Weekly Vulnerabilities Reports > May 6 to 12, 2024
Overview
72 new vulnerabilities reported during this period, including 5 critical vulnerabilities and 36 high severity vulnerabilities. This weekly summary report vulnerabilities in 270 products from 25 vendors including Google, Qualcomm, Dedecms, Openatom, and F5. Vulnerabilities are notably categorized as "Use After Free", "Out-of-bounds Write", "Classic Buffer Overflow", "SQL Injection", and "Allocation of Resources Without Limits or Throttling".
- 34 reported vulnerabilities are remotely exploitables.
- 8 reported vulnerabilities are related to weaknesses in OWASP Top Ten.
- 27 reported vulnerabilities are exploitable by an anonymous user.
- Google has the most reported vulnerabilities, with 20 reported vulnerabilities.
- F5 has the most reported critical vulnerabilities, with 2 reported vulnerabilities.
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
EXPLOITABLE
EXPLOITABLE
AVAILABLE
ANONYMOUSLY
WEB APPLICATION
Vulnerability Details
The following table list reported vulnerabilities for the period covered by this report:
5 Critical Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2024-05-08 | CVE-2024-21793 | F5 | SQL Injection vulnerability in F5 Big-Ip Next Central Manager 20.1.0 An OData injection vulnerability exists in the BIG-IP Next Central Manager API (URI). Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | 9.8 |
2024-05-08 | CVE-2024-26026 | F5 | SQL Injection vulnerability in F5 Big-Ip Next Central Manager 20.1.0 An SQL injection vulnerability exists in the BIG-IP Next Central Manager API (URI). Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated | 9.8 |
2024-05-08 | CVE-2024-32113 | Apache | Unspecified vulnerability in Apache Ofbiz Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Apache OFBiz.This issue affects Apache OFBiz: before 18.12.13. Users are recommended to upgrade to version 18.12.13, which fixes the issue. | 9.8 |
2024-05-06 | CVE-2024-21480 | Qualcomm | Classic Buffer Overflow vulnerability in Qualcomm products Memory corruption while playing audio file having large-sized input buffer. | 9.8 |
2024-05-07 | CVE-2024-4558 | Google Fedoraproject Apple | Use After Free vulnerability in multiple products Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 9.6 |
36 High Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2024-05-08 | CVE-2024-24833 | Leevio | Unspecified vulnerability in Leevio Happy Addons for Elementor Missing Authorization vulnerability in Leevio Happy Addons for Elementor.This issue affects Happy Addons for Elementor: from n/a through 3.10.1. | 8.8 |
2024-05-06 | CVE-2024-33912 | Kodezen | Unspecified vulnerability in Kodezen Academy LMS Missing Authorization vulnerability in Academy LMS.This issue affects Academy LMS: from n/a through 1.9.16. | 8.8 |
2024-05-07 | CVE-2024-29889 | Glpi Project | SQL Injection vulnerability in Glpi-Project Glpi GLPI is a Free Asset and IT Management Software package. | 8.1 |
2024-05-08 | CVE-2024-33612 | F5 | Improper Certificate Validation vulnerability in F5 Big-Ip Next Central Manager 20.1.0 An improper certificate validation vulnerability exists in BIG-IP Next Central Manager and may allow an attacker to impersonate an Instance Provider system. | 8.0 |
2024-05-07 | CVE-2024-0024 | Unspecified vulnerability in Google Android In multiple methods of UserManagerService.java, there is a possible failure to persist or enforce user restrictions due to improper input validation. | 7.8 | |
2024-05-07 | CVE-2024-0025 | Unspecified vulnerability in Google Android In sendIntentSender of ActivityManagerService.java, there is a possible background activity launch due to a logic error. | 7.8 | |
2024-05-07 | CVE-2024-0042 | Improper Certificate Validation vulnerability in Google Android In TBD of TBD, there is a possible confusion of OEM and DRM certificates due to improperly used crypto. | 7.8 | |
2024-05-07 | CVE-2024-0043 | Unspecified vulnerability in Google Android In multiple locations, there is a possible notification listener grant to an app running in the work profile due to a logic error in the code. | 7.8 | |
