Weekly Vulnerabilities Reports > July 29 to August 4, 2024
Overview
537 new vulnerabilities reported during this period, including 75 critical vulnerabilities and 183 high severity vulnerabilities. This weekly summary report vulnerabilities in 244 products from 123 vendors including Linux, Apple, Oretnom23, Totolink, and Dell. Vulnerabilities are notably categorized as "SQL Injection", "Cross-site Scripting", "NULL Pointer Dereference", "Out-of-bounds Write", and "Use After Free".
- 310 reported vulnerabilities are remotely exploitables.
- 130 reported vulnerabilities are related to weaknesses in OWASP Top Ten.
- 204 reported vulnerabilities are exploitable by an anonymous user.
- Linux has the most reported vulnerabilities, with 115 reported vulnerabilities.
- Oretnom23 has the most reported critical vulnerabilities, with 25 reported vulnerabilities.
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
EXPLOITABLE
EXPLOITABLE
AVAILABLE
ANONYMOUSLY
WEB APPLICATION
Vulnerability Details
The following table list reported vulnerabilities for the period covered by this report:
75 Critical Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2024-08-04 | CVE-2024-7458 | Eladmin | Path Traversal vulnerability in Eladmin 2.7 A vulnerability was found in elunez eladmin up to 2.7 and classified as critical. | 9.8 |
2024-08-04 | CVE-2024-7455 | Angeljudesuarez | SQL Injection vulnerability in Angeljudesuarez Tailoring Management System Project in PHP 1.0 A vulnerability, which was classified as critical, was found in itsourcecode Tailoring Management System 1.0. | 9.8 |
2024-08-04 | CVE-2024-7454 | Oretnom23 | SQL Injection vulnerability in Oretnom23 Clinic'S Patient Management System 1.0 A vulnerability, which was classified as critical, has been found in SourceCodester Clinics Patient Management System 1.0. | 9.8 |
2024-08-04 | CVE-2024-7451 | Angeljudesuarez | SQL Injection vulnerability in Angeljudesuarez Placement Management System 1.0 A vulnerability was found in itsourcecode Placement Management System 1.0 and classified as critical. | 9.8 |
2024-08-04 | CVE-2024-7452 | Angeljudesuarez | SQL Injection vulnerability in Angeljudesuarez Placement Management System 1.0 A vulnerability was found in itsourcecode Placement Management System 1.0. | 9.8 |
2024-08-04 | CVE-2024-7449 | Angeljudesuarez | SQL Injection vulnerability in Angeljudesuarez Placement Management System 1.0 A vulnerability, which was classified as critical, was found in itsourcecode Placement Management System 1.0. | 9.8 |
2024-08-03 | CVE-2024-7444 | Emiloimagtolis | SQL Injection vulnerability in Emiloimagtolis Ticket Reservation System 1.0 A vulnerability classified as critical was found in itsourcecode Ticket Reservation System 1.0. | 9.8 |
2024-08-03 | CVE-2024-7443 | Vivotek | Command Injection vulnerability in Vivotek Ib8367A Firmware ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as critical has been found in Vivotek IB8367A VVTK-0100b. | 9.8 |
2024-08-03 | CVE-2024-7441 | Vivotek | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Vivotek Sd9364 Firmware ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Vivotek SD9364 VVTK-0103f. | 9.8 |
2024-08-03 | CVE-2024-7442 | Vivotek | Command Injection vulnerability in Vivotek Sd9364 Firmware ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Vivotek SD9364 VVTK-0103f. | 9.8 |
2024-08-03 | CVE-2024-7440 | Vivotek | Command Injection vulnerability in Vivotek Cc8160 Firmware ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Vivotek CC8160 VVTK-0100d. | 9.8 |
2024-08-03 | CVE-2024-7439 | Vivotek | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Vivotek Cc8160 Firmware ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Vivotek CC8160 VVTK-0100d and classified as critical. | 9.8 |
2024-08-03 | CVE-2024-7257 | The YayExtra – WooCommerce Extra Product Options plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the handle_upload_file function in all versions up to, and including, 1.3.7. | 9.8 | |
2024-08-02 | CVE-2024-38887 | Horizoncloud | OS Command Injection vulnerability in Horizoncloud Caterease An issue in Horizon Business Services Inc. | 9.8 |
2024-08-02 | CVE-2024-38889 | Horizoncloud | SQL Injection vulnerability in Horizoncloud Caterease An issue in Horizon Business Services Inc. | 9.8 |
2024-08-02 | CVE-2024-38886 | Horizoncloud | Unspecified vulnerability in Horizoncloud Caterease An issue in Horizon Business Services Inc. | 9.8 |
2024-08-02 | CVE-2024-7314 | Anji Plus | Unspecified vulnerability in Anji-Plus Report anji-plus AJ-Report is affected by an authentication bypass vulnerability. | 9.8 |
2024-08-02 | CVE-2024-7029 | Avtech | Command Injection vulnerability in Avtech Avm1203 Firmware Commands can be injected over the network and executed without authentication. | 9.8 |
2024-08-02 | CVE-2024-38879 | Siemens | Unspecified vulnerability in Siemens Omnivise T3000 Application Server 8.2/9.2 A vulnerability has been identified in Omnivise T3000 Application Server R9.2 (All versions), Omnivise T3000 R8.2 SP3 (All versions), Omnivise T3000 R8.2 SP4 (All versions). | 9.8 |
2024-08-02 | CVE-2024-36268 | Apache | Unspecified vulnerability in Apache Inlong 1.10.0/1.11.0/1.12.0 Improper Control of Generation of Code ('Code Injection') vulnerability in Apache InLong. This issue affects Apache InLong: from 1.10.0 through 1.12.0, which could lead to Remote Code Execution. | 9.8 |
2024-08-02 | CVE-2024-42458 | Any1 | Unspecified vulnerability in Any1 Neatvnc server.c in Neat VNC (aka neatvnc) before 0.8.1 does not properly validate the security type, a related issue to CVE-2006-2369. | 9.8 |
2024-08-02 | CVE-2024-7378 | Oretnom23 | SQL Injection vulnerability in Oretnom23 Simple Realtime Quiz System 1.0 A vulnerability was found in SourceCodester Simple Realtime Quiz System 1.0 and classified as critical. | 9.8 |
