_epilogue lib/ubsan.c:223 [inline] __ubsan_handle_out_of_bounds+0x13c/0x150 lib/ubsan.c:348 dbAdjTree+0x474/0x4f0 fs/jfs/jfs_dmap.c:2867 dbJoin+0x210/0x2d0 fs/jfs/jfs_dmap.c:2834 dbFreeBits+0x4eb/0xda0 fs/jfs/jfs_dmap.c:2331 dbFreeDmap fs/jfs/jfs_dmap.c:2080 [inline] dbFree+0x343/0x650 fs/jfs/jfs_dmap.c:402 txFreeMap+0x798/0xd50 fs/jfs/jfs_txnmgr.c:2534 txUpdateMap+0x342/0x9e0 txLazyCommit fs/jfs/jfs_txnmgr.c:2664 [inline] jfs_lazycommit+0x47a/0xb70 fs/jfs/jfs_txnmgr.c:2732 kthread+0x2d3/0x370 kernel/kthread.c:388 ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304 </TASK> Kernel Offset: disabled Rebooting in 86400 seconds.. The issue is caused when the value of lp becomes greater than CTLTREESIZE which is the max size of stree.

7.8
2024-03-06 CVE-2024-26625 Linux
Debian
Use After Free vulnerability in multiple products

In the Linux kernel, the following vulnerability has been resolved: llc: call sock_orphan() at release time syzbot reported an interesting trace [1] caused by a stale sk->sk_wq pointer in a closed llc socket. In commit ff7b11aa481f ("net: socket: set sock->sk to NULL after calling proto_ops::release()") Eric Biggers hinted that some protocols are missing a sock_orphan(), we need to perform a full audit. In net-next, I plan to clear sock->sk from sock_orphan() and amend Eric patch to add a warning. [1] BUG: KASAN: slab-use-after-free in list_empty include/linux/list.h:373 [inline] BUG: KASAN: slab-use-after-free in waitqueue_active include/linux/wait.h:127 [inline] BUG: KASAN: slab-use-after-free in sock_def_write_space_wfree net/core/sock.c:3384 [inline] BUG: KASAN: slab-use-after-free in sock_wfree+0x9a8/0x9d0 net/core/sock.c:2468 Read of size 8 at addr ffff88802f4fc880 by task ksoftirqd/1/27 CPU: 1 PID: 27 Comm: ksoftirqd/1 Not tainted 6.8.0-rc1-syzkaller-00049-g6098d87eaf31 #0 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xd9/0x1b0 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:377 [inline] print_report+0xc4/0x620 mm/kasan/report.c:488 kasan_report+0xda/0x110 mm/kasan/report.c:601 list_empty include/linux/list.h:373 [inline] waitqueue_active include/linux/wait.h:127 [inline] sock_def_write_space_wfree net/core/sock.c:3384 [inline] sock_wfree+0x9a8/0x9d0 net/core/sock.c:2468 skb_release_head_state+0xa3/0x2b0 net/core/skbuff.c:1080 skb_release_all net/core/skbuff.c:1092 [inline] napi_consume_skb+0x119/0x2b0 net/core/skbuff.c:1404 e1000_unmap_and_free_tx_resource+0x144/0x200 drivers/net/ethernet/intel/e1000/e1000_main.c:1970 e1000_clean_tx_irq drivers/net/ethernet/intel/e1000/e1000_main.c:3860 [inline] e1000_clean+0x4a1/0x26e0 drivers/net/ethernet/intel/e1000/e1000_main.c:3801 __napi_poll.constprop.0+0xb4/0x540 net/core/dev.c:6576 napi_poll net/core/dev.c:6645 [inline] net_rx_action+0x956/0xe90 net/core/dev.c:6778 __do_softirq+0x21a/0x8de kernel/softirq.c:553 run_ksoftirqd kernel/softirq.c:921 [inline] run_ksoftirqd+0x31/0x60 kernel/softirq.c:913 smpboot_thread_fn+0x660/0xa10 kernel/smpboot.c:164 kthread+0x2c6/0x3a0 kernel/kthread.c:388 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:242 </TASK> Allocated by task 5167: kasan_save_stack+0x33/0x50 mm/kasan/common.c:47 kasan_save_track+0x14/0x30 mm/kasan/common.c:68 unpoison_slab_object mm/kasan/common.c:314 [inline] __kasan_slab_alloc+0x81/0x90 mm/kasan/common.c:340 kasan_slab_alloc include/linux/kasan.h:201 [inline] slab_post_alloc_hook mm/slub.c:3813 [inline] slab_alloc_node mm/slub.c:3860 [inline] kmem_cache_alloc_lru+0x142/0x6f0 mm/slub.c:3879 alloc_inode_sb include/linux/fs.h:3019 [inline] sock_alloc_inode+0x25/0x1c0 net/socket.c:308 alloc_inode+0x5d/0x220 fs/inode.c:260 new_inode_pseudo+0x16/0x80 fs/inode.c:1005 sock_alloc+0x40/0x270 net/socket.c:634 __sock_create+0xbc/0x800 net/socket.c:1535 sock_create net/socket.c:1622 [inline] __sys_socket_create net/socket.c:1659 [inline] __sys_socket+0x14c/0x260 net/socket.c:1706 __do_sys_socket net/socket.c:1720 [inline] __se_sys_socket net/socket.c:1718 [inline] __x64_sys_socket+0x72/0xb0 net/socket.c:1718 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xd3/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x63/0x6b Freed by task 0: kasan_save_stack+0x33/0x50 mm/kasan/common.c:47 kasan_save_track+0x14/0x30 mm/kasan/common.c:68 kasan_save_free_info+0x3f/0x60 mm/kasan/generic.c:640 poison_slab_object mm/kasan/common.c:241 [inline] __kasan_slab_free+0x121/0x1b0 mm/kasan/common.c:257 kasan_slab_free include/linux/kasan.h:184 [inline] slab_free_hook mm/slub.c:2121 [inlin ---truncated---

7.8
2024-03-06 CVE-2024-25817 EZA Rock Classic Buffer Overflow vulnerability in Eza.Rock EZA

Buffer Overflow vulnerability in eza before version 0.18.2, allows local attackers to execute arbitrary code via the .git/HEAD, .git/refs, and .git/objects components.

7.8
2024-03-05 CVE-2024-23225 Apple Out-of-bounds Write vulnerability in Apple products

A memory corruption issue was addressed with improved validation.

7.8
2024-03-05 CVE-2024-23296 Apple Out-of-bounds Write vulnerability in Apple products

A memory corruption issue was addressed with improved validation.

7.8
2024-03-05 CVE-2024-24098 Fabianros SQL Injection vulnerability in Fabianros Scholars Tracking System 1.0

Code-projects Scholars Tracking System 1.0 is vulnerable to SQL Injection via the News Feed.

7.8
2024-03-05 CVE-2024-20838 Samsung Unspecified vulnerability in Samsung Internet

Improper validation vulnerability in Samsung Internet prior to version 24.0.3.2 allows local attackers to execute arbitrary code.