2024-05-07 | CVE-2024-23704 | Missing Authorization vulnerability in Google Android 13.0/14.0 In onCreate of WifiDialogActivity.java, there is a possible way to bypass the DISALLOW_ADD_WIFI_CONFIG restriction due to a missing permission check. | 7.8 | |
2024-05-07 | CVE-2024-23705 | Unspecified vulnerability in Google Android In multiple locations, there is a possible failure to persist or enforce user restrictions due to improper input validation. | 7.8 | |
2024-05-07 | CVE-2024-23706 | Unspecified vulnerability in Google Android 14.0 In multiple locations, there is a possible bypass of health data permissions due to an improper input validation. | 7.8 | |
2024-05-07 | CVE-2024-23707 | Unspecified vulnerability in Google Android 14.0 In multiple locations, there is a possible permissions bypass due to improper input validation. | 7.8 | |
2024-05-07 | CVE-2024-23708 | Unspecified vulnerability in Google Android In multiple functions of NotificationManagerService.java, there is a possible way to not show a toast message when a clipboard message has been accessed. | 7.8 | |
2024-05-07 | CVE-2024-23710 | Unspecified vulnerability in Google Android 13.0/14.0 In assertPackageWithSharedUserIdIsPrivileged of InstallPackageHelper.java, there is a possible execution of arbitrary app code as a privileged app due to a logic error in the code. | 7.8 | |
2024-05-07 | CVE-2024-23713 | Unspecified vulnerability in Google Android In migrateNotificationFilter of NotificationManagerService.java, there is a possible failure to persist notifications settings due to improper input validation. | 7.8 | |
2024-05-07 | CVE-2024-23808 | Openatom | NULL Pointer Dereference vulnerability in Openatom Openharmony in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free or cause DOS through NULL pointer dereference. | 7.8 |
2024-05-07 | CVE-2024-27217 | Openatom | Use After Free vulnerability in Openatom Openharmony in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. | 7.8 |
2024-05-07 | CVE-2024-3758 | Openatom | Out-of-bounds Write vulnerability in Openatom Openharmony in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in TCB through heap buffer overflow. | 7.8 |
2024-05-07 | CVE-2024-3759 | Openatom | Use After Free vulnerability in Openatom Openharmony in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in TCB through use after free. | 7.8 |
2024-05-06 | CVE-2023-43521 | Qualcomm | Use After Free vulnerability in Qualcomm products Memory corruption when multiple listeners are being registered with the same file descriptor. | 7.8 |
2024-05-06 | CVE-2023-43524 | Qualcomm | Classic Buffer Overflow vulnerability in Qualcomm products Memory corruption when the bandpass filter order received from AHAL is not within the expected range. | 7.8 |
2024-05-06 | CVE-2023-43525 | Qualcomm | Classic Buffer Overflow vulnerability in Qualcomm products Memory corruption while copying the sound model data from user to kernel buffer during sound model register. | 7.8 |
2024-05-06 | CVE-2023-43526 | Qualcomm | Classic Buffer Overflow vulnerability in Qualcomm products Memory corruption while querying module parameters from Listen Sound model client in kernel from user space. | 7.8 |
2024-05-06 | CVE-2023-43530 | Qualcomm | Integer Overflow or Wraparound vulnerability in Qualcomm products Memory corruption in HLOS while checking for the storage type. | 7.8 |
2024-05-06 | CVE-2023-43531 | Qualcomm | Access of Uninitialized Pointer vulnerability in Qualcomm products Memory corruption while verifying the serialized header when the key pairs are generated. | 7.8 |
2024-05-06 | CVE-2024-21471 | Qualcomm | Use After Free vulnerability in Qualcomm products Memory corruption when IOMMU unmap of a GPU buffer fails in Linux. | 7.8 |
2024-05-06 | CVE-2024-21474 | Qualcomm | Out-of-bounds Write vulnerability in Qualcomm products Memory corruption when size of buffer from previous call is used without validation or re-initialization. | 7.8 |
2024-05-06 | CVE-2024-23351 | Qualcomm | Unspecified vulnerability in Qualcomm products Memory corruption as GPU registers beyond the last protected range can be accessed through LPAC submissions. | 7.8 |