2024-08-02 | CVE-2024-7376 | Oretnom23 | SQL Injection vulnerability in Oretnom23 Simple Realtime Quiz System 1.0 A vulnerability, which was classified as critical, was found in SourceCodester Simple Realtime Quiz System 1.0. | 9.8 |
2024-08-02 | CVE-2024-7377 | Oretnom23 | SQL Injection vulnerability in Oretnom23 Simple Realtime Quiz System 1.0 A vulnerability has been found in SourceCodester Simple Realtime Quiz System 1.0 and classified as critical. | 9.8 |
2024-08-02 | CVE-2024-7374 | Oretnom23 | SQL Injection vulnerability in Oretnom23 Simple Realtime Quiz System 1.0 A vulnerability classified as critical was found in SourceCodester Simple Realtime Quiz System 1.0. | 9.8 |
2024-08-02 | CVE-2024-7375 | Oretnom23 | SQL Injection vulnerability in Oretnom23 Simple Realtime Quiz System 1.0 A vulnerability, which was classified as critical, has been found in SourceCodester Simple Realtime Quiz System 1.0. | 9.8 |
2024-08-01 | CVE-2024-7369 | Oretnom23 | SQL Injection vulnerability in Oretnom23 Simple Realtime Quiz System 1.0 A vulnerability was found in SourceCodester Simple Realtime Quiz System 1.0 and classified as critical. | 9.8 |
2024-08-01 | CVE-2024-7366 | Oretnom23 | SQL Injection vulnerability in Oretnom23 Tracking Monitoring Management System 1.0 A vulnerability was found in SourceCodester Tracking Monitoring Management System 1.0. | 9.8 |
2024-08-01 | CVE-2024-7364 | Oretnom23 | SQL Injection vulnerability in Oretnom23 Tracking Monitoring Management System 1.0 A vulnerability has been found in SourceCodester Tracking Monitoring Management System 1.0 and classified as critical. | 9.8 |
2024-08-01 | CVE-2024-7365 | Oretnom23 | SQL Injection vulnerability in Oretnom23 Tracking Monitoring Management System 1.0 A vulnerability was found in SourceCodester Tracking Monitoring Management System 1.0 and classified as critical. | 9.8 |
2024-08-01 | CVE-2024-7362 | Oretnom23 | SQL Injection vulnerability in Oretnom23 Tracking Monitoring Management System 1.0 A vulnerability, which was classified as critical, has been found in SourceCodester Tracking Monitoring Management System 1.0. | 9.8 |
2024-08-01 | CVE-2024-7363 | Oretnom23 | SQL Injection vulnerability in Oretnom23 Tracking Monitoring Management System 1.0 A vulnerability, which was classified as critical, was found in SourceCodester Tracking Monitoring Management System 1.0. | 9.8 |
2024-08-01 | CVE-2024-7361 | Oretnom23 | SQL Injection vulnerability in Oretnom23 Tracking Monitoring Management System 1.0 A vulnerability classified as critical was found in SourceCodester Tracking Monitoring Management System 1.0. | 9.8 |
2024-08-01 | CVE-2024-7332 | Totolink | Use of Hard-coded Credentials vulnerability in Totolink Cp450 Firmware 4.1.0Cu.747B20191224 A vulnerability was found in TOTOLINK CP450 4.1.0cu.747_B20191224. | 9.8 |
2024-07-31 | CVE-2024-38182 | Microsoft | Unspecified vulnerability in Microsoft Dynamics 365 7.0 Weak authentication in Microsoft Dynamics 365 allows an unauthenticated attacker to elevate privileges over a network. | 9.8 |
2024-07-31 | CVE-2024-7329 | Youdiancms | Unrestricted Upload of File with Dangerous Type vulnerability in Youdiancms 7.0 A vulnerability, which was classified as critical, was found in YouDianCMS 7. | 9.8 |
2024-07-31 | CVE-2024-7311 | Fabianros | SQL Injection vulnerability in Fabianros Online BUS Reservation Site 1.0 A vulnerability was found in code-projects Online Bus Reservation Site 1.0. | 9.8 |
2024-07-31 | CVE-2024-7320 | Adonesevangelista | SQL Injection vulnerability in Adonesevangelista Online Blood Bank Management System 1.0 A vulnerability classified as critical has been found in itsourcecode Online Blood Bank Management System 1.0. | 9.8 |
2024-07-31 | CVE-2024-39950 | Dahuasecurity | Unspecified vulnerability in Dahuasecurity products A vulnerability has been found in Dahua products. | 9.8 |
2024-07-31 | CVE-2024-7286 | Oretnom23 | SQL Injection vulnerability in Oretnom23 Establishment Billing Management System 1.0 A vulnerability was found in SourceCodester Establishment Billing Management System 1.0 and classified as critical. | 9.8 |
2024-07-31 | CVE-2024-7281 | Oretnom23 | SQL Injection vulnerability in Oretnom23 LOT Reservation Management System 1.0 A vulnerability classified as critical has been found in SourceCodester Lot Reservation Management System 1.0. | 9.8 |
2024-07-31 | CVE-2024-7282 | Oretnom23 | SQL Injection vulnerability in Oretnom23 LOT Reservation Management System 1.0 A vulnerability classified as critical was found in SourceCodester Lot Reservation Management System 1.0. | 9.8 |
2024-07-31 | CVE-2024-7279 | Oretnom23 | SQL Injection vulnerability in Oretnom23 LOT Reservation Management System 1.0 A vulnerability was found in SourceCodester Lot Reservation Management System 1.0. | 9.8 |
2024-07-31 | CVE-2024-7280 | Oretnom23 | SQL Injection vulnerability in Oretnom23 LOT Reservation Management System 1.0 A vulnerability was found in SourceCodester Lot Reservation Management System 1.0. | 9.8 |
2024-07-30 | CVE-2024-38983 | Alykoshin | Unspecified vulnerability in Alykoshin Mini-Deep-Assign 0.0.8 Prototype Pollution in alykoshin mini-deep-assign v0.0.8 allows an attacker to execute arbitrary code or cause a Denial of Service (DoS) and cause other impacts via the _assign() method at (/lib/index.js:91) | 9.8 |
2024-07-30 | CVE-2024-7273 | Adonesevangelista | Unspecified vulnerability in Adonesevangelista Restaurant Management System 1.0 A vulnerability classified as critical was found in itsourcecode Alton Management System 1.0. | 9.8 |
2024-07-30 | CVE-2024-36572 | Allpro | Unspecified vulnerability in Allpro Formmanager Data Handler 0.7.4 Prototype pollution in allpro form-manager 0.7.4 allows attackers to run arbitrary code and cause other impacts via the functions setDefaults, mergeBranch, and Object.setObjectValue. | 9.8 |