7.8
2024-03-04 CVE-2021-47106 Linux Use After Free vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fix use-after-free in nft_set_catchall_destroy() We need to use list_for_each_entry_safe() iterator because we can not access @catchall after kfree_rcu() call. syzbot reported: BUG: KASAN: use-after-free in nft_set_catchall_destroy net/netfilter/nf_tables_api.c:4486 [inline] BUG: KASAN: use-after-free in nft_set_destroy net/netfilter/nf_tables_api.c:4504 [inline] BUG: KASAN: use-after-free in nft_set_destroy+0x3fd/0x4f0 net/netfilter/nf_tables_api.c:4493 Read of size 8 at addr ffff8880716e5b80 by task syz-executor.3/8871 CPU: 1 PID: 8871 Comm: syz-executor.3 Not tainted 5.16.0-rc5-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_address_description.constprop.0.cold+0x8d/0x2ed mm/kasan/report.c:247 __kasan_report mm/kasan/report.c:433 [inline] kasan_report.cold+0x83/0xdf mm/kasan/report.c:450 nft_set_catchall_destroy net/netfilter/nf_tables_api.c:4486 [inline] nft_set_destroy net/netfilter/nf_tables_api.c:4504 [inline] nft_set_destroy+0x3fd/0x4f0 net/netfilter/nf_tables_api.c:4493 __nft_release_table+0x79f/0xcd0 net/netfilter/nf_tables_api.c:9626 nft_rcv_nl_event+0x4f8/0x670 net/netfilter/nf_tables_api.c:9688 notifier_call_chain+0xb5/0x200 kernel/notifier.c:83 blocking_notifier_call_chain kernel/notifier.c:318 [inline] blocking_notifier_call_chain+0x67/0x90 kernel/notifier.c:306 netlink_release+0xcb6/0x1dd0 net/netlink/af_netlink.c:788 __sock_release+0xcd/0x280 net/socket.c:649 sock_close+0x18/0x20 net/socket.c:1314 __fput+0x286/0x9f0 fs/file_table.c:280 task_work_run+0xdd/0x1a0 kernel/task_work.c:164 tracehook_notify_resume include/linux/tracehook.h:189 [inline] exit_to_user_mode_loop kernel/entry/common.c:175 [inline] exit_to_user_mode_prepare+0x27e/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f75fbf28adb Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44 RSP: 002b:00007ffd8da7ec10 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00007f75fbf28adb RDX: 00007f75fc08e828 RSI: ffffffffffffffff RDI: 0000000000000003 RBP: 00007f75fc08a960 R08: 0000000000000000 R09: 00007f75fc08e830 R10: 00007ffd8da7ed10 R11: 0000000000000293 R12: 00000000002067c3 R13: 00007ffd8da7ed10 R14: 00007f75fc088f60 R15: 0000000000000032 </TASK> Allocated by task 8886: kasan_save_stack+0x1e/0x50 mm/kasan/common.c:38 kasan_set_track mm/kasan/common.c:46 [inline] set_alloc_info mm/kasan/common.c:434 [inline] ____kasan_kmalloc mm/kasan/common.c:513 [inline] ____kasan_kmalloc mm/kasan/common.c:472 [inline] __kasan_kmalloc+0xa6/0xd0 mm/kasan/common.c:522 kasan_kmalloc include/linux/kasan.h:269 [inline] kmem_cache_alloc_trace+0x1ea/0x4a0 mm/slab.c:3575 kmalloc include/linux/slab.h:590 [inline] nft_setelem_catchall_insert net/netfilter/nf_tables_api.c:5544 [inline] nft_setelem_insert net/netfilter/nf_tables_api.c:5562 [inline] nft_add_set_elem+0x232e/0x2f40 net/netfilter/nf_tables_api.c:5936 nf_tables_newsetelem+0x6ff/0xbb0 net/netfilter/nf_tables_api.c:6032 nfnetlink_rcv_batch+0x1710/0x25f0 net/netfilter/nfnetlink.c:513 nfnetlink_rcv_skb_batch net/netfilter/nfnetlink.c:634 [inline] nfnetlink_rcv+0x3af/0x420 net/netfilter/nfnetlink.c:652 netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline] netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1345 netlink_sendmsg+0x904/0xdf0 net/netlink/af_netlink.c:1921 sock_sendmsg_nosec net/ ---truncated---

7.8
2024-03-04 CVE-2021-47082 Linux Double Free vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: tun: avoid double free in tun_free_netdev Avoid double free in tun_free_netdev() by moving the dev->tstats and tun->security allocs to a new ndo_init routine (tun_net_init()) that will be called by register_netdevice(). ndo_init is paired with the desctructor (tun_free_netdev()), so if there's an error in register_netdevice() the destructor will handle the frees. BUG: KASAN: double-free or invalid-free in selinux_tun_dev_free_security+0x1a/0x20 security/selinux/hooks.c:5605 CPU: 0 PID: 25750 Comm: syz-executor416 Not tainted 5.16.0-rc2-syzk #1 Hardware name: Red Hat KVM, BIOS Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x89/0xb5 lib/dump_stack.c:106 print_address_description.constprop.9+0x28/0x160 mm/kasan/report.c:247 kasan_report_invalid_free+0x55/0x80 mm/kasan/report.c:372 ____kasan_slab_free mm/kasan/common.c:346 [inline] __kasan_slab_free+0x107/0x120 mm/kasan/common.c:374 kasan_slab_free include/linux/kasan.h:235 [inline] slab_free_hook mm/slub.c:1723 [inline] slab_free_freelist_hook mm/slub.c:1749 [inline] slab_free mm/slub.c:3513 [inline] kfree+0xac/0x2d0 mm/slub.c:4561 selinux_tun_dev_free_security+0x1a/0x20 security/selinux/hooks.c:5605 security_tun_dev_free_security+0x4f/0x90 security/security.c:2342 tun_free_netdev+0xe6/0x150 drivers/net/tun.c:2215 netdev_run_todo+0x4df/0x840 net/core/dev.c:10627 rtnl_unlock+0x13/0x20 net/core/rtnetlink.c:112 __tun_chr_ioctl+0x80c/0x2870 drivers/net/tun.c:3302 tun_chr_ioctl+0x2f/0x40 drivers/net/tun.c:3311 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:874 [inline] __se_sys_ioctl fs/ioctl.c:860 [inline] __x64_sys_ioctl+0x19d/0x220 fs/ioctl.c:860 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x3a/0x80 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae

7.8
2024-03-04 CVE-2021-47087 Linux Release of Invalid Pointer or Reference vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: tee: optee: Fix incorrect page free bug Pointer to the allocated pages (struct page *page) has already progressed towards the end of allocation.

7.8
2024-03-04 CVE-2021-47098 Linux Integer Overflow or Wraparound vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: hwmon: (lm90) Prevent integer overflow/underflow in hysteresis calculations Commit b50aa49638c7 ("hwmon: (lm90) Prevent integer underflows of temperature calculations") addressed a number of underflow situations when writing temperature limits.

