Weekly Vulnerabilities Reports > March 4 to 10, 2024
Overview
110 new vulnerabilities reported during this period, including 5 critical vulnerabilities and 39 high severity vulnerabilities. This weekly summary report vulnerabilities in 29 products from 18 vendors including Apple, Linux, Fedoraproject, Jetbrains, and Openatom. Vulnerabilities are notably categorized as "Out-of-bounds Write", "Use After Free", "Incorrect Authorization", "Improper Validation of Array Index", and "Incorrect Default Permissions".
- 33 reported vulnerabilities are remotely exploitables.
- 4 reported vulnerabilities are related to weaknesses in OWASP Top Ten.
- 77 reported vulnerabilities are exploitable by an anonymous user.
- Apple has the most reported vulnerabilities, with 70 reported vulnerabilities.
- Oretnom23 has the most reported critical vulnerabilities, with 3 reported vulnerabilities.
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
EXPLOITABLE
EXPLOITABLE
AVAILABLE
ANONYMOUSLY
WEB APPLICATION
Vulnerability Details
The following table list reported vulnerabilities for the period covered by this report:
5 Critical Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2024-03-08 | CVE-2024-21899 | Qnap | Unspecified vulnerability in Qnap QTS and Quts Hero An improper authentication vulnerability has been reported to affect several QNAP operating system versions. | 9.8 |
2024-03-04 | CVE-2024-27198 | Jetbrains | Unspecified vulnerability in Jetbrains Teamcity In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible | 9.8 |
2024-03-04 | CVE-2024-2153 | Oretnom23 | Unspecified vulnerability in Oretnom23 Online Mobile Store Management System 1.0 A vulnerability, which was classified as critical, was found in SourceCodester Online Mobile Management Store 1.0. | 9.8 |
2024-03-04 | CVE-2024-2154 | Oretnom23 | Unspecified vulnerability in Oretnom23 Online Mobile Store Management System 1.0 A vulnerability has been found in SourceCodester Online Mobile Management Store 1.0 and classified as critical. | 9.8 |
2024-03-04 | CVE-2024-2152 | Oretnom23 | Unspecified vulnerability in Oretnom23 Online Mobile Store Management System 1.0 A vulnerability, which was classified as critical, has been found in SourceCodester Online Mobile Management Store 1.0. | 9.8 |
39 High Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2024-03-10 | CVE-2024-2353 | Totolink | Unspecified vulnerability in Totolink X6000R Firmware 9.4.0Cu.852B20230719 A vulnerability, which was classified as critical, has been found in Totolink X6000R 9.4.0cu.852_20230719. | 8.8 |
2024-03-08 | CVE-2024-23226 | Apple | Unspecified vulnerability in Apple products The issue was addressed with improved memory handling. | 8.8 |
2024-03-06 | CVE-2024-2173 | Google Fedoraproject | Out-of-bounds Write vulnerability in multiple products Out of bounds memory access in V8 in Google Chrome prior to 122.0.6261.111 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. | 8.8 |
2024-03-06 | CVE-2024-2174 | Google Fedoraproject | Out-of-bounds Write vulnerability in multiple products Inappropriate implementation in V8 in Google Chrome prior to 122.0.6261.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2024-03-06 | CVE-2024-2176 | Google Fedoraproject | Use After Free vulnerability in multiple products Use after free in FedCM in Google Chrome prior to 122.0.6261.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2024-03-06 | CVE-2023-43318 | TP Link | Unspecified vulnerability in Tp-Link Tl-Sg2210P Firmware 5.0 TP-Link JetStream Smart Switch TL-SG2210P 5.0 Build 20211201 allows attackers to escalate privileges via modification of the 'tid' and 'usrlvl' values in GET requests. | 8.8 |
2024-03-08 | CVE-2024-0258 | Apple | Unspecified vulnerability in Apple products The issue was addressed with improved memory handling. | 8.6 |