2024-05-06 | CVE-2024-23354 | Qualcomm | Use After Free vulnerability in Qualcomm products Memory corruption when the IOCTL call is interrupted by a signal. | 7.8 |
2024-05-06 | CVE-2024-20064 | Out-of-bounds Write vulnerability in Google Android 13.0/14.0 In wlan service, there is a possible out of bounds write due to improper input validation. | 7.8 | |
2024-05-06 | CVE-2024-3661 | Fortinet Cisco Paloaltonetworks Citrix F5 Watchguard Zscaler | Missing Authentication for Critical Function vulnerability in multiple products DHCP can add routes to a client’s routing table via the classless static route option (121). | 7.6 |
2024-05-07 | CVE-2024-32663 | Oisf | Allocation of Resources Without Limits or Throttling vulnerability in Oisf Suricata Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. | 7.5 |
2024-05-08 | CVE-2024-32049 | F5 | Unspecified vulnerability in F5 Big-Ip Next Central Manager BIG-IP Next Central Manager (CM) may allow an unauthenticated, remote attacker to obtain the BIG-IP Next LTM/WAF instance credentials. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | 7.4 |
2024-05-07 | CVE-2024-32664 | Oisf | Classic Buffer Overflow vulnerability in Oisf Suricata Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. | 7.3 |
2024-05-08 | CVE-2024-22460 | Dell | Unspecified vulnerability in Dell Dm5500 Firmware 5.14.0.0/5.15.0.0 Dell PowerProtect DM5500 version 5.15.0.0 and prior contains an insecure deserialization Vulnerability. | 7.2 |
2024-05-06 | CVE-2023-33119 | Qualcomm | Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Qualcomm products Memory corruption while loading a VM from a signed VM image that is not coherent in the processor cache. | 7.0 |
31 Medium Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2024-05-06 | CVE-2023-32873 | Out-of-bounds Write vulnerability in Google Android 12.0/13.0/14.0 In keyInstall, there is a possible out of bounds write due to a missing bounds check. | 6.7 | |
2024-05-08 | CVE-2024-24908 | Dell | Unspecified vulnerability in Dell Dm5500 Firmware 5.14.0.0/5.15.0.0 Dell PowerProtect DM5500 version 5.15.0.0 and prior contain an Arbitrary File Delete via Path Traversal vulnerability. | 6.5 |
2024-05-07 | CVE-2024-23709 | Out-of-bounds Write vulnerability in Google Android In multiple locations, there is a possible out of bounds write due to a heap buffer overflow. | 6.5 | |
2024-05-07 | CVE-2024-4559 | Google Fedoraproject | Out-of-bounds Write vulnerability in multiple products Heap buffer overflow in WebAudio in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 6.5 |
2024-05-07 | CVE-2024-31456 | Glpi Project | SQL Injection vulnerability in Glpi-Project Glpi GLPI is a Free Asset and IT Management Software package. | 6.5 |
2024-05-07 | CVE-2024-0022 | Unspecified vulnerability in Google Android 13.0/14.0 In multiple functions of CompanionDeviceManagerService.java, there is a possible launch NotificationAccessConfirmationActivity of another user profile due to improper input validation. | 5.5 | |
2024-05-07 | CVE-2024-0026 | Allocation of Resources Without Limits or Throttling vulnerability in Google Android In multiple functions of SnoozeHelper.java, there is a possible persistent denial of service due to resource exhaustion. | 5.5 | |
2024-05-07 | CVE-2024-0027 | Allocation of Resources Without Limits or Throttling vulnerability in Google Android In multiple functions of SnoozeHelper.java, there is a possible way to cause a boot loop due to resource exhaustion. | 5.5 | |
2024-05-07 | CVE-2024-23712 | Unspecified vulnerability in Google Android In multiple functions of AppOpsService.java, there is a possible way to saturate the content of /data/system/appops_accesses.xml due to resource exhaustion. | 5.5 | |
2024-05-07 | CVE-2024-31078 | Openatom | NULL Pointer Dereference vulnerability in Openatom Openharmony in OpenHarmony v4.0.0 and prior versions allow a local attacker cause service crash through NULL pointer dereference. | 5.5 |
2024-05-07 | CVE-2024-3757 | Openatom | Integer Overflow or Wraparound vulnerability in Openatom Openharmony in OpenHarmony v4.0.0 and prior versions allow a local attacker cause service crash through integer overflow. | 5.5 |