7.8
2024-03-04 CVE-2024-0155 Dell Unspecified vulnerability in Dell Digital Delivery

Dell Digital Delivery, versions prior to 5.2.0.0, contain a Use After Free Vulnerability.

7.8
2024-03-04 CVE-2024-0156 Dell Classic Buffer Overflow vulnerability in Dell Digital Delivery

Dell Digital Delivery, versions prior to 5.2.0.0, contain a Buffer Overflow Vulnerability.

7.8
2024-03-04 CVE-2024-22452 Dell Unspecified vulnerability in Dell Display and Peripheral Manager

Dell Display and Peripheral Manager for macOS prior to 1.3 contains an improper access control vulnerability.

7.8
2024-03-04 CVE-2023-28578 Qualcomm Out-of-bounds Write vulnerability in Qualcomm products

Memory corruption in Core Services while executing the command for removing a single event listener.

7.8
2024-03-04 CVE-2023-33066 Qualcomm Out-of-bounds Write vulnerability in Qualcomm products

Memory corruption in Audio while processing RT proxy port register driver.

7.8
2024-03-04 CVE-2023-43540 Qualcomm Out-of-bounds Write vulnerability in Qualcomm products

Memory corruption while processing the IOCTL FM HCI WRITE request.

7.8
2024-03-04 CVE-2023-43541 Qualcomm NULL Pointer Dereference vulnerability in Qualcomm products

Memory corruption while invoking the SubmitCommands call on Gfx engine during the graphics render.

7.8
2024-03-04 CVE-2023-43546 Qualcomm Use After Free vulnerability in Qualcomm products

Memory corruption while invoking HGSL IOCTL context create.

7.8
2024-03-04 CVE-2023-43547 Qualcomm Use After Free vulnerability in Qualcomm products

Memory corruption while invoking IOCTLs calls in Automotive Multimedia.

7.8
2024-03-04 CVE-2023-43549 Qualcomm Out-of-bounds Write vulnerability in Qualcomm products

Memory corruption while processing TPC target power table in FTM TPC.

7.8
2024-03-04 CVE-2023-46708 Openatom Use After Free vulnerability in Openatom Openharmony

in OpenHarmony v3.2.4 and prior versions allow a local attacker arbitrary code execution in any apps through use after free.

7.8
2024-03-04 CVE-2024-26622 Linux Use After Free vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: tomoyo: fix UAF write bug in tomoyo_write_control() Since tomoyo_write_control() updates head->write_buf when write() of long lines is requested, we need to fetch head->write_buf after head->io_sem is held.

7.8
2024-03-07 CVE-2024-1169 Themekraft Unspecified vulnerability in Themekraft Post Form

The Post Form – Registration Form – Profile Form for User Profiles – Frontend Content Forms for User Submissions (UGC) plugin for WordPress is vulnerable to unauthorized media upload due to a missing capability check on the buddyforms_upload_handle_dropped_media function in all versions up to, and including, 2.8.7.

7.5
2024-03-07 CVE-2024-1931 Nlnetlabs
Fedoraproject
Infinite Loop vulnerability in multiple products

NLnet Labs Unbound version 1.18.0 up to and including version 1.19.1 contain a vulnerability that can cause denial of service by a certain code path that can lead to an infinite loop.

7.5
2024-03-06 CVE-2024-24761 Galette Incorrect Authorization vulnerability in Galette 1.0.0/1.0.1

Galette is a membership management web application for non profit organizations.

7.5
2024-03-06 CVE-2023-33677 Oretnom23 SQL Injection vulnerability in Oretnom23 Lost and Found Information System 1.0

Sourcecodester Lost and Found Information System's Version 1.0 is vulnerable to unauthenticated SQL Injection at "?page=items/view&id=*".

7.5
2024-03-06 CVE-2024-22889 Plone Incorrect Default Permissions vulnerability in Plone 6.0.9

Due to incorrect access control in Plone version v6.0.9, remote attackers can view and list all files hosted on the website via sending a crafted request.

7.5
2024-03-05 CVE-2024-27765 Jeewms Path Traversal vulnerability in Jeewms

Directory Traversal vulnerability in Jeewms v.3.7 and before allows a remote attacker to obtain sensitive information via the cgformTemplateController component.

7.5
2024-03-04 CVE-2023-32331 IBM Classic Buffer Overflow vulnerability in IBM Sterling Connect:Express for Unix 1.5.0

IBM Connect:Express for UNIX 1.5.0 is vulnerable to a buffer overflow that could allow a remote attacker to cause a denial of service through its browser UI.

7.5
2024-03-04 CVE-2024-27199 Jetbrains Path Traversal vulnerability in Jetbrains Teamcity

In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions was possible

7.3
2024-03-08 CVE-2024-23216 Apple Path Traversal vulnerability in Apple Macos

A path handling issue was addressed with improved validation.

7.1
2024-03-08 CVE-2024-23248 Apple Unspecified vulnerability in Apple Macos

The issue was addressed with improved memory handling.

7.1
2024-03-08 CVE-2024-23249 Apple Unspecified vulnerability in Apple Macos

The issue was addressed with improved memory handling.

7.1
2024-03-05 CVE-2024-27929 Sixlabors Use After Free vulnerability in Sixlabors Imagesharp

ImageSharp is a managed, cross-platform, 2D graphics library.

7.1
2024-03-04 CVE-2021-47083 Linux Out-of-bounds Read vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: pinctrl: mediatek: fix global-out-of-bounds issue When eint virtual eint number is greater than gpio number, it maybe produce 'desc[eint_n]' size globle-out-of-bounds issue.

7.1
2024-03-04 CVE-2021-47101 Linux Use of Uninitialized Resource vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: asix: fix uninit-value in asix_mdio_read() asix_read_cmd() may read less than sizeof(smsr) bytes and in this case smsr will be uninitialized. Fail log: BUG: KMSAN: uninit-value in asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline] BUG: KMSAN: uninit-value in asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline] drivers/net/usb/asix_common.c:497 BUG: KMSAN: uninit-value in asix_mdio_read+0x3c1/0xb00 drivers/net/usb/asix_common.c:497 drivers/net/usb/asix_common.c:497 asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline] asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline] drivers/net/usb/asix_common.c:497 asix_mdio_read+0x3c1/0xb00 drivers/net/usb/asix_common.c:497 drivers/net/usb/asix_common.c:497

7.1
2024-03-04 CVE-2021-47088 Linux Use After Free vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: mm/damon/dbgfs: protect targets destructions with kdamond_lock DAMON debugfs interface iterates current monitoring targets in 'dbgfs_target_ids_read()' while holding the corresponding 'kdamond_lock'.

7.0

95 Medium Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2024-03-08 CVE-2024-23234 Apple Out-of-bounds Write vulnerability in Apple Macos

An out-of-bounds write issue was addressed with improved input validation.