2024-07-30 | CVE-2024-38984 | Lukebond | Unspecified vulnerability in Lukebond Json-Override 0.2.0 Prototype Pollution in lukebond json-override 0.2.0 allows attackers to to execute arbitrary code or cause a Denial of Service (DoS) via the __proto__ property. | 9.8 |
2024-07-30 | CVE-2024-38986 | 75Lb | Unspecified vulnerability in 75Lb Deep-Merge 1.1.1 Prototype Pollution in 75lb deep-merge 1.1.1 allows attackers to execute arbitrary code or cause a Denial of Service (DoS) and cause other impacts via merge methods of lodash to merge objects. | 9.8 |
2024-07-30 | CVE-2024-39010 | Chasemoskal | Unspecified vulnerability in Chasemoskal Snapstate 0.0.9 chase-moskal snapstate v0.0.9 was discovered to contain a prototype pollution via the function attemptNestedProperty. | 9.8 |
2024-07-30 | CVE-2024-39011 | Chargeover | Unspecified vulnerability in Chargeover Redoc 2.0.9 Prototype Pollution in chargeover redoc v2.0.9-rc.69 allows attackers to execute arbitrary code or cause a Denial of Service (DoS) and cause other impacts via the function mergeObjects. | 9.8 |
2024-07-30 | CVE-2024-39012 | AIS | Unspecified vulnerability in AIS Strategyen 0.4.0 ais-ltd strategyen v0.4.0 was discovered to contain a prototype pollution via the function mergeObjects. | 9.8 |
2024-07-30 | CVE-2024-3930 | Perforce | XXE vulnerability in Perforce Akana API In versions of Akana API Platform prior to 2024.1.0 a flaw resulting in XML External Entity (XXE) was discovered. | 9.8 |
2024-07-30 | CVE-2024-6699 | Mikafon | Unspecified vulnerability in Mikafon MA7 Firmware Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Mikafon Electronic Inc. | 9.8 |
2024-07-30 | CVE-2024-41702 | Siberiancms | Unspecified vulnerability in Siberiancms SiberianCMS - CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | 9.8 |
2024-07-30 | CVE-2024-38432 | Matrix Globalservices | Insufficient Verification of Data Authenticity vulnerability in Matrix-Globalservices Tafnit Matrix Tafnit v8 - CWE-646: Reliance on File Name or Extension of Externally-Supplied File | 9.8 |
2024-07-30 | CVE-2024-7223 | Oretnom23 | Unspecified vulnerability in Oretnom23 LOT Reservation Management System 1.0 A vulnerability has been found in SourceCodester Lot Reservation Management System 1.0 and classified as critical. | 9.8 |
2024-07-30 | CVE-2024-7224 | Oretnom23 | Unspecified vulnerability in Oretnom23 LOT Reservation Management System 1.0 A vulnerability was found in SourceCodester Lot Reservation Management System 1.0 and classified as critical. | 9.8 |
2024-07-30 | CVE-2024-7221 | Oretnom23 | Unspecified vulnerability in Oretnom23 School LOG Management System 1.0 A vulnerability, which was classified as critical, has been found in SourceCodester School Log Management System 1.0. | 9.8 |
2024-07-30 | CVE-2024-7222 | Oretnom23 | Unspecified vulnerability in Oretnom23 LOT Reservation Management System 1.0 A vulnerability, which was classified as critical, was found in SourceCodester Lot Reservation Management System 1.0. | 9.8 |
2024-07-30 | CVE-2024-7219 | Oretnom23 | Unspecified vulnerability in Oretnom23 School LOG Management System 1.0 A vulnerability classified as critical has been found in SourceCodester School Log Management System 1.0. | 9.8 |
2024-07-30 | CVE-2024-7220 | Oretnom23 | Unspecified vulnerability in Oretnom23 School LOG Management System 1.0 A vulnerability classified as critical was found in SourceCodester School Log Management System 1.0. | 9.8 |
2024-07-29 | CVE-2024-7195 | Angeljudesuarez | Unspecified vulnerability in Angeljudesuarez Society Management System 1.0 A vulnerability was found in itsourcecode Society Management System 1.0. | 9.8 |
2024-07-29 | CVE-2024-7196 | Oretnom23 | SQL Injection vulnerability in Oretnom23 Complaints Report Management System 1.0 A vulnerability was found in SourceCodester Complaints Report Management System 1.0. | 9.8 |
2024-07-29 | CVE-2024-7191 | Angeljudesuarez | Unspecified vulnerability in Angeljudesuarez Society Management System 1.0 A vulnerability, which was classified as critical, has been found in itsourcecode Society Management System 1.0. | 9.8 |
2024-07-29 | CVE-2024-7189 | Kevinwong | Unspecified vulnerability in Kevinwong Online Food Ordering System 1.0 A vulnerability classified as critical has been found in itsourcecode Online Food Ordering System 1.0. | 9.8 |
2024-07-29 | CVE-2024-7190 | Angeljudesuarez | Unspecified vulnerability in Angeljudesuarez Society Management System 1.0 A vulnerability classified as critical was found in itsourcecode Society Management System 1.0. | 9.8 |
2024-07-29 | CVE-2024-7188 | Bylancer | Unspecified vulnerability in Bylancer Quicklancer 2.4 A vulnerability was found in Bylancer Quicklancer 2.4. | 9.8 |
2024-07-29 | CVE-2024-7202 | Simopro Technology | Unspecified vulnerability in Simopro Technology Winmatrix3 The query functionality of WinMatrix3 Web package from Simopro Technology lacks proper validation of user input, allowing unauthenticated remote attackers to inject SQL commands to read, modify, and delete database contents. | 9.8 |
2024-07-29 | CVE-2024-32671 | Samsung | Out-of-bounds Write vulnerability in Samsung Escargot 4.0.0 Heap-based Buffer Overflow vulnerability in Samsung Open Source Escargot JavaScript engine allows Overflow Buffers.This issue affects Escargot: 4.0.0. | 9.8 |
2024-08-02 | CVE-2024-41127 | Monkeytype | Code Injection vulnerability in Monkeytype Monkeytype is a minimalistic and customizable typing test. | 9.6 |
