Weekly Vulnerabilities Reports > April 8 to 14, 2024
Overview
187 new vulnerabilities reported during this period, including 16 critical vulnerabilities and 55 high severity vulnerabilities. This weekly summary report vulnerabilities in 354 products from 56 vendors including Linux, Microsoft, Fortinet, Xwiki, and Adobe. Vulnerabilities are notably categorized as "Cross-site Scripting", "NULL Pointer Dereference", "Out-of-bounds Write", "Missing Authorization", and "Out-of-bounds Read".
- 136 reported vulnerabilities are remotely exploitables.
- 51 reported vulnerabilities are related to weaknesses in OWASP Top Ten.
- 66 reported vulnerabilities are exploitable by an anonymous user.
- Linux has the most reported vulnerabilities, with 19 reported vulnerabilities.
- Oretnom23 has the most reported critical vulnerabilities, with 3 reported vulnerabilities.
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
EXPLOITABLE
EXPLOITABLE
AVAILABLE
ANONYMOUSLY
WEB APPLICATION
Vulnerability Details
The following table list reported vulnerabilities for the period covered by this report:
16 Critical Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2024-04-12 | CVE-2024-3400 | Paloaltonetworks | Command Injection vulnerability in Paloaltonetworks Pan-Os A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability. | 10.0 |
2024-04-11 | CVE-2024-25935 | Metagauss | Unspecified vulnerability in Metagauss Registrationmagic Missing Authorization vulnerability in Metagauss RegistrationMagic.This issue affects RegistrationMagic: from n/a through 5.2.5.9. | 9.8 |
2024-04-10 | CVE-2024-31996 | Xwiki | Code Injection vulnerability in Xwiki XWiki Platform is a generic wiki platform. | 9.8 |
2024-04-10 | CVE-2024-31982 | Xwiki | Code Injection vulnerability in Xwiki XWiki Platform is a generic wiki platform. | 9.8 |
2024-04-10 | CVE-2024-3119 | Irontec | Out-of-bounds Write vulnerability in Irontec Sngrep A buffer overflow vulnerability exists in all versions of sngrep since v0.4.2, due to improper handling of 'Call-ID' and 'X-Call-ID' SIP headers. | 9.8 |
2024-04-10 | CVE-2024-3120 | Irontec | Out-of-bounds Write vulnerability in Irontec Sngrep A stack-buffer overflow vulnerability exists in all versions of sngrep since v1.4.1. | 9.8 |
2024-04-09 | CVE-2024-3214 | Relevanssi | Improper Neutralization of Formula Elements in a CSV File vulnerability in Relevanssi The Relevanssi – A Better Search plugin for WordPress is vulnerable to CSV Injection in all versions up to, and including, 4.22.1. | 9.8 |
2024-04-08 | CVE-2024-3465 | Oretnom23 | Unspecified vulnerability in Oretnom23 Laundry Shop Management System 1.0 A vulnerability was found in SourceCodester Laundry Management System 1.0. | 9.8 |
2024-04-08 | CVE-2024-3464 | Oretnom23 | Unspecified vulnerability in Oretnom23 Laundry Shop Management System 1.0 A vulnerability was found in SourceCodester Laundry Management System 1.0 and classified as critical. | 9.8 |
2024-04-08 | CVE-2024-3445 | Oretnom23 | Unspecified vulnerability in Oretnom23 Laundry Shop Management System 1.0 A vulnerability was found in SourceCodester Laundry Management System 1.0. | 9.8 |
2024-04-10 | CVE-2024-3157 | Google Fedoraproject | Out-of-bounds Write vulnerability in multiple products Out of bounds memory access in Compositing in Google Chrome prior to 123.0.6312.122 allowed a remote attacker who had compromised the GPU process to potentially perform a sandbox escape via specific UI gestures. | 9.6 |
2024-04-10 | CVE-2024-31214 | Traccar | Unrestricted Upload of File with Dangerous Type vulnerability in Traccar Traccar is an open source GPS tracking system. | 9.6 |
2024-04-10 | CVE-2024-1740 | Lunary | Unspecified vulnerability in Lunary In lunary-ai/lunary version 1.0.1, a vulnerability exists where a user removed from an organization can still read, create, modify, and delete logs by re-using an old authorization token. | 9.1 |
2024-04-10 | CVE-2024-1741 | Lunary | Incorrect Authorization vulnerability in Lunary lunary-ai/lunary version 1.0.1 is vulnerable to improper authorization, allowing removed members to read, create, modify, and delete prompt templates using an old authorization token. | 9.1 |
2024-04-10 | CVE-2024-3383 | Paloaltonetworks | Unspecified vulnerability in Paloaltonetworks Pan-Os A vulnerability in how Palo Alto Networks PAN-OS software processes data received from Cloud Identity Engine (CIE) agents enables modification of User-ID groups. | 9.1 |
2024-04-09 | CVE-2024-29990 | Microsoft | Unspecified vulnerability in Microsoft Azure Kubernetes Service Confidential Containers Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability | 9.0 |
55 High Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2024-04-12 | CVE-2024-22358 | IBM | Unspecified vulnerability in IBM Urbancode Deploy IBM UrbanCode Deploy (UCD) 7.0 through 7.0.5.20, 7.1 through 7.1.2.16, 7.2 through 7.2.3.9, 7.3 through 7.3.2.4 and IBM DevOps Deploy 8.0 through 8.0.0.1 does not invalidate session after logout which could allow an authenticated user to impersonate another user on the system. | 8.8 |
2024-04-12 | CVE-2024-31363 | Lifterlms | Unspecified vulnerability in Lifterlms Cross-Site Request Forgery (CSRF) vulnerability in LifterLMS.This issue affects LifterLMS: from n/a through 7.5.0. | 8.8 |
2024-04-11 | CVE-2024-31932 | Creativethemes | Unspecified vulnerability in Creativethemes Blocksy Companion Cross-Site Request Forgery (CSRF) vulnerability in CreativeThemes Blocksy Companion.This issue affects Blocksy Companion: from n/a through 2.0.28. | 8.8 |
2024-04-11 | CVE-2024-27985 | WP Property Hive | Unspecified vulnerability in Wp-Property-Hive Propertyhive Deserialization of Untrusted Data vulnerability in PropertyHive.This issue affects PropertyHive: from n/a through 2.0.9. | 8.8 |
2024-04-10 | CVE-2024-31997 | Xwiki | Missing Authorization vulnerability in Xwiki XWiki Platform is a generic wiki platform. | 8.8 |
2024-04-10 | CVE-2024-31986 | Xwiki | Cross-Site Request Forgery (CSRF) vulnerability in Xwiki XWiki Platform is a generic wiki platform. | 8.8 |
2024-04-10 | CVE-2024-31987 | Xwiki | Missing Authorization vulnerability in Xwiki XWiki Platform is a generic wiki platform. | 8.8 |
2024-04-10 | CVE-2024-31988 | Xwiki | Cross-Site Request Forgery (CSRF) vulnerability in Xwiki XWiki Platform is a generic wiki platform. | 8.8 |
2024-04-10 | CVE-2024-31465 | Xwiki | Code Injection vulnerability in Xwiki XWiki Platform is a generic wiki platform. | 8.8 |
2024-04-10 | CVE-2024-31981 | Xwiki | Missing Authorization vulnerability in Xwiki XWiki Platform is a generic wiki platform. | 8.8 |
2024-04-10 | CVE-2024-31983 | Xwiki | Missing Authorization vulnerability in Xwiki XWiki Platform is a generic wiki platform. | 8.8 |
2024-04-10 | CVE-2024-31984 | Xwiki | Code Injection vulnerability in Xwiki XWiki Platform is a generic wiki platform. | 8.8 |