2024-03-08 | CVE-2024-23246 | Apple | Unspecified vulnerability in Apple products This issue was addressed by removing the vulnerable code. | 8.6 |
2024-03-08 | CVE-2024-23278 | Apple | Unspecified vulnerability in Apple products The issue was addressed with improved checks. | 8.6 |
2024-03-07 | CVE-2024-1299 | Gitlab | Unspecified vulnerability in Gitlab A privilege escalation vulnerability was discovered in GitLab affecting versions 16.8 prior to 16.8.4 and 16.9 prior to 16.9.2. | 8.1 |
2024-03-07 | CVE-2024-0199 | Gitlab | Incorrect Authorization vulnerability in Gitlab An authorization bypass vulnerability was discovered in GitLab affecting versions 11.3 prior to 16.7.7, 16.7.6 prior to 16.8.4, and 16.8.3 prior to 16.9.2. | 8.0 |
2024-03-08 | CVE-2024-23233 | Apple | Unspecified vulnerability in Apple Macos This issue was addressed with improved checks. | 7.8 |
2024-03-08 | CVE-2024-23244 | Apple | Unspecified vulnerability in Apple Macos A logic issue was addressed with improved restrictions. | 7.8 |
2024-03-08 | CVE-2024-23247 | Apple | Unspecified vulnerability in Apple Macos The issue was addressed with improved memory handling. | 7.8 |
2024-03-08 | CVE-2024-23258 | Apple | Out-of-bounds Read vulnerability in Apple Macos and Visionos An out-of-bounds read was addressed with improved input validation. | 7.8 |
2024-03-08 | CVE-2024-23265 | Apple | Out-of-bounds Write vulnerability in Apple products A memory corruption vulnerability was addressed with improved locking. | 7.8 |
2024-03-08 | CVE-2024-23268 | Apple | Injection vulnerability in Apple Macos An injection issue was addressed with improved input validation. | 7.8 |
2024-03-08 | CVE-2024-23270 | Apple | Unspecified vulnerability in Apple products The issue was addressed with improved memory handling. | 7.8 |
2024-03-08 | CVE-2024-23274 | Apple | Injection vulnerability in Apple Macos An injection issue was addressed with improved input validation. | 7.8 |
2024-03-08 | CVE-2024-23276 | Apple | Unspecified vulnerability in Apple Macos A logic issue was addressed with improved checks. | 7.8 |
2024-03-08 | CVE-2024-23286 | Apple | Classic Buffer Overflow vulnerability in Apple products A buffer overflow issue was addressed with improved memory handling. | 7.8 |
2024-03-08 | CVE-2024-23288 | Apple | Unspecified vulnerability in Apple products This issue was addressed by removing the vulnerable code. | 7.8 |
2024-03-08 | CVE-2024-23294 | Apple | Unspecified vulnerability in Apple Macos This issue was addressed by removing the vulnerable code. | 7.8 |
2024-03-07 | CVE-2024-28115 | Amazon | Unspecified vulnerability in Amazon Freertos FreeRTOS is a real-time operating system for microcontrollers. | 7.8 |
2024-03-06 | CVE-2023-52594 | Linux | Improper Validation of Array Index vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() Fix an array-index-out-of-bounds read in ath9k_htc_txstatus(). | 7.8 |
2024-03-06 | CVE-2023-52599 | Linux | Improper Validation of Array Index vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: jfs: fix array-index-out-of-bounds in diNewExt [Syz report] UBSAN: array-index-out-of-bounds in fs/jfs/jfs_imap.c:2360:2 index -878706688 is out of range for type 'struct iagctl[128]' CPU: 1 PID: 5065 Comm: syz-executor282 Not tainted 6.7.0-rc4-syzkaller-00009-gbee0e7762ad2 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e7/0x2d0 lib/dump_stack.c:106 ubsan_epilogue lib/ubsan.c:217 [inline] __ubsan_handle_out_of_bounds+0x11c/0x150 lib/ubsan.c:348 diNewExt+0x3cf3/0x4000 fs/jfs/jfs_imap.c:2360 diAllocExt fs/jfs/jfs_imap.c:1949 [inline] diAllocAG+0xbe8/0x1e50 fs/jfs/jfs_imap.c:1666 diAlloc+0x1d3/0x1760 fs/jfs/jfs_imap.c:1587 ialloc+0x8f/0x900 fs/jfs/jfs_inode.c:56 jfs_mkdir+0x1c5/0xb90 fs/jfs/namei.c:225 vfs_mkdir+0x2f1/0x4b0 