2024-08-01 | CVE-2024-39777 | Mattermost | Unspecified vulnerability in Mattermost Mattermost versions 9.9.x <= 9.9.0, 9.5.x <= 9.5.6, 9.7.x <= 9.7.5 and 9.8.x <= 9.8.1 fail to disallow unsolicited invites to expose access to local channels, when shared channels are enabled, which allows a malicious remote to send an invite with the ID of an existing local channel, and that local channel will then become shared without the consent of the local admin. | 9.6 |
2024-08-04 | CVE-2024-35143 | IBM | Missing Authentication for Critical Function vulnerability in IBM products IBM Planning Analytics Local 2.0 and 2.1 connects to a MongoDB server. | 9.1 |
2024-08-02 | CVE-2024-42461 | Elliptic Project | Improper Verification of Cryptographic Signature vulnerability in Elliptic Project Elliptic 6.5.6 In the Elliptic package 6.5.6 for Node.js, ECDSA signature malleability occurs because BER-encoded signatures are allowed. | 9.1 |
2024-07-31 | CVE-2024-6255 | Gaizhenbiao | Unspecified vulnerability in Gaizhenbiao Chuanhuchatgpt 20240410 A vulnerability in the JSON file handling of gaizhenbiao/chuanhuchatgpt version 20240410 allows any user to delete any JSON file on the server, including critical configuration files such as `config.json` and `ds_config_chatbot.json`. | 9.1 |
183 High Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2024-08-04 | CVE-2024-7459 | Siamonhasan | Cross-Site Request Forgery (CSRF) vulnerability in Siamonhasan Warehouse Inventory System 1.0/2.0 A vulnerability was found in OSWAPP Warehouse Inventory System 1.0/2.0. | 8.8 |
2024-08-04 | CVE-2024-7460 | Siamonhasan | Cross-Site Request Forgery (CSRF) vulnerability in Siamonhasan Warehouse Inventory System 1.0/2.0 A vulnerability was found in OSWAPP Warehouse Inventory System 1.0/2.0. | 8.8 |
2024-08-04 | CVE-2024-7450 | Angeljudesuarez | Unrestricted Upload of File with Dangerous Type vulnerability in Angeljudesuarez Placement Management System 1.0 A vulnerability has been found in itsourcecode Placement Management System 1.0 and classified as critical. | 8.8 |
2024-08-03 | CVE-2024-7436 | Dlink | Command Injection vulnerability in Dlink Di-8100 Firmware 16.07 A vulnerability, which was classified as critical, has been found in D-Link DI-8100 16.07. | 8.8 |
2024-08-02 | CVE-2024-28298 | E Bmsoft | SQL Injection vulnerability in E-Bmsoft Bmplanning 1.0.0.1 SQL injection vulnerability in BM SOFT BMPlanning 1.0.0.1 allows authenticated users to execute arbitrary SQL commands via the SEC_IDF, LIE_IDF, PLANF_IDF, CLI_IDF, DOS_IDF, and possibly other parameters to /BMServerR.dll/BMRest. | 8.8 |
2024-08-02 | CVE-2024-38877 | Siemens | Cleartext Storage of Sensitive Information vulnerability in Siemens products A vulnerability has been identified in Omnivise T3000 Application Server R9.2 (All versions), Omnivise T3000 Domain Controller R9.2 (All versions), Omnivise T3000 Network Intrusion Detection System (NIDS) R9.2 (All versions), Omnivise T3000 Product Data Management (PDM) R9.2 (All versions), Omnivise T3000 R8.2 SP3 (All versions), Omnivise T3000 R8.2 SP4 (All versions), Omnivise T3000 Security Server R9.2 (All versions), Omnivise T3000 Terminal Server R9.2 (All versions), Omnivise T3000 Thin Client R9.2 (All versions), Omnivise T3000 Whitelisting Server R9.2 (All versions). | 8.8 |
2024-08-02 | CVE-2024-40720 | Changingtec | Unspecified vulnerability in Changingtec TCB Servisign The specific API in TCBServiSign Windows Version from CHANGING Information Technology does not properly validate server-side input. | 8.8 |
2024-08-02 | CVE-2024-40721 | Changingtec | Unspecified vulnerability in Changingtec TCB Servisign The specific API in TCBServiSign Windows Version from CHANGING Information Technology does not properly validate server-side input. | 8.8 |
2024-08-02 | CVE-2024-3238 | The WordPress Menu Plugin — Superfly Responsive Menu plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.0.29. | 8.8 | |
2024-08-02 | CVE-2024-7372 | Oretnom23 | SQL Injection vulnerability in Oretnom23 Simple Realtime Quiz System 1.0 A vulnerability was found in SourceCodester Simple Realtime Quiz System 1.0. | 8.8 |
2024-08-02 | CVE-2024-7373 | Oretnom23 | SQL Injection vulnerability in Oretnom23 Simple Realtime Quiz System 1.0 A vulnerability classified as critical has been found in SourceCodester Simple Realtime Quiz System 1.0. | 8.8 |
2024-08-01 | CVE-2024-7370 | Oretnom23 | SQL Injection vulnerability in Oretnom23 Simple Realtime Quiz System 1.0 A vulnerability was found in SourceCodester Simple Realtime Quiz System 1.0. | 8.8 |
2024-08-01 | CVE-2024-7371 | Oretnom23 | SQL Injection vulnerability in Oretnom23 Simple Realtime Quiz System 1.0 A vulnerability was found in SourceCodester Simple Realtime Quiz System 1.0. | 8.8 |
2024-08-01 | CVE-2024-7367 | Oretnom23 | Cross-Site Request Forgery (CSRF) vulnerability in Oretnom23 Simple Realtime Quiz System 1.0 A vulnerability, which was classified as problematic, was found in SourceCodester Simple Realtime Quiz System 1.0. | 8.8 |
2024-08-01 | CVE-2024-32863 | Johnsoncontrols | Cross-Site Request Forgery (CSRF) vulnerability in Johnsoncontrols Exacqvision web Service 20.06.11.0/20.06.3.0/21.03 Under certain circumstances the exacqVision Web Services may be susceptible to Cross-Site Request Forgery (CSRF) | 8.8 |
2024-08-01 | CVE-2024-38768 | Webangon | Path Traversal vulnerability in Webangon the Pack Elementor Addons Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Webangon The Pack Elementor addons allows PHP Local File Inclusion, Path Traversal.This issue affects The Pack Elementor addons: from n/a through 2.0.8.6. | 8.8 |
2024-08-01 | CVE-2024-6990 | Use of Uninitialized Resource vulnerability in Google Chrome Uninitialized Use in Dawn in Google Chrome on Android prior to 127.0.6533.88 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. | 8.8 | |