2024-04-09 | CVE-2023-41677 | Fortinet | Unspecified vulnerability in Fortinet Fortiproxy A insufficiently protected credentials in Fortinet FortiProxy 7.4.0, 7.2.0 through 7.2.6, 7.0.0 through 7.0.12, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, Fortinet FortiOS 7.4.0 through 7.4.1, 7.2.0 through 7.2.6, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.17 allows attacker to execute unauthorized code or commands via targeted social engineering attack | 8.8 |
2024-04-09 | CVE-2023-45590 | Fortinet | Unspecified vulnerability in Fortinet Forticlient An improper control of generation of code ('code injection') in Fortinet FortiClientLinux version 7.2.0, 7.0.6 through 7.0.10 and 7.0.3 through 7.0.4 allows attacker to execute unauthorized code or commands via tricking a FortiClientLinux user into visiting a malicious website | 8.8 |
2024-04-09 | CVE-2024-21755 | Fortinet | Unspecified vulnerability in Fortinet Fortisandbox A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSandbox version 4.4.0 through 4.4.3 and 4.2.0 through 4.2.6 and 4.0.0 through 4.0.4 allows attacker to execute unauthorized code or commands via crafted requests.. | 8.8 |
2024-04-09 | CVE-2024-21756 | Fortinet | Unspecified vulnerability in Fortinet Fortisandbox A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSandbox version 4.4.0 through 4.4.3 and 4.2.0 through 4.2.6 and 4.0.0 through 4.0.4 allows attacker to execute unauthorized code or commands via crafted requests.. | 8.8 |
2024-04-08 | CVE-2024-3466 | Oretnom23 | Unspecified vulnerability in Oretnom23 Laundry Shop Management System 1.0 A vulnerability was found in SourceCodester Laundry Management System 1.0. | 8.8 |
2024-04-09 | CVE-2024-3213 | Relevanssi | Missing Authorization vulnerability in Relevanssi The Relevanssi – A Better Search plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the relevanssi_update_counts() function in all versions up to, and including, 4.22.1. | 8.2 |
2024-04-10 | CVE-2024-31871 | IBM | Unspecified vulnerability in IBM Security Verify Access IBM Security Verify Access Appliance 10.0.0 through 10.0.7 could allow a malicious actor to conduct a man in the middle attack when deploying Python scripts due to improper certificate validation. | 8.1 |
2024-04-10 | CVE-2024-31872 | IBM | Unspecified vulnerability in IBM Security Verify Access IBM Security Verify Access Appliance 10.0.0 through 10.0.7 could allow a malicious actor to conduct a man in the middle attack when deploying Open Source scripts due to missing certificate validation. | 8.1 |
2024-04-09 | CVE-2024-23671 | Fortinet | Unspecified vulnerability in Fortinet Fortisandbox A improper limitation of a pathname to a restricted directory ('path traversal') in Fortinet FortiSandbox version 4.4.0 through 4.4.3 and 4.2.0 through 4.2.6 and 4.0.0 through 4.0.4 allows attacker to execute unauthorized code or commands via crafted HTTP requests. | 8.1 |
2024-04-11 | CVE-2024-30271 | Adobe | Out-of-bounds Write vulnerability in Adobe Illustrator Illustrator versions 28.3, 27.9.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-04-11 | CVE-2024-30272 | Adobe | Out-of-bounds Write vulnerability in Adobe Illustrator Illustrator versions 28.3, 27.9.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-04-11 | CVE-2024-30273 | Adobe | Out-of-bounds Write vulnerability in Adobe Illustrator Illustrator versions 28.3, 27.9.2 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-04-11 | CVE-2024-20795 | Adobe | Integer Overflow or Wraparound vulnerability in Adobe Animate Animate versions 23.0.4, 24.0.1 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-04-11 | CVE-2024-20797 | Adobe | Out-of-bounds Read vulnerability in Adobe Animate Animate versions 23.0.4, 24.0.1 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. | 7.8 |
2024-04-10 | CVE-2021-47194 | Linux | Improper Initialization vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: cfg80211: call cfg80211_stop_ap when switch from P2P_GO type If the userspace tools switch from NL80211_IFTYPE_P2P_GO to NL80211_IFTYPE_ADHOC via send_msg(NL80211_CMD_SET_INTERFACE), it does not call the cleanup cfg80211_stop_ap(), this leads to the initialization of in-use data. | 7.8 |
2024-04-10 | CVE-2021-47198 | Linux | Use After Free vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix use-after-free in lpfc_unreg_rpi() routine An error is detected with the following report when unloading the driver: "KASAN: use-after-free in lpfc_unreg_rpi+0x1b1b" The NLP_REG_LOGIN_SEND nlp_flag is set in lpfc_reg_fab_ctrl_node(), but the flag is not cleared upon completion of the login. This allows a second call to lpfc_unreg_rpi() to proceed with nlp_rpi set to LPFC_RPI_ALLOW_ERROR. | 7.8 |
2024-04-10 | CVE-2021-47200 | Linux | Use After Free vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: drm/prime: Fix use after free in mmap with drm_gem_ttm_mmap drm_gem_ttm_mmap() drops a reference to the gem object on success. | 7.8 |
2024-04-10 | CVE-2021-47204 | Linux | Use After Free vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: net: dpaa2-eth: fix use-after-free in dpaa2_eth_remove Access to netdev after free_netdev() will cause use-after-free bug. Move debug log before free_netdev() call to avoid it. | 7.8 |
2024-04-10 | CVE-2024-31492 | Fortinet | Unspecified vulnerability in Fortinet Forticlient An external control of file name or path vulnerability [CWE-73] in FortiClientMac version 7.2.3 and below, version 7.0.10 and below installer may allow a local attacker to execute arbitrary code or commands via writing a malicious configuration file in /tmp before starting the installation process. | 7.8 |
2024-04-10 | CVE-2024-22450 | Dell | Unspecified vulnerability in Dell Alienware Command Center Dell Alienware Command Center, versions prior to 6.2.7.0, contain an uncontrolled search path element vulnerability. | 7.8 |
2024-04-09 | CVE-2024-29050 | Microsoft | Improper Certificate Validation vulnerability in Microsoft products Windows Cryptographic Services Remote Code Execution Vulnerability | 7.8 |
2024-04-11 | CVE-2024-2966 | Bdthemes | Unspecified vulnerability in Bdthemes Element Pack The Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 5.5.6 via the element_pack_ajax_search function. | 7.5 |
2024-04-10 | CVE-2024-29903 | Sigstore | Allocation of Resources Without Limits or Throttling vulnerability in Sigstore Cosign Cosign provides code signing and transparency for containers and binaries. | 7.5 |
2024-04-10 | CVE-2024-1902 | Lunary | Unspecified vulnerability in Lunary lunary-ai/lunary is vulnerable to a session reuse attack, allowing a removed user to change the organization name without proper authorization. | 7.5 |
2024-04-10 | CVE-2024-31343 | Sonaar | Unspecified vulnerability in Sonaar MP3 Audio Player for Music, Radio & Podcast Missing Authorization vulnerability in Sonaar Music MP3 Audio Player for Music, Radio & Podcast by Sonaar.This issue affects MP3 Audio Player for Music, Radio & Podcast by Sonaar: from n/a through 4.10.1. | 7.5 |