fs/namei.c:4106 do_mkdirat+0x264/0x3a0 fs/namei.c:4129 __do_sys_mkdir fs/namei.c:4149 [inline] __se_sys_mkdir fs/namei.c:4147 [inline] __x64_sys_mkdir+0x6e/0x80 fs/namei.c:4147 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x45/0x110 arch/x86/entry/common.c:82 entry_SYSCALL_64_after_hwframe+0x63/0x6b RIP: 0033:0x7fcb7e6a0b57 Code: ff ff 77 07 31 c0 c3 0f 1f 40 00 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffd83023038 EFLAGS: 00000286 ORIG_RAX: 0000000000000053 RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007fcb7e6a0b57 RDX: 00000000000a1020 RSI: 00000000000001ff RDI: 0000000020000140 RBP: 0000000020000140 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000286 R12: 00007ffd830230d0 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [Analysis] When the agstart is too large, it can cause agno overflow. [Fix] After obtaining agno, if the value is invalid, exit the subsequent process. Modified the test from agno > MAXAG to agno >= MAXAG based on linux-next report by kernel test robot (Dan Carpenter). | 7.8 |
2024-03-06 | CVE-2023-52600 | Linux | Use After Free vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: jfs: fix uaf in jfs_evict_inode When the execution of diMount(ipimap) fails, the object ipimap that has been released may be accessed in diFreeSpecial(). | 7.8 |
2024-03-06 | CVE-2023-52603 | Linux | Improper Validation of Array Index vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: UBSAN: array-index-out-of-bounds in dtSplitRoot Syzkaller reported the following issue: oop0: detected capacity change from 0 to 32768 UBSAN: array-index-out-of-bounds in fs/jfs/jfs_dtree.c:1971:9 index -2 is out of range for type 'struct dtslot [128]' CPU: 0 PID: 3613 Comm: syz-executor270 Not tainted 6.0.0-syzkaller-09423-g493ffd6605b2 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1b1/0x28e lib/dump_stack.c:106 ubsan_epilogue lib/ubsan.c:151 [inline] __ubsan_handle_out_of_bounds+0xdb/0x130 lib/ubsan.c:283 dtSplitRoot+0x8d8/0x1900 fs/jfs/jfs_dtree.c:1971 dtSplitUp fs/jfs/jfs_dtree.c:985 [inline] dtInsert+0x1189/0x6b80 fs/jfs/jfs_dtree.c:863 jfs_mkdir+0x757/0xb00 fs/jfs/namei.c:270 vfs_mkdir+0x3b3/0x590 fs/namei.c:4013 do_mkdirat+0x279/0x550 fs/namei.c:4038 __do_sys_mkdirat fs/namei.c:4053 [inline] __se_sys_mkdirat fs/namei.c:4051 [inline] __x64_sys_mkdirat+0x85/0x90 fs/namei.c:4051 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7fcdc0113fd9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffeb8bc67d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fcdc0113fd9 RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000000000003 RBP: 00007fcdc00d37a0 R08: 0000000000000000 R09: 00007fcdc00d37a0 R10: 00005555559a72c0 R11: 0000000000000246 R12: 00000000f8008000 R13: 0000000000000000 R14: 00083878000000f8 R15: 0000000000000000 </TASK> The issue is caused when the value of fsi becomes less than -1. The check to break the loop when fsi value becomes -1 is present but syzbot was able to produce value less than -1 which cause the error. This patch simply add the change for the values less than 0. The patch is tested via syzbot. | 7.8 |
2024-03-06 | CVE-2023-52604 | Linux | Improper Validation of Array Index vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree Syzkaller reported the following issue: UBSAN: array-index-out-of-bounds in fs/jfs/jfs_dmap.c:2867:6 index 196694 is out of range for type 's8[1365]' (aka 'signed char[1365]') CPU: 1 PID: 109 Comm: jfsCommit Not tainted 6.6.