2024-08-01 | CVE-2024-7255 | Out-of-bounds Read vulnerability in Google Chrome Out of bounds read in WebTransport in Google Chrome prior to 127.0.6533.88 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. | 8.8 | |
2024-08-01 | CVE-2024-7256 | Unspecified vulnerability in Google Chrome Insufficient data validation in Dawn in Google Chrome on Android prior to 127.0.6533.88 allowed a remote attacker to execute arbitrary code via a crafted HTML page. | 8.8 | |
2024-08-01 | CVE-2024-7360 | Oretnom23 | Cross-Site Request Forgery (CSRF) vulnerability in Oretnom23 Tracking Monitoring Management System 1.0 A vulnerability classified as problematic has been found in SourceCodester Tracking Monitoring Management System 1.0. | 8.8 |
2024-08-01 | CVE-2024-7338 | Totolink | Classic Buffer Overflow vulnerability in Totolink Ex1200L Firmware 9.3.5U.6146B20201023 A vulnerability, which was classified as critical, was found in TOTOLINK EX1200L 9.3.5u.6146_B20201023. | 8.8 |
2024-08-01 | CVE-2024-7336 | Totolink | Classic Buffer Overflow vulnerability in Totolink Ex200 Firmware 4.0.3C.7646B20201211 A vulnerability classified as critical was found in TOTOLINK EX200 4.0.3c.7646_B20201211. | 8.8 |
2024-08-01 | CVE-2024-7337 | Totolink | Classic Buffer Overflow vulnerability in Totolink Ex1200L Firmware 9.3.5U.6146B20201023 A vulnerability, which was classified as critical, has been found in TOTOLINK EX1200L 9.3.5u.6146_B20201023. | 8.8 |
2024-08-01 | CVE-2024-40883 | Elecom | Cross-Site Request Forgery (CSRF) vulnerability in Elecom products Cross-site request forgery vulnerability exists in ELECOM wireless LAN routers. | 8.8 |
2024-08-01 | CVE-2024-7333 | Totolink | Classic Buffer Overflow vulnerability in Totolink N350Rt Firmware 9.3.5U.6139B20201216 A vulnerability was found in TOTOLINK N350RT 9.3.5u.6139_B20201216. | 8.8 |
2024-08-01 | CVE-2024-7334 | Totolink | Classic Buffer Overflow vulnerability in Totolink Ex1200L Firmware 9.3.5U.6146B20201023 A vulnerability was found in TOTOLINK EX1200L 9.3.5u.6146_B20201023. | 8.8 |
2024-08-01 | CVE-2024-7335 | Totolink | Classic Buffer Overflow vulnerability in Totolink Ex200 Firmware 4.0.3C.7646B20201211 A vulnerability classified as critical has been found in TOTOLINK EX200 4.0.3c.7646_B20201211. | 8.8 |
2024-08-01 | CVE-2024-7331 | Totolink | Classic Buffer Overflow vulnerability in Totolink A3300R Firmware 17.0.0Cu.557B20221024 A vulnerability was found in TOTOLINK A3300R 17.0.0cu.557_B20221024 and classified as critical. | 8.8 |
2024-07-31 | CVE-2024-7327 | Rockoa | SQL Injection vulnerability in Rockoa Xinhu 2.6.2 A vulnerability classified as critical was found in Xinhu RockOA 2.6.2. | 8.8 |
2024-07-31 | CVE-2024-40464 | Beego | Improper Certificate Validation vulnerability in Beego An issue in beego v.2.2.0 and before allows a remote attacker to escalate privileges via the sendMail function located in beego/core/logs/smtp.go file | 8.8 |
2024-07-31 | CVE-2024-40465 | Beego | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Beego An issue in beego v.2.2.0 and before allows a remote attacker to escalate privileges via the getCacheFileName function in file.go file | 8.8 |
2024-07-31 | CVE-2024-40645 | Fogproject | Unrestricted Upload of File with Dangerous Type vulnerability in Fogproject 1.5.10/1.5.10.15 FOG is a cloning/imaging/rescue suite/inventory management system. | 8.8 |
2024-07-31 | CVE-2024-6973 | Catonetworks | Unspecified vulnerability in Catonetworks Cato Client Remote Code Execution in Cato Windows SDP client via crafted URLs. This issue affects Windows SDP Client before 5.10.34. | 8.8 |
2024-07-31 | CVE-2024-6975 | Catonetworks | Untrusted Search Path vulnerability in Catonetworks Cato Client Cato Networks Windows SDP Client Local Privilege Escalation via openssl configuration file. This issue affects SDP Client before 5.10.34. | 8.8 |
2024-07-31 | CVE-2024-6978 | Catonetworks | Unspecified vulnerability in Catonetworks Cato Client Cato Networks Windows SDP Client Local root certificates can be installed by low-privileged users.This issue affects SDP Client: before 5.10.28. | 8.8 |
2024-07-31 | CVE-2024-37901 | Xwiki | Code Injection vulnerability in Xwiki XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. | 8.8 |
2024-07-31 | CVE-2024-7307 | Oretnom23 | SQL Injection vulnerability in Oretnom23 Establishment Billing Management System 1.0 A vulnerability has been found in SourceCodester Establishment Billing Management System 1.0 and classified as critical. | 8.8 |
2024-07-31 | CVE-2024-7308 | Oretnom23 | SQL Injection vulnerability in Oretnom23 Establishment Billing Management System 1.0 A vulnerability was found in SourceCodester Establishment Billing Management System 1.0 and classified as critical. | 8.8 |
2024-07-31 | CVE-2024-7306 | Oretnom23 | SQL Injection vulnerability in Oretnom23 Establishment Billing Management System 1.0 A vulnerability, which was classified as critical, was found in SourceCodester Establishment Billing Management System 1.0. | 8.8 |
2024-07-31 | CVE-2024-7289 | Oretnom23 | SQL Injection vulnerability in Oretnom23 Establishment Billing Management System 1.0 A vulnerability was found in SourceCodester Establishment Billing Management System 1.0. | 8.8 |
2024-07-31 | CVE-2024-7290 | Oretnom23 | SQL Injection vulnerability in Oretnom23 Establishment Billing Management System 1.0 A vulnerability classified as critical has been found in SourceCodester Establishment Billing Management System 1.0. | 8.8 |
2024-07-31 | CVE-2024-7287 | Oretnom23 | SQL Injection vulnerability in Oretnom23 Establishment Billing Management System 1.0 A vulnerability was found in SourceCodester Establishment Billing Management System 1.0. | 8.8 |
2024-07-31 | CVE-2024-7288 | Oretnom23 | SQL Injection vulnerability in Oretnom23 Establishment Billing Management System 1.0 A vulnerability was found in SourceCodester Establishment Billing Management System 1.0. | 8.8 |