2024-04-10 | CVE-2024-3382 | Paloaltonetworks | Memory Leak vulnerability in Paloaltonetworks Pan-Os A memory leak exists in Palo Alto Networks PAN-OS software that enables an attacker to send a burst of crafted packets through the firewall that eventually prevents the firewall from processing traffic. | 7.5 |
2024-04-10 | CVE-2024-3384 | Paloaltonetworks | Unspecified vulnerability in Paloaltonetworks Pan-Os A vulnerability in Palo Alto Networks PAN-OS software enables a remote attacker to reboot PAN-OS firewalls when receiving Windows New Technology LAN Manager (NTLM) packets from Windows servers. | 7.5 |
2024-04-10 | CVE-2024-3385 | Paloaltonetworks | NULL Pointer Dereference vulnerability in Paloaltonetworks Pan-Os A packet processing mechanism in Palo Alto Networks PAN-OS software enables a remote attacker to reboot hardware-based firewalls. | 7.5 |
2024-04-10 | CVE-2024-31873 | IBM | Unspecified vulnerability in IBM Security Verify Access IBM Security Verify Access Appliance 10.0.0 through 10.0.7 contains hard-coded credentials which it uses for its own inbound authentication that could be obtained by a malicious actor. | 7.5 |
2024-04-09 | CVE-2024-23662 | Fortinet | Unspecified vulnerability in Fortinet Fortios An exposure of sensitive information to an unauthorized actor in Fortinet FortiOS at least version at least 7.4.0 through 7.4.1 and 7.2.0 through 7.2.5 and 7.0.0 through 7.0.15 and 6.4.0 through 6.4.15 allows attacker to information disclosure via HTTP requests. | 7.5 |
2024-04-08 | CVE-2023-52386 | Huawei | Out-of-bounds Write vulnerability in Huawei Emui and Harmonyos Out-of-bounds write vulnerability in the RSMC module. Impact: Successful exploitation of this vulnerability will affect availability. | 7.5 |
2024-04-08 | CVE-2024-27895 | Huawei | Unspecified vulnerability in Huawei Harmonyos 4.0.0 Vulnerability of permission control in the window module. | 7.5 |
2024-04-08 | CVE-2023-52359 | Huawei | Unspecified vulnerability in Huawei Emui and Harmonyos Vulnerability of permission verification in some APIs in the ActivityTaskManagerService module. Impact: Successful exploitation of this vulnerability will affect availability. | 7.5 |
2024-04-08 | CVE-2023-52540 | Huawei | Unspecified vulnerability in Huawei Emui and Harmonyos Vulnerability of improper authentication in the Iaware module. Impact: Successful exploitation of this vulnerability will affect availability. | 7.5 |
2024-04-08 | CVE-2023-52546 | Huawei | Unspecified vulnerability in Huawei Emui and Harmonyos Vulnerability of package name verification being bypassed in the Calendar app. Impact: Successful exploitation of this vulnerability may affect service confidentiality. | 7.5 |
2024-04-11 | CVE-2024-3621 | Mayurik | Unspecified vulnerability in Mayurik Advocate Office Management System 1.0 A vulnerability was found in SourceCodester Kortex Lite Advocate Office Management System 1.0. | 7.2 |
2024-04-11 | CVE-2024-3618 | Mayurik | Unspecified vulnerability in Mayurik Advocate Office Management System 1.0 A vulnerability, which was classified as critical, was found in SourceCodester Kortex Lite Advocate Office Management System 1.0. | 7.2 |
2024-04-11 | CVE-2024-3619 | Mayurik | Unspecified vulnerability in Mayurik Advocate Office Management System 1.0 A vulnerability has been found in SourceCodester Kortex Lite Advocate Office Management System 1.0 and classified as critical. | 7.2 |
2024-04-11 | CVE-2024-3620 | Mayurik | Unspecified vulnerability in Mayurik Advocate Office Management System 1.0 A vulnerability was found in SourceCodester Kortex Lite Advocate Office Management System 1.0 and classified as critical. | 7.2 |
2024-04-11 | CVE-2024-3617 | Mayurik | Unspecified vulnerability in Mayurik Advocate Office Management System 1.0 A vulnerability, which was classified as critical, has been found in SourceCodester Kortex Lite Advocate Office Management System 1.0. | 7.2 |
2024-04-11 | CVE-2024-30916 | Eprosima | Unspecified vulnerability in Eprosima Fast DDS An issue was discovered in eProsima FastDDS v.2.14.0 and before, allows a local attacker to cause a denial of service (DoS) and obtain sensitive information via a crafted max_samples parameter in DurabilityService QoS component. | 7.1 |
2024-04-10 | CVE-2021-47191 | Linux | Out-of-bounds Read vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: scsi: scsi_debug: Fix out-of-bound read in resp_readcap16() The following warning was observed running syzkaller: [ 3813.830724] sg_write: data in/out 65466/242 bytes for SCSI command 0x9e-- guessing data in; [ 3813.830724] program syz-executor not setting count and/or reply_len properly [ 3813.836956] ================================================================== [ 3813.839465] BUG: KASAN: stack-out-of-bounds in sg_copy_buffer+0x157/0x1e0 [ 3813.841773] Read of size 4096 at addr ffff8883cf80f540 by task syz-executor/1549 [ 3813.846612] Call Trace: [ 3813.846995] dump_stack+0x108/0x15f [ 3813.847524] print_address_description+0xa5/0x372 [ 3813.848243] kasan_report.cold+0x236/0x2a8 [ 3813.849439] check_memory_region+0x240/0x270 [ 3813.850094] memcpy+0x30/0x80 [ 3813.850553] sg_copy_buffer+0x157/0x1e0 [ 3813.853032] sg_copy_from_buffer+0x13/0x20 [ 3813.853660] fill_from_dev_buffer+0x135/0x370 [ 3813.854329] resp_readcap16+0x1ac/0x280 [ 3813.856917] schedule_resp+0x41f/0x1630 [ 3813.858203] scsi_debug_queuecommand+0xb32/0x17e0 [ 3813.862699] scsi_dispatch_cmd+0x330/0x950 [ 3813.863329] scsi_request_fn+0xd8e/0x1710 [ 3813.863946] __blk_run_queue+0x10b/0x230 [ 3813.864544] blk_execute_rq_nowait+0x1d8/0x400 [ 3813.865220] sg_common_write.isra.0+0xe61/0x2420 [ 3813.871637] sg_write+0x6c8/0xef0 [ 3813.878853] __vfs_write+0xe4/0x800 [ 3813.883487] vfs_write+0x17b/0x530 [ 3813.884008] ksys_write+0x103/0x270 [ 3813.886268] __x64_sys_write+0x77/0xc0 [ 3813.886841] do_syscall_64+0x106/0x360 [ 3813.887415] entry_SYSCALL_64_after_hwframe+0x44/0xa9 This issue can be reproduced with the following syzkaller log: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') open_by_handle_at(r1, &(0x7f00000003c0)=ANY=[@ANYRESHEX], 0x602000) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x40782) write$binfmt_aout(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000deff000000000000000000000000000000000000000000000000000047f007af9e107a41ec395f1bded7be24277a1501ff6196a83366f4e6362bc0ff2b247f68a972989b094b2da4fb3607fcf611a22dd04310d28c75039d"], 0x126) In resp_readcap16() we get "int alloc_len" value -1104926854, and then pass the huge arr_len to fill_from_dev_buffer(), but arr is only 32 bytes. | 7.1 |
2024-04-09 | CVE-2024-30262 | Contao | Insufficient Session Expiration vulnerability in Contao Contao is an open source content management system. | 7.1 |