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e7/0x2d0 lib/dump_stack.c:106 ubsan_epilogue lib/ubsan.c:217 [inline] __ubsan_handle_out_of_bounds+0x11c/0x150 lib/ubsan.c:348 dbAdjTree+0x474/0x4f0 fs/jfs/jfs_dmap.c:2867 dbJoin+0x210/0x2d0 fs/jfs/jfs_dmap.c:2834 dbFreeBits+0x4eb/0xda0 fs/jfs/jfs_dmap.c:2331 dbFreeDmap fs/jfs/jfs_dmap.c:2080 [inline] dbFree+0x343/0x650 fs/jfs/jfs_dmap.c:402 txFreeMap+0x798/0xd50 fs/jfs/jfs_txnmgr.c:2534 txUpdateMap+0x342/0x9e0 txLazyCommit fs/jfs/jfs_txnmgr.c:2664 [inline] jfs_lazycommit+0x47a/0xb70 fs/jfs/jfs_txnmgr.c:2732 kthread+0x2d3/0x370 kernel/kthread.c:388 ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304 </TASK> ================================================================================ Kernel panic - not syncing: UBSAN: panic_on_warn set ... CPU: 1 PID: 109 Comm: jfsCommit Not tainted 6.6.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e7/0x2d0 lib/dump_stack.c:106 panic+0x30f/0x770 kernel/panic.c:340 check_panic_on_warn+0x82/0xa0 kernel/panic.c:236 ubsan_epilogue lib/ubsan.c:223 [inline] __ubsan_handle_out_of_bounds+0x13c/0x150 lib/ubsan.c:348 dbAdjTree+0x474/0x4f0 fs/jfs/jfs_dmap.c:2867 dbJoin+0x210/0x2d0 fs/jfs/jfs_dmap.c:2834 dbFreeBits+0x4eb/0xda0 fs/jfs/jfs_dmap.c:2331 dbFreeDmap fs/jfs/jfs_dmap.c:2080 [inline] dbFree+0x343/0x650 fs/jfs/jfs_dmap.c:402 txFreeMap+0x798/0xd50 fs/jfs/jfs_txnmgr.c:2534 txUpdateMap+0x342/0x9e0 txLazyCommit fs/jfs/jfs_txnmgr.c:2664 [inline] jfs_lazycommit+0x47a/0xb70 fs/jfs/jfs_txnmgr.c:2732 kthread+0x2d3/0x370 kernel/kthread.c:388 ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304 </TASK> Kernel Offset: disabled Rebooting in 86400 seconds.. The issue is caused when the value of lp becomes greater than CTLTREESIZE which is the max size of stree. | 7.8 |
2024-03-05 | CVE-2024-23225 | Apple | Out-of-bounds Write vulnerability in Apple products A memory corruption issue was addressed with improved validation. | 7.8 |
2024-03-05 | CVE-2024-23296 | Apple | Out-of-bounds Write vulnerability in Apple products A memory corruption issue was addressed with improved validation. | 7.8 |
2024-03-04 | CVE-2023-46708 | Openatom | Use After Free vulnerability in Openatom Openharmony in OpenHarmony v3.2.4 and prior versions allow a local attacker arbitrary code execution in any apps through use after free. | 7.8 |
2024-03-04 | CVE-2024-26622 | Linux | Use After Free vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: tomoyo: fix UAF write bug in tomoyo_write_control() Since tomoyo_write_control() updates head->write_buf when write() of long lines is requested, we need to fetch head->write_buf after head->io_sem is held. | 7.8 |
2024-03-07 | CVE-2024-1931 | Nlnetlabs Fedoraproject | Infinite Loop vulnerability in multiple products NLnet Labs Unbound version 1.18.0 up to and including version 1.19.1 contain a vulnerability that can cause denial of service by a certain code path that can lead to an infinite loop. | 7.5 |
2024-03-06 | CVE-2024-24761 | Galette | Incorrect Authorization vulnerability in Galette 1.0.0/1.0.1 Galette is a membership management web application for non profit organizations. | 7.5 |
2024-03-04 | CVE-2024-27199 | Jetbrains | Path Traversal vulnerability in Jetbrains Teamcity In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions was possible | 7.3 |
2024-03-08 | CVE-2024-23216 | Apple | Path Traversal vulnerability in Apple Macos A path handling issue was addressed with improved validation. | 7.1 |
2024-03-08 | CVE-2024-23248 | Apple | Unspecified vulnerability in Apple Macos The issue was addressed with improved memory handling. | 7.1 |
2024-03-08 | CVE-2024-23249 | Apple | Unspecified vulnerability in Apple Macos The issue was addressed with improved memory handling. | 7.1 |
51 Medium Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2024-03-08 | CVE-2024-23234 | Apple | Out-of-bounds Write vulnerability in Apple Macos An out-of-bounds write issue was addressed with improved input validation. | 6.7 |
2024-03-08 | CVE-2024-21900 | Qnap | Unspecified vulnerability in Qnap QTS and Quts Hero An injection vulnerability has been reported to affect several QNAP operating system versions. | 6.5 |