2024-07-31 | CVE-2024-7283 | Oretnom23 | SQL Injection vulnerability in Oretnom23 LOT Reservation Management System 1.0 A vulnerability, which was classified as critical, has been found in SourceCodester Lot Reservation Management System 1.0. | 8.8 |
2024-07-30 | CVE-2024-7226 | Oretnom23 | Unspecified vulnerability in Oretnom23 Medicine Tracker System 1.0 A vulnerability was found in SourceCodester Medicine Tracker System 1.0. | 8.8 |
2024-07-30 | CVE-2024-7217 | Totolink | Unspecified vulnerability in Totolink Ca300-Poe Firmware 6.2C.884 A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. | 8.8 |
2024-07-30 | CVE-2024-7215 | Totolink | Unspecified vulnerability in Totolink Lr1200 Firmware 9.3.1Cu.2832 A vulnerability was found in TOTOLINK LR1200 9.3.1cu.2832 and classified as critical. | 8.8 |
2024-07-30 | CVE-2024-7213 | Totolink | Unspecified vulnerability in Totolink A7000R Firmware 9.1.0U.6268B20220504 A vulnerability, which was classified as critical, was found in TOTOLINK A7000R 9.1.0u.6268_B20220504. | 8.8 |
2024-07-30 | CVE-2024-7214 | Totolink | Unspecified vulnerability in Totolink Lr350 Firmware 9.3.5U.6369B20220309 A vulnerability has been found in TOTOLINK LR350 9.3.5u.6369_B20220309 and classified as critical. | 8.8 |
2024-07-30 | CVE-2024-7212 | Totolink | Unspecified vulnerability in Totolink A7000R Firmware 9.1.0U.6268B20220504 A vulnerability, which was classified as critical, has been found in TOTOLINK A7000R 9.1.0u.6268_B20220504. | 8.8 |
2024-07-29 | CVE-2023-40398 | Apple | Unspecified vulnerability in Apple Iphone OS and Macos This issue was addressed with improved checks. | 8.8 |
2024-07-29 | CVE-2024-7199 | Oretnom23 | Unspecified vulnerability in Oretnom23 Complaints Report Management System 1.0 A vulnerability classified as critical was found in SourceCodester Complaints Report Management System 1.0. | 8.8 |
2024-07-29 | CVE-2024-7197 | Oretnom23 | Unspecified vulnerability in Oretnom23 Complaints Report Management System 1.0 A vulnerability was found in SourceCodester Complaints Report Management System 1.0. | 8.8 |
2024-07-29 | CVE-2024-7198 | Oretnom23 | Unspecified vulnerability in Oretnom23 Complaints Report Management System 1.0 A vulnerability classified as critical has been found in SourceCodester Complaints Report Management System 1.0. | 8.8 |
2024-07-29 | CVE-2024-7194 | Angeljudesuarez | Unspecified vulnerability in Angeljudesuarez Society Management System 1.0 A vulnerability was found in itsourcecode Society Management System 1.0 and classified as critical. | 8.8 |
2024-07-29 | CVE-2024-7192 | Angeljudesuarez | Unspecified vulnerability in Angeljudesuarez Society Management System 1.0 A vulnerability, which was classified as critical, was found in itsourcecode Society Management System 1.0. | 8.8 |
2024-07-29 | CVE-2024-7187 | Totolink | Unspecified vulnerability in Totolink A3600R Firmware 4.1.2Cu.5182B20201102 A vulnerability was found in TOTOLINK A3600R 4.1.2cu.5182_B20201102. | 8.8 |
2024-07-29 | CVE-2024-7185 | Totolink | Unspecified vulnerability in Totolink A3600R Firmware 4.1.2Cu.5182B20201102 A vulnerability was found in TOTOLINK A3600R 4.1.2cu.5182_B20201102 and classified as critical. | 8.8 |
2024-07-29 | CVE-2024-7186 | Totolink | Classic Buffer Overflow vulnerability in Totolink A3600R Firmware 4.1.2Cu.5182B20201102 A vulnerability was found in TOTOLINK A3600R 4.1.2cu.5182_B20201102. | 8.8 |
2024-07-29 | CVE-2024-7183 | Totolink | Unspecified vulnerability in Totolink A3600R Firmware 4.1.2Cu.5182B20201102 A vulnerability, which was classified as critical, was found in TOTOLINK A3600R 4.1.2cu.5182_B20201102. | 8.8 |
2024-07-29 | CVE-2024-7184 | Totolink | Unspecified vulnerability in Totolink A3600R Firmware 4.1.2Cu.5182B20201102 A vulnerability has been found in TOTOLINK A3600R 4.1.2cu.5182_B20201102 and classified as critical. | 8.8 |
2024-07-29 | CVE-2024-7181 | Totolink | Unspecified vulnerability in Totolink A3600R Firmware 4.1.2Cu.5182B20201102 A vulnerability classified as critical was found in TOTOLINK A3600R 4.1.2cu.5182_B20201102. | 8.8 |
2024-07-29 | CVE-2024-7182 | Totolink | Unspecified vulnerability in Totolink A3600R Firmware 4.1.2Cu.5182B20201102 A vulnerability, which was classified as critical, has been found in TOTOLINK A3600R 4.1.2cu.5182_B20201102. | 8.8 |
2024-07-29 | CVE-2024-7178 | Totolink | Unspecified vulnerability in Totolink A3600R Firmware 4.1.2Cu.5182B20201102 A vulnerability was found in TOTOLINK A3600R 4.1.2cu.5182_B20201102. | 8.8 |
2024-07-29 | CVE-2024-7179 | Totolink | Unspecified vulnerability in Totolink A3600R Firmware 4.1.2Cu.5182B20201102 A vulnerability was found in TOTOLINK A3600R 4.1.2cu.5182_B20201102. | 8.8 |
2024-07-29 | CVE-2024-7180 | Totolink | Unspecified vulnerability in Totolink A3600R Firmware 4.1.2Cu.5182B20201102 A vulnerability classified as critical has been found in TOTOLINK A3600R 4.1.2cu.5182_B20201102. | 8.8 |
2024-07-29 | CVE-2024-7176 | Totolink | Unspecified vulnerability in Totolink A3600R Firmware 4.1.2Cu.5182B20201102 A vulnerability was found in TOTOLINK A3600R 4.1.2cu.5182_B20201102 and classified as critical. | 8.8 |
2024-07-29 | CVE-2024-7177 | Totolink | Command Injection vulnerability in Totolink A3600R Firmware 4.1.2Cu.5182B20201102 A vulnerability was found in TOTOLINK A3600R 4.1.2cu.5182_B20201102. | 8.8 |
2024-07-29 | CVE-2024-7175 | Totolink | Unspecified vulnerability in Totolink A3600R Firmware 4.1.2Cu.5182B20201102 A vulnerability has been found in TOTOLINK A3600R 4.1.2cu.5182_B20201102 and classified as critical. | 8.8 |
2024-07-29 | CVE-2024-7173 | Totolink | Unspecified vulnerability in Totolink A3600R Firmware 4.1.2Cu.5182B20201102 A vulnerability, which was classified as critical, has been found in TOTOLINK A3600R 4.1.2cu.5182_B20201102. | 8.8 |