114 Medium Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2024-04-09 | CVE-2024-20665 | Microsoft | Unspecified vulnerability in Microsoft products BitLocker Security Feature Bypass Vulnerability | 6.7 |
2024-04-09 | CVE-2023-47540 | Fortinet | Unspecified vulnerability in Fortinet Fortisandbox An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSandbox version 4.4.0 through 4.4.2 and 4.2.0 through 4.2.6 and 4.0.0 through 4.0.5 and 3.2.0 through 3.2.4 and 3.0.5 through 3.0.7 may allows attacker to execute unauthorized code or commands via CLI. | 6.7 |
2024-04-09 | CVE-2023-47541 | Fortinet | Unspecified vulnerability in Fortinet Fortisandbox An improper limitation of a pathname to a restricted directory ('path traversal') in Fortinet FortiSandbox version 4.4.0 through 4.4.2 and 4.2.0 through 4.2.6 and 4.0.0 through 4.0.5 and 3.2.0 through 3.2.4 and 3.1.0 through 3.1.5 and 3.0.0 through 3.0.7 and 2.5.0 through 2.5.2 and 2.4.0 through 2.4.1 and 2.3.0 through 2.3.3 and 2.2.0 through 2.2.2 and 2.1.0 through 2.1.3 and 2.0.0 through 2.0.3 allows attacker to execute unauthorized code or commands via CLI. | 6.7 |
2024-04-09 | CVE-2023-47542 | Fortinet | Code Injection vulnerability in Fortinet Fortimanager A improper neutralization of special elements used in a template engine [CWE-1336] in FortiManager versions 7.4.1 and below, versions 7.2.4 and below, and 7.0.10 and below allows attacker to execute unauthorized code or commands via specially crafted templates. | 6.7 |
2024-04-09 | CVE-2023-48784 | Fortinet | Unspecified vulnerability in Fortinet Fortios A use of externally-controlled format string vulnerability [CWE-134] in FortiOS version 7.4.1 and below, version 7.2.7 and below, 7.0 all versions, 6.4 all versions command line interface may allow a local privileged attacker with super-admin profile and CLI access to execute arbitrary code or commands via specially crafted requests. | 6.7 |
2024-04-09 | CVE-2024-26221 | Microsoft | Information Exposure Through Discrepancy vulnerability in Microsoft products Windows DNS Server Remote Code Execution Vulnerability | 6.6 |
2024-04-09 | CVE-2024-26222 | Microsoft | Unspecified vulnerability in Microsoft products Windows DNS Server Remote Code Execution Vulnerability | 6.6 |
2024-04-09 | CVE-2024-26223 | Microsoft | Unspecified vulnerability in Microsoft products Windows DNS Server Remote Code Execution Vulnerability | 6.6 |
2024-04-09 | CVE-2024-26224 | Microsoft | Unspecified vulnerability in Microsoft products Windows DNS Server Remote Code Execution Vulnerability | 6.6 |
2024-04-09 | CVE-2024-26227 | Microsoft | Unspecified vulnerability in Microsoft products Windows DNS Server Remote Code Execution Vulnerability | 6.6 |
2024-04-09 | CVE-2024-26231 | Microsoft | Unspecified vulnerability in Microsoft products Windows DNS Server Remote Code Execution Vulnerability | 6.6 |
2024-04-09 | CVE-2024-26233 | Microsoft | Unspecified vulnerability in Microsoft products Windows DNS Server Remote Code Execution Vulnerability | 6.6 |
2024-04-12 | CVE-2024-0157 | Dell | Session Fixation vulnerability in Dell products Dell Storage Resource Manager, 4.9.0.0 and below, contain(s) a Session Fixation Vulnerability in SRM Windows Host Agent. | 6.5 |
2024-04-12 | CVE-2024-21590 | Juniper | Unspecified vulnerability in Juniper Junos OS Evolved An Improper Input Validation vulnerability in Juniper Tunnel Driver (jtd) and ICMP module of Juniper Networks Junos OS Evolved allows an unauthenticated attacker within the MPLS administrative domain to send specifically crafted packets to the Routing Engine (RE) to cause a Denial of Service (DoS). When specifically crafted transit MPLS IPv4 packets are received by the Packet Forwarding Engine (PFE), these packets are internally forwarded to the RE. Continued receipt of these packets may create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks Junos OS: * All versions before 21.2R3-S8-EVO; * from 21.4-EVO before 21.4R3-S6-EVO; * from 22.2-EVO before 22.2R3-S4-EVO; * from 22.3-EVO before 22.3R3-S3-EVO; * from 22.4-EVO before 22.4R3-EVO; * from 23.2-EVO before 23.2R2-EVO. * from 23.4-EVO before 23.4R1-S1-EVO. | 6.5 |
2024-04-12 | CVE-2023-6489 | Gitlab | Unspecified vulnerability in Gitlab A denial of service vulnerability was identified in GitLab CE/EE, versions 16.7.7 prior to 16.8.6, 16.9 prior to 16.9.4 and 16.10 prior to 16.10.2 which allows an attacker to spike the GitLab instance resources usage resulting in service degradation via chat integration feature. | 6.5 |
2024-04-12 | CVE-2023-6678 | Gitlab | Unspecified vulnerability in Gitlab An issue has been discovered in GitLab EE affecting all versions before 16.8.6, all versions starting from 16.9 before 16.9.4, all versions starting from 16.10 before 16.10.2. | 6.5 |
2024-04-10 | CVE-2024-3515 | Google Fedoraproject | Use After Free vulnerability in multiple products Use after free in Dawn in Google Chrome prior to 123.0.6312.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 6.5 |
2024-04-10 | CVE-2024-3516 | Google Fedoraproject | Out-of-bounds Write vulnerability in multiple products Heap buffer overflow in ANGLE in Google Chrome prior to 123.0.6312.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 6.5 |
2024-04-10 | CVE-2024-1625 | Lunary | Authorization Bypass Through User-Controlled Key vulnerability in Lunary 0.3.0 An Insecure Direct Object Reference (IDOR) vulnerability exists in the lunary-ai/lunary application version 0.3.0, allowing unauthorized deletion of any organization's project. | 6.5 |
2024-04-10 | CVE-2024-31278 | Leap13 | Insecure Storage of Sensitive Information vulnerability in Leap13 Premium Addons for Elementor Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Leap13 Premium Addons for Elementor.This issue affects Premium Addons for Elementor: from n/a through 4.10.22. | 6.5 |
2024-04-09 | CVE-2024-1974 | Hasthemes | Path Traversal vulnerability in Hasthemes HT Mega The HT Mega – Absolute Addons For Elementor plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.4.6 via the render function. | 6.5 |
2024-04-09 | CVE-2024-2341 | Nsquared | SQL Injection vulnerability in Nsquared Simply Schedule Appointments The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to SQL Injection via the keys parameter in all versions up to, and including, 1.6.7.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. | 6.5 |
2024-04-09 | CVE-2024-28235 | Contao | Unspecified vulnerability in Contao Contao is an open source content management system. | 6.5 |
2024-04-09 | CVE-2024-31487 | Fortinet | Unspecified vulnerability in Fortinet Fortisandbox A improper limitation of a pathname to a restricted directory ('path traversal') in Fortinet FortiSandbox version 4.4.0 through 4.4.4 and 4.2.0 through 4.2.6 and 4.0.0 through 4.0.5 and 3.2.0 through 3.2.4 and 3.1.0 through 3.1.5 and 3.0.0 through 3.0.7 and 2.5.0 through 2.5.2 and 2.4.0 through 2.4.1 may allows attacker to information disclosure via crafted http requests. | 6.5 |