6.7
2024-03-04 CVE-2024-20022 Linuxfoundation
Rdkcentral
Google
Openwrt
In lk, there is a possible escalation of privilege due to a missing bounds check.
6.7
2024-03-08 CVE-2024-21900 Qnap Unspecified vulnerability in Qnap QTS and Quts Hero

An injection vulnerability has been reported to affect several QNAP operating system versions.

6.5
2024-03-08 CVE-2024-1851 Servit Missing Authorization vulnerability in Servit Affiliate-Toolkit

The affiliate-toolkit – WordPress Affiliate Plugin plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the atkp_create_list() function in all versions up to, and including, 3.5.4.

6.5
2024-03-08 CVE-2024-23254 Apple
Fedoraproject
Wpewebkit
Webkitgtk
The issue was addressed with improved UI handling.
6.5
2024-03-08 CVE-2024-23259 Apple Unspecified vulnerability in Apple Iphone OS

The issue was addressed with improved checks.

6.5
2024-03-08 CVE-2024-23263 Apple
Wpewebkit
Webkitgtk
Fedoraproject
A logic issue was addressed with improved validation.
6.5
2024-03-08 CVE-2024-23280 Apple
Fedoraproject
Wpewebkit
Webkitgtk
Injection vulnerability in multiple products

An injection issue was addressed with improved validation.

6.5
2024-03-08 CVE-2024-23284 Apple
Fedoraproject
Wpewebkit
Webkitgtk
A logic issue was addressed with improved state management.
6.5
2024-03-07 CVE-2024-28229 Jetbrains Incorrect Authorization vulnerability in Jetbrains Youtrack

In JetBrains YouTrack before 2024.1.25893 user without appropriate permissions could restore issues and articles

6.5
2024-03-07 CVE-2024-28230 Jetbrains Missing Authorization vulnerability in Jetbrains Youtrack

In JetBrains YouTrack before 2024.1.25893 attaching/detaching workflow to a project was possible without project admin permissions

6.5
2024-03-06 CVE-2024-28154 Jenkins Unspecified vulnerability in Jenkins MQ Notifier

Jenkins MQ Notifier Plugin 1.4.0 and earlier logs potentially sensitive build parameters as part of debug information in build logs by default.

6.5
2024-03-05 CVE-2022-22399 IBM Improper Encoding or Escaping of Output vulnerability in IBM Aspera Faspex 5.0.0/5.0.1

IBM Aspera Faspex 5.0.0 and 5.0.1 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers.

6.5
2024-03-05 CVE-2024-27564 Dirk1983 Server-Side Request Forgery (SSRF) vulnerability in Dirk1983 Chatgpt 20230523

A Server-Side Request Forgery (SSRF) in pictureproxy.php of ChatGPT commit f9f4bbc allows attackers to force the application to make arbitrary requests via injection of crafted URLs into the urlparameter.

6.5
2024-03-05 CVE-2024-27931 Deno Unspecified vulnerability in Deno

Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults.

6.5
2024-03-09 CVE-2024-1320 Metagauss Cross-site Scripting vulnerability in Metagauss Eventprime

The EventPrime – Events Calendar, Bookings and Tickets plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'offline_status' parameter in all versions up to, and including, 3.4.3 due to insufficient input sanitization and output escaping.

6.1
2024-03-07 CVE-2024-1720 Wpuserregistration Cross-site Scripting vulnerability in Wpuserregistration User Registration & Membership

The User Registration – Custom Registration Form, Login Form, and User Profile WordPress Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Display Name' parameter in all versions up to, and including, 3.1.4 due to insufficient input sanitization and output escaping.

6.1
2024-03-06 CVE-2023-49971 Oretnom23 Cross-site Scripting vulnerability in Oretnom23 Customer Support System 1.0

A cross-site scripting (XSS) vulnerability in Customer Support System v1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the firstname parameter at /customer_support/index.php?page=customer_list.

6.1
2024-03-06 CVE-2023-49973 Oretnom23 Cross-site Scripting vulnerability in Oretnom23 Customer Support System 1.0

A cross-site scripting (XSS) vulnerability in Customer Support System v1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the email parameter at /customer_support/index.php?page=customer_list.

6.1
2024-03-05 CVE-2022-46088 Oretnom23 Cross-site Scripting vulnerability in Oretnom23 Online Flight Booking Management System 1.0

Online Flight Booking Management System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the feedback form.

6.1
2024-03-04 CVE-2023-38360 IBM Unspecified vulnerability in IBM Cics TX 10.1

IBM CICS TX Advanced 10.1 is vulnerable to cross-site scripting.

6.1
2024-03-08 CVE-2024-23277 Apple Unspecified vulnerability in Apple Ipad OS, Iphone OS and Macos

The issue was addressed with improved checks.

5.9
2024-03-06 CVE-2024-28174 Jetbrains Incorrect Authorization vulnerability in Jetbrains Teamcity

In JetBrains TeamCity before 2023.11.4 presigned URL generation requests in S3 Artifact Storage plugin were authorized improperly

5.8
2024-03-08 CVE-2022-43855 IBM Unspecified vulnerability in IBM Spss Statistics 26.0.0.0/27.0.1.0/28.0.0.0

IBM SPSS Statistics 26.0, 27.0.1, and 28.0 could allow a local user to create multiple files that could exhaust the file handles capacity and cause a denial of service.

5.5
2024-03-08 CVE-2023-28826 Apple Unspecified vulnerability in Apple Iphone OS and Macos

This issue was addressed with improved redaction of sensitive information.

5.5
2024-03-08 CVE-2024-23201 Apple Incorrect Default Permissions vulnerability in Apple products

A permissions issue was addressed with additional restrictions.

5.5
2024-03-08 CVE-2024-23205 Apple Unspecified vulnerability in Apple Ipad OS and Iphone OS

A privacy issue was addressed with improved private data redaction for log entries.

5.5
2024-03-08 CVE-2024-23220 Apple Unspecified vulnerability in Apple Ipad OS and Iphone OS

The issue was addressed with improved handling of caches.

5.5
2024-03-08 CVE-2024-23230 Apple Unspecified vulnerability in Apple Macos

This issue was addressed with improved file handling.

5.5
2024-03-08 CVE-2024-23231 Apple Unspecified vulnerability in Apple products

A privacy issue was addressed with improved private data redaction for log entries.

5.5
2024-03-08 CVE-2024-23241 Apple Unspecified vulnerability in Apple products

This issue was addressed through improved state management.

5.5
2024-03-08 CVE-2024-23250 Apple Unspecified vulnerability in Apple products

An access issue was addressed with improved access restrictions.

5.5
2024-03-08 CVE-2024-23260 Apple Unspecified vulnerability in Apple Macos

This issue was addressed by removing additional entitlements.

5.5
2024-03-08 CVE-2024-23264 Apple Unspecified vulnerability in Apple products

A validation issue was addressed with improved input sanitization.