2024-07-29 | CVE-2024-7174 | Totolink | Command Injection vulnerability in Totolink A3600R Firmware 4.1.2Cu.5182B20201102 A vulnerability, which was classified as critical, was found in TOTOLINK A3600R 4.1.2cu.5182_B20201102. | 8.8 |
2024-08-01 | CVE-2024-39832 | Mattermost | Improper Check for Unusual or Exceptional Conditions vulnerability in Mattermost Mattermost versions 9.9.x <= 9.9.0, 9.5.x <= 9.5.6, 9.7.x <= 9.7.5, 9.8.x <= 9.8.1 fail to properly safeguard an error handling which allows a malicious remote to permanently delete local data by abusing dangerous error handling, when share channels were enabled. | 8.7 |
2024-08-02 | CVE-2024-42348 | Fogproject | Command Injection vulnerability in Fogproject 1.5.10.41 FOG is a cloning/imaging/rescue suite/inventory management system. | 8.6 |
2024-07-31 | CVE-2024-3083 | Proges | Cross-Site Request Forgery (CSRF) vulnerability in Proges Sensor NET Connect Firmware V2 2.24 A “CWE-352: Cross-Site Request Forgery (CSRF)” can be exploited by remote attackers to perform state-changing operations with administrative privileges by luring authenticated victims into visiting a malicious web page. | 8.3 |
2024-08-01 | CVE-2024-32862 | Johnsoncontrols | Incorrect Comparison vulnerability in Johnsoncontrols Exacqvision web Service 20.06.11.0/20.06.3.0/21.03 Under certain circumstances the ExacqVision Web Services does not provide sufficient protection from untrusted domains. | 8.1 |
2024-08-01 | CVE-2024-32864 | Johnsoncontrols | Cleartext Transmission of Sensitive Information vulnerability in Johnsoncontrols Exacqvision web Service 20.06.11.0/20.06.3.0/21.03 Under certain circumstances exacqVision Web Services will not enforce secure web communications (HTTPS) | 8.1 |
2024-07-30 | CVE-2024-41802 | Xibosignage | SQL Injection vulnerability in Xibosignage Xibo Xibo is a content management system (CMS). | 8.1 |
2024-08-02 | CVE-2024-38876 | Siemens | Unspecified vulnerability in Siemens products A vulnerability has been identified in Omnivise T3000 Application Server R9.2 (All versions), Omnivise T3000 Domain Controller R9.2 (All versions), Omnivise T3000 Product Data Management (PDM) R9.2 (All versions), Omnivise T3000 R8.2 SP3 (All versions), Omnivise T3000 R8.2 SP4 (All versions), Omnivise T3000 Terminal Server R9.2 (All versions), Omnivise T3000 Thin Client R9.2 (All versions), Omnivise T3000 Whitelisting Server R9.2 (All versions). | 7.8 |
2024-07-31 | CVE-2019-6197 | Lenovo | Improper Authentication vulnerability in Lenovo Pcmanager 2.6.40.3154 A vulnerability was reported in Lenovo PC Manager prior to version 2.8.90.11211 that could allow a local attacker to escalate privileges. | 7.8 |
2024-07-31 | CVE-2019-6198 | Lenovo | Improper Authentication vulnerability in Lenovo Pcmanager 2.6.40.3154 A vulnerability was reported in Lenovo PC Manager prior to version 2.8.90.11211 that could allow a local attacker to escalate privileges. | 7.8 |
2024-07-31 | CVE-2023-1577 | Lenovo | Unspecified vulnerability in Lenovo Drivers Management 2.7.1128.1046 A path hijacking vulnerability was reported in Lenovo Driver Manager prior to version 3.1.1307.1308 that could allow a local user to execute code with elevated privileges. | 7.8 |
2024-07-31 | CVE-2024-7326 | Itopvpn | Uncontrolled Search Path Element vulnerability in Itopvpn Dualsafe Password Manager 1.4.0.3 A vulnerability classified as critical has been found in IObit DualSafe Password Manager 1.4.0.3. | 7.8 |
2024-07-31 | CVE-2024-41954 | Fogproject | Incorrect Permission Assignment for Critical Resource vulnerability in Fogproject 1.5.10/1.5.10.15 FOG is a cloning/imaging/rescue suite/inventory management system. | 7.8 |
2024-07-31 | CVE-2024-7325 | Iobit | Uncontrolled Search Path Element vulnerability in Iobit Driver Booster 11.0.0.0 A vulnerability was found in IObit Driver Booster 11.0.0.0. | 7.8 |
2024-07-31 | CVE-2024-6974 | Catonetworks | Incorrect Default Permissions vulnerability in Catonetworks Cato Client Cato Networks Windows SDP Client Local Privilege Escalation via self-upgradeThis issue affects SDP Client: before 5.10.34. | 7.8 |
2024-07-31 | CVE-2024-31202 | Proges | Incorrect Permission Assignment for Critical Resource vulnerability in Proges Thermoscan IP 20211103 A “CWE-732: Incorrect Permission Assignment for Critical Resource” in the ThermoscanIP installation folder allows a local attacker to perform a Local Privilege Escalation. | 7.8 |
2024-07-31 | CVE-2024-32857 | Dell | Uncontrolled Search Path Element vulnerability in Dell Peripheral Manager 1.3.1 Dell Peripheral Manager, versions prior to 1.7.6, contain an uncontrolled search path element vulnerability. | 7.8 |
2024-07-31 | CVE-2024-37127 | Dell | Uncontrolled Search Path Element vulnerability in Dell Peripheral Manager 1.3.1 Dell Peripheral Manager, versions prior to 1.7.6, contain an uncontrolled search path element vulnerability. | 7.8 |
2024-07-31 | CVE-2024-37129 | Dell | Path Traversal vulnerability in Dell Inventory Collector Dell Inventory Collector, versions prior to 12.3.0.6 contains a Path Traversal vulnerability. | 7.8 |
2024-07-31 | CVE-2024-37142 | Dell | Uncontrolled Search Path Element vulnerability in Dell Peripheral Manager 1.3.1 Dell Peripheral Manager, versions prior to 1.7.6, contain an uncontrolled search path element vulnerability. | 7.8 |