2024-05-06 | CVE-2024-4568 | Xpdfreader | Uncontrolled Recursion vulnerability in Xpdfreader Xpdf In Xpdf 4.05 (and earlier), a PDF object loop in the PDF resources leads to infinite recursion and a stack overflow. | 5.5 |
2024-05-06 | CVE-2023-43527 | Qualcomm | Out-of-bounds Read vulnerability in Qualcomm products Information disclosure while parsing dts header atom in Video. | 5.5 |
2024-05-06 | CVE-2023-43528 | Qualcomm | Out-of-bounds Read vulnerability in Qualcomm products Information disclosure when the ADSP payload size received in HLOS in response to Audio Stream Manager matrix session is less than this expected size. | 5.5 |
2024-05-08 | CVE-2024-34547 | Wpthemespace | Unspecified vulnerability in Wpthemespace Magical Addons for Elementor Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Noor alam Magical Addons For Elementor allows Stored XSS.This issue affects Magical Addons For Elementor: from n/a through 1.1.34. | 5.4 |
2024-05-08 | CVE-2024-34562 | Moveaddons | Unspecified vulnerability in Moveaddons Move Addons for Elementor Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Moveaddons Move Addons for Elementor allows Stored XSS.This issue affects Move Addons for Elementor: from n/a through 1.3.0. | 5.4 |
2024-05-08 | CVE-2024-4281 | Ylefebvre | Cross-site Scripting vulnerability in Ylefebvre Link Library The Link Library plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'link-library' shortcode in all versions up to, and including, 7.6.11 due to insufficient input sanitization and output escaping on user supplied attributes. | 5.4 |
2024-05-06 | CVE-2024-34373 | Posimyth | Unspecified vulnerability in Posimyth the Plus Addons for Elementor Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in POSIMYTH The Plus Addons for Elementor Page Builder Lite allows Stored XSS.This issue affects The Plus Addons for Elementor Page Builder Lite: from n/a through 5.4.2. | 5.4 |
2024-05-06 | CVE-2024-34381 | WP Property Hive | Unspecified vulnerability in Wp-Property-Hive Propertyhive Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PropertyHive allows Stored XSS.This issue affects PropertyHive: from n/a through 2.0.10. | 5.4 |
2024-05-07 | CVE-2024-32867 | Oisf | Improper Check for Unusual or Exceptional Conditions vulnerability in Oisf Suricata Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. | 5.3 |
2024-05-08 | CVE-2024-28971 | Dell | Insufficiently Protected Credentials vulnerability in Dell Openmanage Enterprise Update Manager Dell Update Manager Plugin, versions 1.4.0 through 1.5.0, contains a Plain-text Password Storage Vulnerability in Log file. | 4.9 |
2024-05-07 | CVE-2024-4594 | Dedecms | Unspecified vulnerability in Dedecms 5.7 A vulnerability, which was classified as problematic, was found in DedeCMS 5.7. | 4.3 |
2024-05-07 | CVE-2024-4590 | Dedecms | Unspecified vulnerability in Dedecms 5.7 A vulnerability was found in DedeCMS 5.7. | 4.3 |
2024-05-07 | CVE-2024-4591 | Dedecms | Unspecified vulnerability in Dedecms 5.7 A vulnerability classified as problematic has been found in DedeCMS 5.7. | 4.3 |
2024-05-07 | CVE-2024-4592 | Dedecms | Unspecified vulnerability in Dedecms 5.7 A vulnerability classified as problematic was found in DedeCMS 5.7. | 4.3 |
2024-05-07 | CVE-2024-4593 | Dedecms | Unspecified vulnerability in Dedecms 5.7 A vulnerability, which was classified as problematic, has been found in DedeCMS 5.7. | 4.3 |
2024-05-07 | CVE-2024-4586 | Dedecms | Unspecified vulnerability in Dedecms 5.7 A vulnerability has been found in DedeCMS 5.7 and classified as problematic. | 4.3 |
2024-05-07 | CVE-2024-4587 | Dedecms | Unspecified vulnerability in Dedecms 5.7 A vulnerability was found in DedeCMS 5.7 and classified as problematic. | 4.3 |
2024-05-07 | CVE-2024-4588 | Dedecms | Unspecified vulnerability in Dedecms 5.7 A vulnerability was found in DedeCMS 5.7. | 4.3 |
2024-05-07 | CVE-2024-4589 | Dedecms | Unspecified vulnerability in Dedecms 5.7 A vulnerability was found in DedeCMS 5.7. | 4.3 |
2024-05-07 | CVE-2024-4585 | Dedecms | Unspecified vulnerability in Dedecms 5.7 A vulnerability, which was classified as problematic, was found in DedeCMS 5.7. | 4.3 |
0 Low Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|