5.5
2024-03-08 CVE-2024-23266 Apple Unspecified vulnerability in Apple Macos

The issue was addressed with improved checks.

5.5
2024-03-08 CVE-2024-23267 Apple Unspecified vulnerability in Apple Macos

The issue was addressed with improved checks.

5.5
2024-03-08 CVE-2024-23269 Apple Unspecified vulnerability in Apple Macos

A downgrade issue affecting Intel-based Mac computers was addressed with additional code-signing restrictions.

5.5
2024-03-08 CVE-2024-23272 Apple Unspecified vulnerability in Apple Macos

A logic issue was addressed with improved checks.

5.5
2024-03-08 CVE-2024-23279 Apple Unspecified vulnerability in Apple Macos

A privacy issue was addressed with improved private data redaction for log entries.

5.5
2024-03-08 CVE-2024-23281 Apple Unspecified vulnerability in Apple Macos

This issue was addressed with improved state management.

5.5
2024-03-08 CVE-2024-23283 Apple Unspecified vulnerability in Apple Iphone OS

A privacy issue was addressed with improved private data redaction for log entries.

5.5
2024-03-08 CVE-2024-23285 Apple Link Following vulnerability in Apple Macos

This issue was addressed with improved handling of symlinks.

5.5
2024-03-08 CVE-2024-23287 Apple Unspecified vulnerability in Apple products

A privacy issue was addressed with improved handling of temporary files.

5.5
2024-03-08 CVE-2024-23290 Apple Unspecified vulnerability in Apple products

A logic issue was addressed with improved restrictions.

5.5
2024-03-08 CVE-2024-23295 Apple Incorrect Default Permissions vulnerability in Apple Visionos 1.0.2

A permissions issue was addressed to help ensure Personas are always protected This issue is fixed in visionOS 1.1.

5.5
2024-03-08 CVE-2024-23297 Apple Unspecified vulnerability in Apple products

The issue was addressed with improved checks.

5.5
2024-03-06 CVE-2023-52583 Linux
Debian
Improper Locking vulnerability in multiple products

In the Linux kernel, the following vulnerability has been resolved: ceph: fix deadlock or deadcode of misusing dget() The lock order is incorrect between denty and its parent, we should always make sure that the parent get the lock first. But since this deadcode is never used and the parent dir will always be set from the callers, let's just remove it.

5.5
2024-03-06 CVE-2023-52593 Linux NULL Pointer Dereference vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() Since 'ieee80211_beacon_get()' can return NULL, 'wfx_set_mfp_ap()' should check the return value before examining skb data.

5.5
2024-03-06 CVE-2023-52595 Linux Improper Locking vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: wifi: rt2x00: restart beacon queue when hardware reset When a hardware reset is triggered, all registers are reset, so all queues are forced to stop in hardware interface.

5.5
2024-03-06 CVE-2024-26626 Linux NULL Pointer Dereference vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: ipmr: fix kernel panic when forwarding mcast packets The stacktrace was: [ 86.305548] BUG: kernel NULL pointer dereference, address: 0000000000000092 [ 86.306815] #PF: supervisor read access in kernel mode [ 86.307717] #PF: error_code(0x0000) - not-present page [ 86.308624] PGD 0 P4D 0 [ 86.309091] Oops: 0000 [#1] PREEMPT SMP NOPTI [ 86.309883] CPU: 2 PID: 3139 Comm: pimd Tainted: G U 6.8.0-6wind-knet #1 [ 86.311027] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.11.1-0-g0551a4be2c-prebuilt.qemu-project.org 04/01/2014 [ 86.312728] RIP: 0010:ip_mr_forward (/build/work/knet/net/ipv4/ipmr.c:1985) [ 86.313399] Code: f9 1f 0f 87 85 03 00 00 48 8d 04 5b 48 8d 04 83 49 8d 44 c5 00 48 8b 40 70 48 39 c2 0f 84 d9 00 00 00 49 8b 46 58 48 83 e0 fe <80> b8 92 00 00 00 00 0f 84 55 ff ff ff 49 83 47 38 01 45 85 e4 0f [ 86.316565] RSP: 0018:ffffad21c0583ae0 EFLAGS: 00010246 [ 86.317497] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 86.318596] RDX: ffff9559cb46c000 RSI: 0000000000000000 RDI: 0000000000000000 [ 86.319627] RBP: ffffad21c0583b30 R08: 0000000000000000 R09: 0000000000000000 [ 86.320650] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001 [ 86.321672] R13: ffff9559c093a000 R14: ffff9559cc00b800 R15: ffff9559c09c1d80 [ 86.322873] FS: 00007f85db661980(0000) GS:ffff955a79d00000(0000) knlGS:0000000000000000 [ 86.324291] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 86.325314] CR2: 0000000000000092 CR3: 000000002f13a000 CR4: 0000000000350ef0 [ 86.326589] Call Trace: [ 86.327036] <TASK> [ 86.327434] ? show_regs (/build/work/knet/arch/x86/kernel/dumpstack.c:479) [ 86.328049] ? __die (/build/work/knet/arch/x86/kernel/dumpstack.c:421 /build/work/knet/arch/x86/kernel/dumpstack.c:434) [ 86.328508] ? page_fault_oops (/build/work/knet/arch/x86/mm/fault.c:707) [ 86.329107] ? do_user_addr_fault (/build/work/knet/arch/x86/mm/fault.c:1264) [ 86.329756] ? srso_return_thunk (/build/work/knet/arch/x86/lib/retpoline.S:223) [ 86.330350] ? __irq_work_queue_local (/build/work/knet/kernel/irq_work.c:111 (discriminator 1)) [ 86.331013] ? exc_page_fault (/build/work/knet/./arch/x86/include/asm/paravirt.h:693 /build/work/knet/arch/x86/mm/fault.c:1515 /build/work/knet/arch/x86/mm/fault.c:1563) [ 86.331702] ? asm_exc_page_fault (/build/work/knet/./arch/x86/include/asm/idtentry.h:570) [ 86.332468] ? ip_mr_forward (/build/work/knet/net/ipv4/ipmr.c:1985) [ 86.333183] ? srso_return_thunk (/build/work/knet/arch/x86/lib/retpoline.S:223) [ 86.333920] ipmr_mfc_add (/build/work/knet/./include/linux/rcupdate.h:782 /build/work/knet/net/ipv4/ipmr.c:1009 /build/work/knet/net/ipv4/ipmr.c:1273) [ 86.334583] ? __pfx_ipmr_hash_cmp (/build/work/knet/net/ipv4/ipmr.c:363) [ 86.335357] ip_mroute_setsockopt (/build/work/knet/net/ipv4/ipmr.c:1470) [ 86.336135] ? srso_return_thunk (/build/work/knet/arch/x86/lib/retpoline.S:223) [ 86.336854] ? ip_mroute_setsockopt (/build/work/knet/net/ipv4/ipmr.c:1470) [ 86.337679] do_ip_setsockopt (/build/work/knet/net/ipv4/ip_sockglue.c:944) [ 86.338408] ? __pfx_unix_stream_read_actor (/build/work/knet/net/unix/af_unix.c:2862) [ 86.339232] ? srso_return_thunk (/build/work/knet/arch/x86/lib/retpoline.S:223) [ 86.339809] ? aa_sk_perm (/build/work/knet/security/apparmor/include/cred.h:153 /build/work/knet/security/apparmor/net.c:181) [ 86.340342] ip_setsockopt (/build/work/knet/net/ipv4/ip_sockglue.c:1415) [ 86.340859] raw_setsockopt (/build/work/knet/net/ipv4/raw.c:836) [ 86.341408] ? security_socket_setsockopt (/build/work/knet/security/security.c:4561 (discriminator 13)) [ 86.342116] sock_common_setsockopt (/build/work/knet/net/core/sock.c:3716) [ 86.342747] do_sock_setsockopt (/build/work/knet/net/socket.c:2313) [ 86.343363] __sys_setsockopt (/build/work/knet/./include/linux/file.h:32 /build/work/kn ---truncated---