2024-04-09 | CVE-2024-3167 | Oceanwp | Cross-site Scripting vulnerability in Oceanwp Ocean Extra The Ocean Extra plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘twitter_username’ parameter in versions up to, and including, 2.2.6 due to insufficient input sanitization and output escaping. | 6.4 |
2024-04-12 | CVE-2024-22359 | IBM | Unspecified vulnerability in IBM Urbancode Deploy IBM UrbanCode Deploy (UCD) 7.0 through 7.0.5.20, 7.1 through 7.1.2.16, 7.2 through 7.2.3.9, 7.3 through 7.3.2.4 and IBM DevOps Deploy 8.0 through 8.0.0.1 are vulnerable to cross-site scripting. | 6.1 |
2024-04-09 | CVE-2024-1412 | Caseproof | Cross-site Scripting vulnerability in Caseproof Memberpress The Memberpress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘message’ and 'error' parameters in all versions up to, and including, 1.11.26 due to insufficient input sanitization and output escaping. | 6.1 |
2024-04-09 | CVE-2024-1794 | Incsub | Cross-site Scripting vulnerability in Incsub Forminator The Forminator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an uploaded file (e.g. | 6.1 |
2024-04-08 | CVE-2023-52345 | Unspecified vulnerability in Google Android 12.0/13.0/14.0 In modem driver, there is a possible system crash due to improper input validation. | 6.0 | |
2024-04-10 | CVE-2024-29902 | Sigstore | Allocation of Resources Without Limits or Throttling vulnerability in Sigstore Cosign Cosign provides code signing and transparency for containers and binaries. | 5.9 |
2024-04-13 | CVE-2024-26817 | Linux Debian | Integer Overflow or Wraparound vulnerability in multiple products In the Linux kernel, the following vulnerability has been resolved: amdkfd: use calloc instead of kzalloc to avoid integer overflow This uses calloc instead of doing the multiplication which might overflow. | 5.5 |
2024-04-11 | CVE-2024-20794 | Adobe | NULL Pointer Dereference vulnerability in Adobe Animate Animate versions 23.0.4, 24.0.1 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to an application denial-of-service. | 5.5 |
2024-04-11 | CVE-2024-20796 | Adobe | Out-of-bounds Read vulnerability in Adobe Animate Animate versions 23.0.4, 24.0.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. | 5.5 |
2024-04-11 | CVE-2024-20798 | Adobe | Out-of-bounds Read vulnerability in Adobe Illustrator Illustrator versions 28.3, 27.9.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. | 5.5 |
2024-04-10 | CVE-2021-47181 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: usb: musb: tusb6010: check return value after calling platform_get_resource() It will cause null-ptr-deref if platform_get_resource() returns NULL, we need check the return value. | 5.5 |
2024-04-10 | CVE-2021-47183 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix link down processing to address NULL pointer dereference If an FC link down transition while PLOGIs are outstanding to fabric well known addresses, outstanding ABTS requests may result in a NULL pointer dereference. | 5.5 |
2024-04-10 | CVE-2021-47184 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: i40e: Fix NULL ptr dereference on VSI filter sync Remove the reason of null pointer dereference in sync VSI filters. Added new I40E_VSI_RELEASING flag to signalize deleting and releasing of VSI resources to sync this thread with sync filters subtask. Without this patch it is possible to start update the VSI filter list after VSI is removed, that's causing a kernel oops. | 5.5 |
2024-04-10 | CVE-2021-47190 | Linux | Memory Leak vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: perf bpf: Avoid memory leak from perf_env__insert_btf() perf_env__insert_btf() doesn't insert if a duplicate BTF id is encountered and this causes a memory leak. | 5.5 |
2024-04-10 | CVE-2021-47193 | Linux | Memory Leak vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: scsi: pm80xx: Fix memory leak during rmmod Driver failed to release all memory allocated. | 5.5 |
2024-04-10 | CVE-2021-47195 | Linux | Use After Free vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: spi: fix use-after-free of the add_lock mutex Commit 6098475d4cb4 ("spi: Fix deadlock when adding SPI controllers on SPI buses") introduced a per-controller mutex. | 5.5 |
2024-04-10 | CVE-2021-47199 | Linux | Memory Leak vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: CT, Fix multiple allocations and memleak of mod acts CT clear action offload adds additional mod hdr actions to the flow's original mod actions in order to clear the registers which hold ct_state. When such flow also includes encap action, a neigh update event can cause the driver to unoffload the flow and then reoffload it. Each time this happens, the ct clear handling adds that same set of mod hdr actions to reset ct_state until the max of mod hdr actions is reached. Also the driver never releases the allocated mod hdr actions and causing a memleak. Fix above two issues by moving CT clear mod acts allocation into the parsing actions phase and only use it when offloading the rule. The release of mod acts will be done in the normal flow_put(). backtrace: [<000000007316e2f3>] krealloc+0x83/0xd0 [<00000000ef157de1>] mlx5e_mod_hdr_alloc+0x147/0x300 [mlx5_core] [<00000000970ce4ae>] mlx5e_tc_match_to_reg_set_and_get_id+0xd7/0x240 [mlx5_core] [<0000000067c5fa17>] mlx5e_tc_match_to_reg_set+0xa/0x20 [mlx5_core] [<00000000d032eb98>] mlx5_tc_ct_entry_set_registers.isra.0+0x36/0xc0 [mlx5_core] [<00000000fd23b869>] mlx5_tc_ct_flow_offload+0x272/0x1f10 [mlx5_core] [<000000004fc24acc>] mlx5e_tc_offload_fdb_rules.part.0+0x150/0x620 [mlx5_core] [<00000000dc741c17>] mlx5e_tc_encap_flows_add+0x489/0x690 [mlx5_core] [<00000000e92e49d7>] mlx5e_rep_update_flows+0x6e4/0x9b0 [mlx5_core] [<00000000f60f5602>] mlx5e_rep_neigh_update+0x39a/0x5d0 [mlx5_core] | 5.5 |
2024-04-10 | CVE-2021-47202 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: thermal: Fix NULL pointer dereferences in of_thermal_ functions of_parse_thermal_zones() parses the thermal-zones node and registers a thermal_zone device for each subnode. | 5.5 |
2024-04-10 | CVE-2021-47206 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: usb: host: ohci-tmio: check return value after calling platform_get_resource() It will cause null-ptr-deref if platform_get_resource() returns NULL, we need check the return value. | 5.5 |
2024-04-10 | CVE-2021-47207 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: ALSA: gus: fix null pointer dereference on pointer block The pointer block return from snd_gf1_dma_next_block could be null, so there is a potential null pointer dereference issue. Fix this by adding a null check before dereference. | 5.5 |
2024-04-10 | CVE-2021-47211 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: fix null pointer dereference on pointer cs_desc The pointer cs_desc return from snd_usb_find_clock_source could be null, so there is a potential null pointer dereference issue. Fix this by adding a null check before dereference. | 5.5 |