2024-03-08 | CVE-2024-23254 | Apple Fedoraproject Wpewebkit Webkitgtk | The issue was addressed with improved UI handling. | 6.5 |
2024-03-08 | CVE-2024-23259 | Apple | Unspecified vulnerability in Apple Iphone OS The issue was addressed with improved checks. | 6.5 |
2024-03-08 | CVE-2024-23263 | Apple Wpewebkit Webkitgtk Fedoraproject | A logic issue was addressed with improved validation. | 6.5 |
2024-03-08 | CVE-2024-23280 | Apple Fedoraproject Wpewebkit Webkitgtk | Injection vulnerability in multiple products An injection issue was addressed with improved validation. | 6.5 |
2024-03-08 | CVE-2024-23284 | Apple Fedoraproject Wpewebkit Webkitgtk | A logic issue was addressed with improved state management. | 6.5 |
2024-03-07 | CVE-2024-28229 | Jetbrains | Incorrect Authorization vulnerability in Jetbrains Youtrack In JetBrains YouTrack before 2024.1.25893 user without appropriate permissions could restore issues and articles | 6.5 |
2024-03-07 | CVE-2024-28230 | Jetbrains | Missing Authorization vulnerability in Jetbrains Youtrack In JetBrains YouTrack before 2024.1.25893 attaching/detaching workflow to a project was possible without project admin permissions | 6.5 |
2024-03-08 | CVE-2024-23277 | Apple | Unspecified vulnerability in Apple Ipad OS, Iphone OS and Macos The issue was addressed with improved checks. | 5.9 |
2024-03-06 | CVE-2024-28174 | Jetbrains | Incorrect Authorization vulnerability in Jetbrains Teamcity In JetBrains TeamCity before 2023.11.4 presigned URL generation requests in S3 Artifact Storage plugin were authorized improperly | 5.8 |
2024-03-08 | CVE-2023-28826 | Apple | Unspecified vulnerability in Apple Iphone OS and Macos This issue was addressed with improved redaction of sensitive information. | 5.5 |
2024-03-08 | CVE-2024-23201 | Apple | Incorrect Default Permissions vulnerability in Apple products A permissions issue was addressed with additional restrictions. | 5.5 |
2024-03-08 | CVE-2024-23205 | Apple | Unspecified vulnerability in Apple Ipad OS and Iphone OS A privacy issue was addressed with improved private data redaction for log entries. | 5.5 |
2024-03-08 | CVE-2024-23220 | Apple | Unspecified vulnerability in Apple Ipad OS and Iphone OS The issue was addressed with improved handling of caches. | 5.5 |
2024-03-08 | CVE-2024-23230 | Apple | Unspecified vulnerability in Apple Macos This issue was addressed with improved file handling. | 5.5 |
2024-03-08 | CVE-2024-23231 | Apple | Unspecified vulnerability in Apple products A privacy issue was addressed with improved private data redaction for log entries. | 5.5 |
2024-03-08 | CVE-2024-23241 | Apple | Unspecified vulnerability in Apple products This issue was addressed through improved state management. | 5.5 |
2024-03-08 | CVE-2024-23250 | Apple | Unspecified vulnerability in Apple products An access issue was addressed with improved access restrictions. | 5.5 |
2024-03-08 | CVE-2024-23260 | Apple | Unspecified vulnerability in Apple Macos This issue was addressed by removing additional entitlements. | 5.5 |
2024-03-08 | CVE-2024-23264 | Apple | Unspecified vulnerability in Apple products A validation issue was addressed with improved input sanitization. | 5.5 |
2024-03-08 | CVE-2024-23266 | Apple | Unspecified vulnerability in Apple Macos The issue was addressed with improved checks. | 5.5 |
2024-03-08 | CVE-2024-23267 | Apple | Unspecified vulnerability in Apple Macos The issue was addressed with improved checks. | 5.5 |
2024-03-08 | CVE-2024-23269 | Apple | Unspecified vulnerability in Apple Macos A downgrade issue affecting Intel-based Mac computers was addressed with additional code-signing restrictions. | 5.5 |