5.5
2024-03-05 CVE-2022-48630 Linux Infinite Loop vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ The commit referenced in the Fixes tag removed the 'break' from the else branch in qcom_rng_read(), causing an infinite loop whenever 'max' is not a multiple of WORD_SZ.

5.5
2024-03-04 CVE-2021-47104 Linux Memory Leak vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: IB/qib: Fix memory leak in qib_user_sdma_queue_pkts() The wrong goto label was used for the error case and missed cleanup of the pkt allocation. Addresses-Coverity-ID: 1493352 ("Resource leak")

5.5
2024-03-04 CVE-2021-47108 Linux NULL Pointer Dereference vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: drm/mediatek: hdmi: Perform NULL pointer check for mtk_hdmi_conf In commit 41ca9caaae0b ("drm/mediatek: hdmi: Add check for CEA modes only") a check for CEA modes was added to function mtk_hdmi_bridge_mode_valid() in order to address possible issues on MT8167; moreover, with commit c91026a938c2 ("drm/mediatek: hdmi: Add optional limit on maximal HDMI mode clock") another similar check was introduced. Unfortunately though, at the time of writing, MT8173 does not provide any mtk_hdmi_conf structure and this is crashing the kernel with NULL pointer upon entering mtk_hdmi_bridge_mode_valid(), which happens as soon as a HDMI cable gets plugged in. To fix this regression, add a NULL pointer check for hdmi->conf in the said function, restoring HDMI functionality and avoiding NULL pointer kernel panics.

5.5
2024-03-04 CVE-2021-47086 Linux Unspecified vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: phonet/pep: refuse to enable an unbound pipe This ioctl() implicitly assumed that the socket was already bound to a valid local socket name, i.e.

5.5
2024-03-04 CVE-2021-47091 Linux Improper Locking vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: mac80211: fix locking in ieee80211_start_ap error path We need to hold the local->mtx to release the channel context, as even encoded by the lockdep_assert_held() there.

5.5
2024-03-04 CVE-2021-47093 Linux Memory Leak vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: platform/x86: intel_pmc_core: fix memleak on registration failure In case device registration fails during module initialisation, the platform device structure needs to be freed using platform_device_put() to properly free all resources (e.g.

5.5
2024-03-04 CVE-2021-47095 Linux NULL Pointer Dereference vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: ipmi: ssif: initialize ssif_info->client early During probe ssif_info->client is dereferenced in error path.

5.5
2024-03-04 CVE-2021-47100 Linux Use After Free vulnerability in Linux Kernel

In the Linux kernel, the following vulnerability has been resolved: ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module Hi, When testing install and uninstall of ipmi_si.ko and ipmi_msghandler.ko, the system crashed. The log as follows: [ 141.087026] BUG: unable to handle kernel paging request at ffffffffc09b3a5a [ 141.087241] PGD 8fe4c0d067 P4D 8fe4c0d067 PUD 8fe4c0f067 PMD 103ad89067 PTE 0 [ 141.087464] Oops: 0010 [#1] SMP NOPTI [ 141.087580] CPU: 67 PID: 668 Comm: kworker/67:1 Kdump: loaded Not tainted 4.18.0.x86_64 #47 [ 141.088009] Workqueue: events 0xffffffffc09b3a40 [ 141.088009] RIP: 0010:0xffffffffc09b3a5a [ 141.088009] Code: Bad RIP value. [ 141.088009] RSP: 0018:ffffb9094e2c3e88 EFLAGS: 00010246 [ 141.088009] RAX: 0000000000000000 RBX: ffff9abfdb1f04a0 RCX: 0000000000000000 [ 141.088009] RDX: 0000000000000000 RSI: 0000000000000246 RDI: 0000000000000246 [ 141.088009] RBP: 0000000000000000 R08: ffff9abfffee3cb8 R09: 00000000000002e1 [ 141.088009] R10: ffffb9094cb73d90 R11: 00000000000f4240 R12: ffff9abfffee8700 [ 141.088009] R13: 0000000000000000 R14: ffff9abfdb1f04a0 R15: ffff9abfdb1f04a8 [ 141.088009] FS: 0000000000000000(0000) GS:ffff9abfffec0000(0000) knlGS:0000000000000000 [ 141.088009] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 141.088009] CR2: ffffffffc09b3a30 CR3: 0000008fe4c0a001 CR4: 00000000007606e0 [ 141.088009] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 141.088009] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 141.088009] PKRU: 55555554 [ 141.088009] Call Trace: [ 141.088009] ? process_one_work+0x195/0x390 [ 141.088009] ? worker_thread+0x30/0x390 [ 141.088009] ? process_one_work+0x390/0x390 [ 141.088009] ? kthread+0x10d/0x130 [ 141.088009] ? kthread_flush_work_fn+0x10/0x10 [ 141.088009] ? ret_from_fork+0x35/0x40] BUG: unable to handle kernel paging request at ffffffffc0b28a5a [ 200.223240] PGD 97fe00d067 P4D 97fe00d067 PUD 97fe00f067 PMD a580cbf067 PTE 0 [ 200.223464] Oops: 0010 [#1] SMP NOPTI [ 200.223579] CPU: 63 PID: 664 Comm: kworker/63:1 Kdump: loaded Not tainted 4.18.0.x86_64 #46 [ 200.224008] Workqueue: events 0xffffffffc0b28a40 [ 200.224008] RIP: 0010:0xffffffffc0b28a5a [ 200.224008] Code: Bad RIP value. [ 200.224008] RSP: 0018:ffffbf3c8e2a3e88 EFLAGS: 00010246 [ 200.224008] RAX: 0000000000000000 RBX: ffffa0799ad6bca0 RCX: 0000000000000000 [ 200.224008] RDX: 0000000000000000 RSI: 0000000000000246 RDI: 0000000000000246 [ 200.224008] RBP: 0000000000000000 R08: ffff9fe43fde3cb8 R09: 00000000000000d5 [ 200.224008] R10: ffffbf3c8cb53d90 R11: 00000000000f4240 R12: ffff9fe43fde8700 [ 200.224008] R13: 0000000000000000 R14: ffffa0799ad6bca0 R15: ffffa0799ad6bca8 [ 200.224008] FS: 0000000000000000(0000) GS:ffff9fe43fdc0000(0000) knlGS:0000000000000000 [ 200.224008] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 200.224008] CR2: ffffffffc0b28a30 CR3: 00000097fe00a002 CR4: 00000000007606e0 [ 200.224008] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 200.224008] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 200.224008] PKRU: 55555554 [ 200.224008] Call Trace: [ 200.224008] ? process_one_work+0x195/0x390 [ 200.224008] ? worker_thread+0x30/0x390 [ 200.224008] ? process_one_work+0x390/0x390 [ 200.224008] ? kthread+0x10d/0x130 [ 200.224008] ? kthread_flush_work_fn+0x10/0x10 [ 200.224008] ? ret_from_fork+0x35/0x40 [ 200.224008] kernel fault(0x1) notification starting on CPU 63 [ 200.224008] kernel fault(0x1) notification finished on CPU 63 [ 200.224008] CR2: ffffffffc0b28a5a [ 200.224008] ---[ end trace c82a412d93f57412 ]--- The reason is as follows: T1: rmmod ipmi_si. ->ipmi_unregister_smi() -> ipmi_bmc_unregister() -> __ipmi_bmc_unregister() -> kref_put(&bmc->usecount, cleanup_bmc_device); -> schedule_work(&bmc->remove_work); T2: rmmod ipmi_msghandl ---truncated---