2024-04-10 | CVE-2021-47217 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: x86/hyperv: Fix NULL deref in set_hv_tscchange_cb() if Hyper-V setup fails Check for a valid hv_vp_index array prior to derefencing hv_vp_index when setting Hyper-V's TSC change callback. | 5.5 |
2024-04-10 | CVE-2021-47218 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: selinux: fix NULL-pointer dereference when hashtab allocation fails When the hash table slot array allocation fails in hashtab_init(), h->size is left initialized with a non-zero value, but the h->htable pointer is NULL. | 5.5 |
2024-04-10 | CVE-2024-31874 | IBM | Use of Uninitialized Resource vulnerability in IBM Security Verify Access IBM Security Verify Access Appliance 10.0.0 through 10.0.7 uses uninitialized variables when deploying that could allow a local user to cause a denial of service. | 5.5 |
2024-04-10 | CVE-2024-3567 | Qemu Redhat | A flaw was found in QEMU. | 5.5 |
2024-04-10 | CVE-2024-20766 | Adobe | Out-of-bounds Read vulnerability in Adobe Indesign InDesign Desktop versions 18.5.1, 19.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. | 5.5 |
2024-04-10 | CVE-2024-0159 | Dell | Unspecified vulnerability in Dell Alienware Command Center Dell Alienware Command Center, versions 5.5.52.0 and prior, contain improper access control vulnerability, leading to Denial of Service on local system. | 5.5 |
2024-04-09 | CVE-2024-29063 | Microsoft | Unspecified vulnerability in Microsoft Azure AI Search Azure AI Search Information Disclosure Vulnerability | 5.5 |
2024-04-09 | CVE-2024-29064 | Microsoft | Unspecified vulnerability in Microsoft products Windows Hyper-V Denial of Service Vulnerability | 5.5 |
2024-04-08 | CVE-2023-52352 | Missing Authorization vulnerability in Google Android 13.0/14.0 In Network Adapter Service, there is a possible missing permission check. | 5.5 | |
2024-04-12 | CVE-2024-3695 | Oretnom23 | Unspecified vulnerability in Oretnom23 Computer Laboratory Management System 1.0 A vulnerability has been found in SourceCodester Computer Laboratory Management System 1.0 and classified as problematic. | 5.4 |
2024-04-12 | CVE-2024-2279 | Gitlab | Cross-site Scripting vulnerability in Gitlab An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.7 to 16.8.6 all versions starting from 16.9 before 16.9.4, all versions starting from 16.10 before 16.10.2. | 5.4 |
2024-04-12 | CVE-2024-3092 | Gitlab | Cross-site Scripting vulnerability in Gitlab An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.9 before 16.9.4, all versions starting from 16.10 before 16.10.2. | 5.4 |
2024-04-11 | CVE-2024-3343 | Themeisle | Cross-site Scripting vulnerability in Themeisle Otter Blocks The Otter Blocks – Gutenberg Blocks, Page Builder for Gutenberg Editor & FSE plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's block attributes in all versions up to, and including, 2.6.8 due to insufficient input sanitization and output escaping on user supplied attributes. | 5.4 |
2024-04-11 | CVE-2024-3344 | Themeisle | Cross-site Scripting vulnerability in Themeisle Otter Blocks The Otter Blocks – Gutenberg Blocks, Page Builder for Gutenberg Editor & FSE plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG file upload in all versions up to, and including, 2.6.8 due to insufficient input sanitization and output escaping. | 5.4 |
2024-04-10 | CVE-2024-31985 | Xwiki | Cross-Site Request Forgery (CSRF) vulnerability in Xwiki XWiki Platform is a generic wiki platform. | 5.4 |
2024-04-10 | CVE-2024-2539 | Livemeshelementor | Cross-site Scripting vulnerability in Livemeshelementor Addons for Elementor The Elementor Addons by Livemesh plugin for WordPress is vulnerable to Stored Cross-Site Scripting via widget '_id' attributes in all versions up to, and including, 8.3.6 due to insufficient input sanitization and output escaping on user supplied attributes. | 5.4 |
2024-04-10 | CVE-2024-2655 | Livemeshelementor | Cross-site Scripting vulnerability in Livemeshelementor Addons for Elementor The Elementor Addons by Livemesh plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Post widgets in all versions up to, and including, 8.3.5 due to insufficient input sanitization and output escaping on author display names. | 5.4 |
2024-04-10 | CVE-2024-3210 | Properfraction | Cross-site Scripting vulnerability in Properfraction Profilepress The Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'reg-single-checkbox' shortcode in all versions up to, and including, 4.15.5 due to insufficient input sanitization and output escaping on user supplied attributes. | 5.4 |
2024-04-10 | CVE-2024-1042 | Wpmilitary | Missing Authorization vulnerability in Wpmilitary WP Radio The WP Radio – Worldwide Online Radio Stations Directory for WordPress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on multiple AJAX functions in all versions up to, and including, 3.1.9. | 5.4 |
2024-04-10 | CVE-2024-2734 | Bold Themes | Cross-site Scripting vulnerability in Bold-Themes Bold Page Builder The Bold Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's AI features all versions up to, and including, 4.8.8 due to insufficient input sanitization and output escaping on user supplied attributes. | 5.4 |
2024-04-10 | CVE-2024-2735 | Bold Themes | Cross-site Scripting vulnerability in Bold-Themes Bold Page Builder The Bold Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Price List' element in all versions up to, and including, 4.8.8 due to insufficient input sanitization and output escaping on user supplied attributes. | 5.4 |
2024-04-10 | CVE-2024-2736 | Bold Themes | Cross-site Scripting vulnerability in Bold-Themes Bold Page Builder The Bold Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via HTML Tags in all versions up to, and including, 4.8.8 due to insufficient input sanitization and output escaping on user supplied attributes. | 5.4 |
2024-04-10 | CVE-2024-2733 | Bold Themes | Cross-site Scripting vulnerability in Bold-Themes Bold Page Builder The Bold Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's "Separator" element in all versions up to, and including, 4.8.8 due to insufficient input sanitization and output escaping on user supplied attributes. | 5.4 |
2024-04-09 | CVE-2024-0376 | Leap13 | Cross-site Scripting vulnerability in Leap13 Premium Addons for Elementor The Premium Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Wrapper Link Widget in all versions up to, and including, 4.10.16 due to insufficient input sanitization and output escaping on user supplied URLs. | 5.4 |
2024-04-09 | CVE-2024-1289 | Thimpress | Authorization Bypass Through User-Controlled Key vulnerability in Thimpress Learnpress The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.2.6.3 due to missing validation on a user controlled key when looking up order information. | 5.4 |