2024-03-08 | CVE-2024-23272 | Apple | Unspecified vulnerability in Apple Macos A logic issue was addressed with improved checks. | 5.5 |
2024-03-08 | CVE-2024-23279 | Apple | Unspecified vulnerability in Apple Macos A privacy issue was addressed with improved private data redaction for log entries. | 5.5 |
2024-03-08 | CVE-2024-23281 | Apple | Unspecified vulnerability in Apple Macos This issue was addressed with improved state management. | 5.5 |
2024-03-08 | CVE-2024-23283 | Apple | Unspecified vulnerability in Apple Iphone OS A privacy issue was addressed with improved private data redaction for log entries. | 5.5 |
2024-03-08 | CVE-2024-23285 | Apple | Link Following vulnerability in Apple Macos This issue was addressed with improved handling of symlinks. | 5.5 |
2024-03-08 | CVE-2024-23287 | Apple | Unspecified vulnerability in Apple products A privacy issue was addressed with improved handling of temporary files. | 5.5 |
2024-03-08 | CVE-2024-23290 | Apple | Unspecified vulnerability in Apple products A logic issue was addressed with improved restrictions. | 5.5 |
2024-03-08 | CVE-2024-23295 | Apple | Incorrect Default Permissions vulnerability in Apple Visionos 1.0.2 A permissions issue was addressed to help ensure Personas are always protected This issue is fixed in visionOS 1.1. | 5.5 |
2024-03-08 | CVE-2024-23297 | Apple | Unspecified vulnerability in Apple products The issue was addressed with improved checks. | 5.5 |
2024-03-06 | CVE-2023-52593 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() Since 'ieee80211_beacon_get()' can return NULL, 'wfx_set_mfp_ap()' should check the return value before examining skb data. | 5.5 |
2024-03-06 | CVE-2023-52595 | Linux | Improper Locking vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: wifi: rt2x00: restart beacon queue when hardware reset When a hardware reset is triggered, all registers are reset, so all queues are forced to stop in hardware interface. | 5.5 |
2024-03-06 | CVE-2024-26626 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: ipmr: fix kernel panic when forwarding mcast packets The stacktrace was: [ 86.305548] BUG: kernel NULL pointer dereference, address: 0000000000000092 [ 86.306815] #PF: supervisor read access in kernel mode [ 86.307717] #PF: error_code(0x0000) - not-present page [ 86.308624] PGD 0 P4D 0 [ 86.309091] Oops: 0000 [#1] PREEMPT SMP NOPTI [ 86.309883] CPU: 2 PID: 3139 Comm: pimd Tainted: G U 6.8.0-6wind-knet #1 [ 86.311027] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.11.1-0-g0551a4be2c-prebuilt.qemu-project.org 04/01/2014 [ 86.312728] RIP: 0010:ip_mr_forward (/build/work/knet/net/ipv4/ipmr.c:1985) [ 86.313399] Code: f9 1f 0f 87 85 03 00 00 48 8d 04 5b 48 8d 04 83 49 8d 44 c5 00 48 8b 40 70 48 39 c2 0f 84 d9 00 00 00 49 8b 46 58 48 83 e0 fe <80> b8 92 00 00 00 00 0f 84 55 ff ff ff 49 83 47 38 01 45 85 e4 0f [ 86.316565] RSP: 0018:ffffad21c0583ae0 EFLAGS: 00010246 [ 86.317497] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 86.318596] RDX: ffff9559cb46c000 RSI: 0000000000000000 RDI: 0000000000000000 [ 86.319627] RBP: ffffad21c0583b30 R08: 0000000000000000 R09: 0000000000000000 [ 86.320650] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001 [ 86.321672] R13: ffff9559c093a000 R14: ffff9559cc00b800 R15: ffff9559c09c1d80 [ 86.322873] FS: 00007f85db661980(0000) GS:ffff955a79d00000(0000) knlGS:0000000000000000 [ 86.324291] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 86.325314] CR2: 0000000000000092 CR3: 000000002f13a000 CR4: 0000000000350ef0 [ 86.326589] Call Trace: [ 86.327036] <TASK> [ 86.327434] ? show_regs (/build/work/knet/arch/x86/kernel/dumpstack.c:479) [ 86.328049] ? __die (/build/work/knet/arch/x86/kernel/dumpstack.c:421 /build/work/knet/arch/x86/kernel/dumpstack.c:434) [ 86.328508] ? page_fault_oops (/build/work/knet/arch/x86/mm/fault.c:707) [ 86.329107] ? do_user_addr_fault (/build/work/knet/arch/x86/mm/fault.c:1264) [ 86.329756] ? srso_return_thunk (/build/work/knet/arch/x86/lib/retpoline.S:223) [ 86.330350] ? __irq_work_queue_local (/build/work/knet/kernel/irq_work.c:111 (discriminator 1)) [ 86.331013] ? exc_page_fault (/build/work/knet/./arch/x86/include/asm/paravirt.h:693 /build/work/knet/arch/x86/mm/fault.c:1515 /build/work/knet/arch/x86/mm/fault.c:1563) [ 86.331702] ? asm_exc_page_fault (/build/work/knet/./arch/x86/include/asm/idtentry.h:570) [ 86.332468] ? ip_mr_forward (/build/work/knet/net/ipv4/ipmr.c:1985) [ 86.333183] ? srso_return_thunk (/build/work/knet/arch/x86/lib/retpoline.S:223) [ 86.333920] ipmr_mfc_add (/build/work/knet/./include/linux/rcupdate.h:782 /build/work/knet/net/ipv4/ipmr.c:1009 /build/work/knet/net/ipv4/ipmr.c:1273) [ 86.334583] ? __pfx_ipmr_hash_cmp (/build/work/knet/net/ipv4/ipmr.c:363) [ 86.335357] ip_mroute_setsockopt (/build/work/knet/net/ipv4/ipmr.c:1470) [ 86.336135] ? srso_return_thunk (/build/work/knet/arch/x86/lib/retpoline.S:223) [ 86.336854] ? ip_mroute_setsockopt (/build/work/knet/net/ipv4/ipmr.c:1470) [ 86.337679] do_ip_setsockopt (/build/work/knet/net/ipv4/ip_sockglue.c:944) [ 86.338408] ? __pfx_unix_stream_read_actor (/build/work/knet/net/unix/af_unix.c:2862) [ 86.339232] ? srso_return_thunk (/build/work/knet/arch/x86/lib/retpoline.S:223) [ 86.339809] ? aa_sk_perm (/build/work/knet/security/apparmor/include/cred.h:153 /build/work/knet/security/apparmor/net.c:181) [ 86.340342] ip_setsockopt (/build/work/knet/net/ipv4/ip_sockglue.c:1415) [ 86.340859] raw_setsockopt (/build/work/knet/net/ipv4/raw.c:836) [ 86.341408] ? security_socket_setsockopt (/build/work/knet/security/security.c:4561 (discriminator 13)) [ 86.342116] sock_common_setsockopt (/build/work/knet/net/core/sock.c:3716) [ 86.342747] do_sock_setsockopt (/build/work/knet/net/socket.c:2313) [ 86.343363] __sys_setsockopt (/build/work/knet/./include/linux/file.h:32 /build/work/kn ---truncated--- | 5.5 |
2024-03-04 | CVE-2023-25176 | Openatom | Out-of-bounds Read vulnerability in Openatom Openharmony in OpenHarmony v3.2.4 and prior versions allow a local attacker cause information leak through out-of-bounds Read. | 5.5 |
2024-03-04 | CVE-2023-49602 | Openatom | Type Confusion vulnerability in Openatom Openharmony in OpenHarmony v3.2.4 and prior versions allow a local attacker cause apps crash through type confusion. | 5.5 |
2024-03-04 | CVE-2024-21816 | Openatom | Improper Preservation of Permissions vulnerability in Openatom Openharmony 4.0 in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through improper preservation of permissions. | 5.5 |
2024-03-04 | CVE-2024-21826 | Openatom | Insecure Storage of Sensitive Information vulnerability in Openatom Openharmony in OpenHarmony v3.2.4 and prior versions allow a local attacker cause sensitive information leak through insecure storage. | 5.5 |
2024-03-07 | CVE-2024-28228 | Jetbrains | Authentication Bypass by Spoofing vulnerability in Jetbrains Youtrack In JetBrains YouTrack before 2024.1.25893 creation comments on behalf of an arbitrary user in HelpDesk was possible | 5.3 |
2024-03-04 | CVE-2024-2151 | Oretnom23 | Unspecified vulnerability in Oretnom23 Online Mobile Store Management System 1.0 A vulnerability classified as problematic was found in SourceCodester Online Mobile Management Store 1.0. | 5.3 |
2024-03-05 | CVE-2024-2179 | Concretecms | Cross-site Scripting vulnerability in Concretecms Concrete CMS Concrete CMS version 9 before 9.2.7 is vulnerable to Stored XSS via the Name field of a Group type since there is insufficient validation of administrator provided data for that field. | 4.8 |
2024-03-08 | CVE-2024-21901 | Qnap | Unspecified vulnerability in Qnap QTS A SQL injection vulnerability has been reported to affect myQNAPcloud. | 4.7 |