5.5
2024-03-04 CVE-2023-33078 Qualcomm Out-of-bounds Read vulnerability in Qualcomm products

Information Disclosure while processing IOCTL request in FastRPC.

5.5
2024-03-04 CVE-2023-25176 Openatom Out-of-bounds Read vulnerability in Openatom Openharmony

in OpenHarmony v3.2.4 and prior versions allow a local attacker cause information leak through out-of-bounds Read.

5.5
2024-03-04 CVE-2023-49602 Openatom Type Confusion vulnerability in Openatom Openharmony

in OpenHarmony v3.2.4 and prior versions allow a local attacker cause apps crash through type confusion.

5.5
2024-03-04 CVE-2024-21816 Openatom Improper Preservation of Permissions vulnerability in Openatom Openharmony 4.0

in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through improper preservation of permissions.

5.5
2024-03-04 CVE-2024-21826 Openatom Insecure Storage of Sensitive Information vulnerability in Openatom Openharmony

in OpenHarmony v3.2.4 and prior versions allow a local attacker cause sensitive information leak through insecure storage.

5.5
2024-03-09 CVE-2024-1767 Creativethemes Cross-site Scripting vulnerability in Creativethemes Blocksy

The Blocksy theme for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's blocks in all versions up to, and including, 2.0.26 due to insufficient input sanitization and output escaping on user supplied attributes like 'className' and 'radius'.

5.4
2024-03-07 CVE-2024-1802 Wpdeveloper Cross-site Scripting vulnerability in Wpdeveloper Embedpress

The EmbedPress – Embed PDF, Google Docs, Vimeo, Wistia, Embed YouTube Videos, Audios, Maps & Embed Any Documents in Gutenberg & Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Wistia embed block in all versions up to, and including, 3.9.10 due to insufficient input sanitization and output escaping on the user supplied url.

5.4
2024-03-07 CVE-2024-2128 Wpdeveloper Cross-site Scripting vulnerability in Wpdeveloper Embedpress

The EmbedPress – Embed PDF, Google Docs, Vimeo, Wistia, Embed YouTube Videos, Audios, Maps & Embed Any Documents in Gutenberg & Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's embed widget in all versions up to, and including, 3.9.10 due to insufficient input sanitization and output escaping on user supplied attributes.

5.4
2024-03-07 CVE-2024-1534 Booster Cross-site Scripting vulnerability in Booster for Woocommerce

The Booster for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 7.1.7 due to insufficient input sanitization and output escaping on user supplied attributes.

5.4
2024-03-07 CVE-2024-2136 Wpkoi Cross-site Scripting vulnerability in Wpkoi Templates for Elementor

The WPKoi Templates for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Advanced Heading widget in all versions up to, and including, 2.5.6 due to insufficient input sanitization and output escaping.

5.4
2024-03-07 CVE-2024-1506 Bdthemes Cross-site Scripting vulnerability in Bdthemes Prime Slider

The Prime Slider – Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'title_tags' attribute of the Fiestar widget in all versions up to, and including, 3.13.1 due to insufficient input sanitization and output escaping.

5.4
2024-03-07 CVE-2024-1366 Leevio Cross-site Scripting vulnerability in Leevio Happy Addons for Elementor

The Happy Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘archive_title_tag’ attribute of the Archive Title widget in all versions up to, and including, 3.10.3 due to insufficient input sanitization and output escaping.

5.4
2024-03-07 CVE-2024-1377 Leevio Cross-site Scripting vulnerability in Leevio Happy Addons for Elementor

The Happy Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘author_meta_tag’ attribute of the Author Meta widget in all versions up to, and including, 3.10.3 due to insufficient input sanitization and output escaping.

5.4
2024-03-07 CVE-2024-1761 Ninjateam Cross-site Scripting vulnerability in Ninjateam WP Chat APP

The WP Chat App plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's widget/block in all versions up to, and including, 3.6.1 due to insufficient input sanitization and output escaping on user supplied attributes such as 'buttonColor' and 'phoneNumber'.

5.4
2024-03-06 CVE-2024-28153 Jenkins Cross-site Scripting vulnerability in Jenkins Owasp Dependency-Check

Jenkins OWASP Dependency-Check Plugin 5.4.5 and earlier does not escape vulnerability metadata from Dependency-Check reports, resulting in a stored cross-site scripting (XSS) vulnerability.

5.4
2024-03-06 CVE-2024-28156 Jenkins Cross-site Scripting vulnerability in Jenkins Build Monitor View

Jenkins Build Monitor View Plugin 1.14-860.vd06ef2568b_3f and earlier does not escape Build Monitor View names, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure Build Monitor Views.

5.4
2024-03-06 CVE-2024-27278 Openpne Cross-site Scripting vulnerability in Openpne Optimelineplugin

OpenPNE Plugin "opTimelinePlugin" 1.2.11 and earlier contains a cross-site scripting vulnerability.

5.4
2024-03-09 CVE-2024-1125 Metagauss Missing Authorization vulnerability in Metagauss Eventprime

The EventPrime – Events Calendar, Bookings and Tickets plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the calendar_events_delete() function in all versions up to, and including, 3.4.3.