2024-04-09 | CVE-2024-1458 | Livemeshelementor | Cross-site Scripting vulnerability in Livemeshelementor Addons for Elementor The Elementor Addons by Livemesh plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘text_alignment’ attribute of the Animated Text widget in all versions up to, and including, 8.3.4 due to insufficient input sanitization and output escaping. | 5.4 |
2024-04-09 | CVE-2024-1461 | Livemeshelementor | Cross-site Scripting vulnerability in Livemeshelementor Addons for Elementor The Elementor Addons by Livemesh plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘style’ attribute of the Team Members widget in all versions up to, and including, 8.3.4 due to insufficient input sanitization and output escaping. | 5.4 |
2024-04-09 | CVE-2024-1464 | Livemeshelementor | Cross-site Scripting vulnerability in Livemeshelementor Addons for Elementor The Elementor Addons by Livemesh plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘style’ attribute of the Posts Slider widget in all versions up to, and including, 8.3.4 due to insufficient input sanitization and output escaping. | 5.4 |
2024-04-09 | CVE-2024-1465 | Livemeshelementor | Cross-site Scripting vulnerability in Livemeshelementor Addons for Elementor The Elementor Addons by Livemesh plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘carousel_skin’ attribute of the Posts Carousel widget in all versions up to, and including, 8.3.4 due to insufficient input sanitization and output escaping. | 5.4 |
2024-04-09 | CVE-2024-1466 | Livemeshelementor | Cross-site Scripting vulnerability in Livemeshelementor Addons for Elementor The Elementor Addons by Livemesh plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘slider_style’ attribute of the Posts Multislider widget in all versions up to, and including, 8.3.4 due to insufficient input sanitization and output escaping. | 5.4 |
2024-04-09 | CVE-2024-1498 | Leevio | Cross-site Scripting vulnerability in Leevio Happy Addons for Elementor The Happy Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Photo Stack Widget in all versions up to, and including, 3.10.3 due to insufficient input sanitization and output escaping on user supplied attributes. | 5.4 |
2024-04-09 | CVE-2024-1948 | The Getwid – Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the block content in all versions up to, and including, 2.0.5 due to insufficient input sanitization and output escaping. | 5.4 | |
2024-04-09 | CVE-2024-2117 | Elementor | Cross-site Scripting vulnerability in Elementor Website Builder The Elementor Website Builder – More than Just a Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Path Widget in all versions up to, and including, 3.20.2 due to insufficient output escaping on user supplied attributes. | 5.4 |
2024-04-09 | CVE-2024-2138 | Crocoblock | Cross-site Scripting vulnerability in Crocoblock Jetwidgets for Elementor The JetWidgets For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Animated Box widget in all versions up to, and including, 1.0.15 due to insufficient input sanitization and output escaping. | 5.4 |
2024-04-09 | CVE-2024-2181 | Wpzoom | Cross-site Scripting vulnerability in Wpzoom Beaver Builder Addons The Beaver Builder Addons by WPZOOM plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Button widget in all versions up to, and including, 1.3.4 due to insufficient input sanitization and output escaping. | 5.4 |
2024-04-09 | CVE-2024-2183 | Wpzoom | Cross-site Scripting vulnerability in Wpzoom Beaver Builder Addons The Beaver Builder Addons by WPZOOM plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Heading widget in all versions up to, and including, 1.3.4 due to insufficient input sanitization and output escaping. | 5.4 |
2024-04-09 | CVE-2024-2185 | Wpzoom | Cross-site Scripting vulnerability in Wpzoom Beaver Builder Addons The Beaver Builder Addons by WPZOOM plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Image Box widget in all versions up to, and including, 1.3.4 due to insufficient input sanitization and output escaping. | 5.4 |
2024-04-09 | CVE-2024-2186 | Wpzoom | Cross-site Scripting vulnerability in Wpzoom Beaver Builder Addons The Beaver Builder Addons by WPZOOM plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Team Members widget in all versions up to, and including, 1.3.4 due to insufficient input sanitization and output escaping. | 5.4 |
2024-04-09 | CVE-2024-2187 | Wpzoom | Cross-site Scripting vulnerability in Wpzoom Beaver Builder Addons The Beaver Builder Addons by WPZOOM plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Testimonials widget in all versions up to, and including, 1.3.4 due to insufficient input sanitization and output escaping. | 5.4 |
2024-04-09 | CVE-2024-2226 | Themeisle | Cross-site Scripting vulnerability in Themeisle Otter Blocks The Otter Blocks – Gutenberg Blocks, Page Builder for Gutenberg Editor & FSE plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the id parameter in the google-map block in all versions up to, and including, 2.6.4 due to insufficient input sanitization and output escaping. | 5.4 |
2024-04-09 | CVE-2024-2305 | Brainstormforce | Cross-site Scripting vulnerability in Brainstormforce Cards for Beaver Builder The Cards for Beaver Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the BootstrapCard link in all versions up to, and including, 1.1.2 due to insufficient input sanitization and output escaping on user supplied attributes. | 5.4 |
2024-04-09 | CVE-2024-2492 | Ideabox | Cross-site Scripting vulnerability in Ideabox Powerpack Addons for Elementor The PowerPack Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Twitter Tweet widget in all versions up to, and including, 2.7.18 due to insufficient input sanitization and output escaping. | 5.4 |
2024-04-09 | CVE-2024-2783 | Gamipress | Cross-site Scripting vulnerability in Gamipress The GamiPress – The #1 gamification plugin to reward points, achievements, badges & ranks in WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 6.9.0 due to insufficient input sanitization and output escaping on user supplied attributes. | 5.4 |
2024-04-09 | CVE-2024-2787 | Leevio | Cross-site Scripting vulnerability in Leevio Happy Addons for Elementor The Happy Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Page Title HTML Tag in all versions up to, and including, 3.10.4 due to insufficient input sanitization and output escaping on user supplied attributes. | 5.4 |
2024-04-09 | CVE-2024-2788 | Leevio | Cross-site Scripting vulnerability in Leevio Happy Addons for Elementor The Happy Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Post Title HTML Tag in all versions up to, and including, 3.10.4 due to insufficient input sanitization and output escaping on user supplied attributes. | 5.4 |