2024-03-08 | CVE-2024-23235 | Apple | Race Condition vulnerability in Apple products A race condition was addressed with additional validation. | 4.7 |
2024-03-08 | CVE-2024-23239 | Apple | Race Condition vulnerability in Apple products A race condition was addressed with improved state handling. | 4.7 |
2024-03-08 | CVE-2024-23275 | Apple | Race Condition vulnerability in Apple Macos A race condition was addressed with additional validation. | 4.7 |
2024-03-08 | CVE-2024-23293 | Apple | Unspecified vulnerability in Apple products This issue was addressed through improved state management. | 4.6 |
2024-03-08 | CVE-2024-23273 | Apple | Unspecified vulnerability in Apple products This issue was addressed through improved state management. | 4.3 |
2024-03-07 | CVE-2024-22256 | Vmware | Unspecified vulnerability in VMWare Cloud Director 10.4.0/10.5 VMware Cloud Director contains a partial information disclosure vulnerability. A malicious actor can potentially gather information about organization names based on the behavior of the instance. | 4.3 |
2024-03-06 | CVE-2024-28173 | Jetbrains | Unspecified vulnerability in Jetbrains Teamcity In JetBrains TeamCity between 2023.11 and 2023.11.4 custom build parameters of the "password" type could be disclosed | 4.3 |
15 Low Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2024-03-08 | CVE-2024-23227 | Apple | Unspecified vulnerability in Apple Macos This issue was addressed with improved redaction of sensitive information. | 3.3 |
2024-03-08 | CVE-2024-23232 | Apple | Unspecified vulnerability in Apple Macos A privacy issue was addressed with improved handling of temporary files. | 3.3 |
2024-03-08 | CVE-2024-23238 | Apple | Unspecified vulnerability in Apple Macos An access issue was addressed with improved access restrictions. | 3.3 |
2024-03-08 | CVE-2024-23242 | Apple | Information Exposure Through Log Files vulnerability in Apple Ipad OS and Iphone OS A privacy issue was addressed by not logging contents of text fields. | 3.3 |
2024-03-08 | CVE-2024-23245 | Apple | Unspecified vulnerability in Apple Macos This issue was addressed by adding an additional prompt for user consent. | 3.3 |
2024-03-08 | CVE-2024-23253 | Apple | Incorrect Default Permissions vulnerability in Apple Macos A permissions issue was addressed with additional restrictions. | 3.3 |
2024-03-08 | CVE-2024-23257 | Apple | Unspecified vulnerability in Apple products The issue was addressed with improved memory handling. | 3.3 |
2024-03-08 | CVE-2024-23262 | Apple | Unspecified vulnerability in Apple Iphone OS This issue was addressed with additional entitlement checks. | 3.3 |
2024-03-08 | CVE-2024-23289 | Apple | Unspecified vulnerability in Apple products A lock screen issue was addressed with improved state management. | 3.3 |
2024-03-08 | CVE-2024-23291 | Apple | Unspecified vulnerability in Apple products A privacy issue was addressed with improved private data redaction for log entries. | 3.3 |
2024-03-08 | CVE-2024-23292 | Apple | Unspecified vulnerability in Apple Iphone OS This issue was addressed with improved data protection. | 3.3 |
2024-03-05 | CVE-2024-23243 | Apple | Unspecified vulnerability in Apple Ipad OS and Iphone OS A privacy issue was addressed with improved private data redaction for log entries. | 3.3 |
2024-03-05 | CVE-2024-23256 | Apple | Unspecified vulnerability in Apple Ipad OS and Iphone OS A logic issue was addressed with improved state management. | 3.3 |
2024-03-08 | CVE-2024-23240 | Apple | Unspecified vulnerability in Apple Ipad OS and Iphone OS The issue was addressed with improved checks. | 2.4 |
2024-03-08 | CVE-2024-23255 | Apple | Improper Authentication vulnerability in Apple Ipad OS and Iphone OS An authentication issue was addressed with improved state management. | 2.4 |