5.3
2024-03-07 CVE-2024-28228 Jetbrains Authentication Bypass by Spoofing vulnerability in Jetbrains Youtrack

In JetBrains YouTrack before 2024.1.25893 creation comments on behalf of an arbitrary user in HelpDesk was possible

5.3
2024-03-05 CVE-2024-27563 Wondercms Server-Side Request Forgery (SSRF) vulnerability in Wondercms 3.1.3

A Server-Side Request Forgery (SSRF) in the getFileFromRepo function of WonderCMS v3.1.3 allows attackers to force the application to make arbitrary requests via injection of crafted URLs into the pluginThemeUrl parameter.

5.3
2024-03-05 CVE-2024-20837 Samsung Unspecified vulnerability in Samsung Internet

Improper handling of granting permission for Trusted Web Activities in Samsung Internet prior to version 24.0.0.41 allows local attackers to grant permission to their own TWA WebApps without user interaction.

5.3
2024-03-04 CVE-2023-38362 IBM Information Exposure Through Discrepancy vulnerability in IBM Cics TX 10.1

IBM CICS TX Advanced 10.1 could disclose sensitive information to a remote attacker due to observable discrepancy in HTTP responses.

5.3
2024-03-04 CVE-2024-2151 Oretnom23 Unspecified vulnerability in Oretnom23 Online Mobile Store Management System 1.0

A vulnerability classified as problematic was found in SourceCodester Online Mobile Management Store 1.0.

5.3
2024-03-05 CVE-2024-2179 Concretecms Cross-site Scripting vulnerability in Concretecms Concrete CMS

Concrete CMS version 9 before 9.2.7 is vulnerable to Stored XSS via the Name field of a Group type since there is insufficient validation of administrator provided data for that field.

4.8
2024-03-08 CVE-2024-21901 Qnap Unspecified vulnerability in Qnap QTS

A SQL injection vulnerability has been reported to affect myQNAPcloud.

4.7
2024-03-08 CVE-2024-23235 Apple Race Condition vulnerability in Apple products

A race condition was addressed with additional validation.

4.7
2024-03-08 CVE-2024-23239 Apple Race Condition vulnerability in Apple products

A race condition was addressed with improved state handling.

4.7
2024-03-08 CVE-2024-23275 Apple Race Condition vulnerability in Apple Macos

A race condition was addressed with additional validation.

4.7
2024-03-06 CVE-2024-1760 Nsquared Cross-Site Request Forgery (CSRF) vulnerability in Nsquared Simply Schedule Appointments 1.6.6.16/1.6.6.20/1.6.6.7

The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.6.6.20.

4.7
2024-03-08 CVE-2024-23293 Apple Unspecified vulnerability in Apple products

This issue was addressed through improved state management.

4.6
2024-03-05 CVE-2024-20839 Samsung Unspecified vulnerability in Samsung Voice Recorder

Improper access control in Samsung Voice Recorder prior to versions 21.5.16.01 in Android 12 and Android 13, 21.4.51.02 in Android 14 allows physical attackers to access recording files on the lock screen.

4.6
2024-03-04 CVE-2024-20020 Google Out-of-bounds Write vulnerability in Google Android 13.0

In OPTEE, there is a possible out of bounds write due to an incorrect bounds check.

4.4
2024-03-08 CVE-2024-23273 Apple Unspecified vulnerability in Apple products

This issue was addressed through improved state management.

4.3
2024-03-07 CVE-2024-22256 Vmware Unspecified vulnerability in VMWare Cloud Director 10.4.0/10.5

VMware Cloud Director contains a partial information disclosure vulnerability. A malicious actor can potentially gather information about organization names based on the behavior of the instance.

4.3
2024-03-06 CVE-2024-28155 Jenkins Missing Authorization vulnerability in Jenkins Appspider

Jenkins AppSpider Plugin 1.0.16 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to obtain information about available scan config names, engine group names, and client names.

4.3
2024-03-06 CVE-2024-28173 Jetbrains Unspecified vulnerability in Jetbrains Teamcity

In JetBrains TeamCity between 2023.11 and 2023.11.4 custom build parameters of the "password" type could be disclosed

4.3
2024-03-05 CVE-2023-26282 IBM Unspecified vulnerability in IBM Watson Cp4D Data Stores

IBM Watson CP4D Data Stores 4.6.0 through 4.6.3 could allow a user with physical access and specific knowledge of the system to modify files or data on the system.

4.2

16 Low Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2024-03-08 CVE-2024-23227 Apple Unspecified vulnerability in Apple Macos

This issue was addressed with improved redaction of sensitive information.

3.3
2024-03-08 CVE-2024-23232 Apple Unspecified vulnerability in Apple Macos

A privacy issue was addressed with improved handling of temporary files.

3.3
2024-03-08 CVE-2024-23238 Apple Unspecified vulnerability in Apple Macos

An access issue was addressed with improved access restrictions.

3.3
2024-03-08 CVE-2024-23242 Apple Information Exposure Through Log Files vulnerability in Apple Ipad OS and Iphone OS

A privacy issue was addressed by not logging contents of text fields.

3.3
2024-03-08 CVE-2024-23245 Apple Unspecified vulnerability in Apple Macos

This issue was addressed by adding an additional prompt for user consent.

3.3
2024-03-08 CVE-2024-23253 Apple Incorrect Default Permissions vulnerability in Apple Macos

A permissions issue was addressed with additional restrictions.

3.3
2024-03-08 CVE-2024-23257 Apple Unspecified vulnerability in Apple products

The issue was addressed with improved memory handling.

3.3
2024-03-08 CVE-2024-23262 Apple Unspecified vulnerability in Apple Iphone OS

This issue was addressed with additional entitlement checks.

3.3
2024-03-08 CVE-2024-23289 Apple Unspecified vulnerability in Apple products

A lock screen issue was addressed with improved state management.

3.3
2024-03-08 CVE-2024-23291 Apple Unspecified vulnerability in Apple products

A privacy issue was addressed with improved private data redaction for log entries.

3.3
2024-03-08 CVE-2024-23292 Apple Unspecified vulnerability in Apple Iphone OS

This issue was addressed with improved data protection.

3.3
2024-03-05 CVE-2024-23243 Apple Unspecified vulnerability in Apple Ipad OS and Iphone OS

A privacy issue was addressed with improved private data redaction for log entries.

3.3
2024-03-05 CVE-2024-23256 Apple Unspecified vulnerability in Apple Ipad OS and Iphone OS

A logic issue was addressed with improved state management.

3.3
2024-03-08 CVE-2024-23240 Apple Unspecified vulnerability in Apple Ipad OS and Iphone OS

The issue was addressed with improved checks.

2.4
2024-03-08 CVE-2024-23255 Apple Improper Authentication vulnerability in Apple Ipad OS and Iphone OS

An authentication issue was addressed with improved state management.

2.4
2024-03-04 CVE-2024-24901 Dell Unspecified vulnerability in Dell Powerscale Onefs

Dell PowerScale OneFS 8.2.x through 9.6.0.x contain an insufficient logging vulnerability.

2.3