2024-04-09 | CVE-2024-2789 | Leevio | Cross-site Scripting vulnerability in Leevio Happy Addons for Elementor The Happy Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Calendy widget in all versions up to, and including, 3.10.4 due to insufficient input sanitization and output escaping on user supplied attributes. | 5.4 |
2024-04-09 | CVE-2024-2792 | Webtechstreet | Cross-site Scripting vulnerability in Webtechstreet Elementor Addon Elements The Elementor Addon Elements plugin for WordPress is vulnerable to Stored Cross-Site Scripting via widgets in all versions up to, and including, 1.13.2 due to insufficient input sanitization and output escaping on user supplied attributes. | 5.4 |
2024-04-09 | CVE-2024-3053 | Incsub | Cross-site Scripting vulnerability in Incsub Forminator The Forminator – Contact Form, Payment Form & Custom Form Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘id’ forminator_form shortcode attribute in versions up to, and including, 1.29.2 due to insufficient input sanitization and output escaping. | 5.4 |
2024-04-09 | CVE-2024-3244 | Wpdeveloper | Cross-site Scripting vulnerability in Wpdeveloper Embedpress The EmbedPress – Embed PDF, Google Docs, Vimeo, Wistia, Embed YouTube Videos, Audios, Maps & Embed Any Documents in Gutenberg & Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'embedpress_calendar' shortcode in all versions up to, and including, 3.9.14 due to insufficient input sanitization and output escaping on user supplied attributes. | 5.4 |
2024-04-09 | CVE-2024-3266 | Bold Themes | Cross-site Scripting vulnerability in Bold-Themes Bold Page Builder The Bold Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the URL attribute of widgets in all versions up to, and including, 4.8.8 due to insufficient input sanitization and output escaping on user supplied attributes. | 5.4 |
2024-04-09 | CVE-2024-3267 | Bold Themes | Cross-site Scripting vulnerability in Bold-Themes Bold Page Builder The Bold Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's bt_bb_price_list shortcode in all versions up to, and including, 4.8.8 due to insufficient input sanitization and output escaping on user supplied attributes. | 5.4 |
2024-04-09 | CVE-2024-28190 | Contao | Cross-site Scripting vulnerability in Contao Contao is an open source content management system. | 5.4 |
2024-04-09 | CVE-2024-28191 | Contao | Injection vulnerability in Contao Contao is an open source content management system. | 5.4 |
2024-04-08 | CVE-2024-3463 | Oretnom23 | Unspecified vulnerability in Oretnom23 Laundry Shop Management System 1.0 A vulnerability has been found in SourceCodester Laundry Management System 1.0 and classified as problematic. | 5.4 |
2024-04-10 | CVE-2024-3386 | Paloaltonetworks | Interpretation Conflict vulnerability in Paloaltonetworks Pan-Os An incorrect string comparison vulnerability in Palo Alto Networks PAN-OS software prevents Predefined Decryption Exclusions from functioning as intended. | 5.3 |
2024-04-10 | CVE-2024-31302 | Codepeople | Unspecified vulnerability in Codepeople Contact Form Email Exposure of Sensitive Information to an Unauthorized Actor vulnerability in CodePeople Contact Form Email.This issue affects Contact Form Email: from n/a through 1.3.44. | 5.3 |
2024-04-10 | CVE-2024-31353 | Tribulant | Unspecified vulnerability in Tribulant Slideshow Gallery Insertion of Sensitive Information into Log File vulnerability in Tribulant Slideshow Gallery.This issue affects Slideshow Gallery: from n/a through 1.7.8. | 5.3 |
2024-04-09 | CVE-2024-1352 | Radiustheme | Missing Authorization vulnerability in Radiustheme Classified Listing The Classified Listing – Classified ads & Business Directory Plugin plugin for WordPress is vulnerable to unauthorized access & modification of data due to a missing capability check on the rtcl_import_location() rtcl_import_category() functions in all versions up to, and including, 3.0.4. | 5.3 |
2024-04-09 | CVE-2024-3097 | Imagely | Missing Authorization vulnerability in Imagely Nextgen Gallery The WordPress Gallery Plugin – NextGEN Gallery plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the get_item function in versions up to, and including, 3.59. | 5.3 |
2024-04-10 | CVE-2024-3388 | Paloaltonetworks | Incorrect Authorization vulnerability in Paloaltonetworks Pan-Os A vulnerability in the GlobalProtect Gateway in Palo Alto Networks PAN-OS software enables an authenticated attacker to impersonate another user and send network packets to internal assets. | 5.0 |
2024-04-10 | CVE-2024-31464 | Xwiki | Use of Password Hash With Insufficient Computational Effort vulnerability in Xwiki XWiki Platform is a generic wiki platform. | 4.9 |
2024-04-09 | CVE-2024-1463 | Thimpress | Cross-site Scripting vulnerability in Thimpress Learnpress The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Course, Lesson, and Quiz title and content in all versions up to, and including, 4.2.6.3 due to insufficient input sanitization and output escaping. | 4.8 |
2024-04-09 | CVE-2024-28234 | Contao | Unspecified vulnerability in Contao Contao is an open source content management system. | 4.7 |
2024-04-12 | CVE-2024-22334 | IBM | Unspecified vulnerability in IBM Urbancode Deploy IBM UrbanCode Deploy (UCD) 7.0 through 7.0.5.20, 7.1 through 7.1.2.16, 7.2 through 7.2.3.9, 7.3 through 7.3.2.4 and IBM DevOps Deploy 8.0 through 8.0.0.1 could be vulnerable to incomplete revocation of permissions when deleting a custom security resource type. | 4.4 |
2024-04-10 | CVE-2024-22448 | Dell | Unspecified vulnerability in Dell products Dell BIOS contains an Out-of-Bounds Write vulnerability. | 4.4 |
2024-04-08 | CVE-2023-52349 | Out-of-bounds Write vulnerability in Google Android 12.0/13.0/14.0 In ril service, there is a possible out of bounds write due to a missing bounds check. | 4.4 | |
2024-04-08 | CVE-2023-52350 | Out-of-bounds Write vulnerability in Google Android 12.0/13.0/14.0 In ril service, there is a possible out of bounds write due to a missing bounds check. | 4.4 | |
2024-04-08 | CVE-2023-52536 | Out-of-bounds Read vulnerability in Google Android 12.0/13.0/14.0 In faceid service, there is a possible out of bounds read due to a missing bounds check. | 4.4 | |
2024-04-12 | CVE-2024-22339 | IBM | Unspecified vulnerability in IBM Urbancode Deploy IBM UrbanCode Deploy (UCD) 7.0 through 7.0.5.20, 7.1 through 7.1.2.16, 7.2 through 7.2.3.9, 7.3 through 7.3.2.4 and IBM DevOps Deploy 8.0 through 8.0.0.1 is vulnerable to a sensitive information due to insufficient obfuscation of sensitive values from some log files. | 4.3 |
2 Low Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2024-04-09 | CVE-2024-26217 | Microsoft | Unspecified vulnerability in Microsoft products Windows Remote Access Connection Manager Information Disclosure Vulnerability | 3.3 |
2024-04-09 | CVE-2024-26251 | Microsoft | Unspecified vulnerability in Microsoft Sharepoint Server 2016/2019 Microsoft SharePoint Server Spoofing Vulnerability | 3.1 |