2024-07-30 | CVE-2024-42104 | Linux | Use After Free vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: nilfs2: add missing check for inode numbers on directory entries Syzbot reported that mounting and unmounting a specific pattern of corrupted nilfs2 filesystem images causes a use-after-free of metadata file inodes, which triggers a kernel bug in lru_add_fn(). As Jan Kara pointed out, this is because the link count of a metadata file gets corrupted to 0, and nilfs_evict_inode(), which is called from iput(), tries to delete that inode (ifile inode in this case). The inconsistency occurs because directories containing the inode numbers of these metadata files that should not be visible in the namespace are read without checking. Fix this issue by treating the inode numbers of these internal files as errors in the sanity check helper when reading directory folios/pages. Also thanks to Hillf Danton and Matthew Wilcox for their initial mm-layer analysis. | 7.8 |
2024-07-30 | CVE-2024-42108 | Linux | Use After Free vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: net: rswitch: Avoid use-after-free in rswitch_poll() The use-after-free is actually in rswitch_tx_free(), which is inlined in rswitch_poll(). | 7.8 |
2024-07-30 | CVE-2024-42136 | Linux | Integer Overflow or Wraparound vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: cdrom: rearrange last_media_change check to avoid unintentional overflow When running syzkaller with the newly reintroduced signed integer wrap sanitizer we encounter this splat: [ 366.015950] UBSAN: signed-integer-overflow in ../drivers/cdrom/cdrom.c:2361:33 [ 366.021089] -9223372036854775808 - 346321 cannot be represented in type '__s64' (aka 'long long') [ 366.025894] program syz-executor.4 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 366.027502] CPU: 5 PID: 28472 Comm: syz-executor.7 Not tainted 6.8.0-rc2-00035-gb3ef86b5a957 #1 [ 366.027512] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 366.027518] Call Trace: [ 366.027523] <TASK> [ 366.027533] dump_stack_lvl+0x93/0xd0 [ 366.027899] handle_overflow+0x171/0x1b0 [ 366.038787] ata1.00: invalid multi_count 32 ignored [ 366.043924] cdrom_ioctl+0x2c3f/0x2d10 [ 366.063932] ? __pm_runtime_resume+0xe6/0x130 [ 366.071923] sr_block_ioctl+0x15d/0x1d0 [ 366.074624] ? __pfx_sr_block_ioctl+0x10/0x10 [ 366.077642] blkdev_ioctl+0x419/0x500 [ 366.080231] ? __pfx_blkdev_ioctl+0x10/0x10 ... Historically, the signed integer overflow sanitizer did not work in the kernel due to its interaction with `-fwrapv` but this has since been changed [1] in the newest version of Clang. | 7.8 |
2024-07-30 | CVE-2024-42138 | Linux | Double Free vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: mlxsw: core_linecards: Fix double memory deallocation in case of invalid INI file In case of invalid INI file mlxsw_linecard_types_init() deallocates memory but doesn't reset pointer to NULL and returns 0. | 7.8 |
2024-07-30 | CVE-2024-42147 | Linux | Double Free vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: crypto: hisilicon/debugfs - Fix debugfs uninit process issue During the zip probe process, the debugfs failure does not stop the probe. | 7.8 |
2024-07-30 | CVE-2024-42148 | Linux | Improper Validation of Array Index vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: bnx2x: Fix multiple UBSAN array-index-out-of-bounds Fix UBSAN warnings that occur when using a system with 32 physical cpu cores or more, or when the user defines a number of Ethernet queues greater than or equal to FP_SB_MAX_E1x using the num_queues module parameter. Currently there is a read/write out of bounds that occurs on the array "struct stats_query_entry query" present inside the "bnx2x_fw_stats_req" struct in "drivers/net/ethernet/broadcom/bnx2x/bnx2x.h". Looking at the definition of the "struct stats_query_entry query" array: struct stats_query_entry query[FP_SB_MAX_E1x+ BNX2X_FIRST_QUEUE_QUERY_IDX]; FP_SB_MAX_E1x is defined as the maximum number of fast path interrupts and has a value of 16, while BNX2X_FIRST_QUEUE_QUERY_IDX has a value of 3 meaning the array has a total size of 19. Since accesses to "struct stats_query_entry query" are offset-ted by BNX2X_FIRST_QUEUE_QUERY_IDX, that means that the total number of Ethernet queues should not exceed FP_SB_MAX_E1x (16). | 7.8 |
2024-07-30 | CVE-2024-42159 | Linux | Improper Check for Unusual or Exceptional Conditions vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Sanitise num_phys Information is stored in mr_sas_port->phy_mask, values larger then size of this field shouldn't be allowed. | 7.8 |
2024-07-30 | CVE-2024-42160 | Linux | Improper Check for Unusual or Exceptional Conditions vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: f2fs: check validation of fault attrs in f2fs_build_fault_attr() - It missed to check validation of fault attrs in parse_options(), let's fix to add check condition in f2fs_build_fault_attr(). - Use f2fs_build_fault_attr() in __sbi_store() to clean up code. | 7.8 |
2024-07-29 | CVE-2024-27826 | Apple | Unspecified vulnerability in Apple products The issue was addressed with improved memory handling. | 7.8 |
2024-07-29 | CVE-2024-40781 | Apple | Unspecified vulnerability in Apple Macos The issue was addressed with improved checks. | 7.8 |
2024-07-29 | CVE-2024-40802 | Apple | Unspecified vulnerability in Apple Macos The issue was addressed with improved checks. | 7.8 |
2024-07-29 | CVE-2024-40809 | Apple | Unspecified vulnerability in Apple products A logic issue was addressed with improved checks. | 7.8 |
2024-07-29 | CVE-2024-40812 | Apple | Unspecified vulnerability in Apple products A logic issue was addressed with improved checks. | 7.8 |
2024-07-29 | CVE-2024-40828 | Apple | Unspecified vulnerability in Apple Macos The issue was addressed with improved checks. | 7.8 |
2024-07-29 | CVE-2024-7248 | Comodo | Path Traversal vulnerability in Comodo Internet Security 12.2.4.8032 Comodo Internet Security Pro Directory Traversal Local Privilege Escalation Vulnerability. | 7.8 |
2024-07-29 | CVE-2024-7249 | Comodo | Link Following vulnerability in Comodo Firewall 12.2.2.8012 Comodo Firewall Link Following Local Privilege Escalation Vulnerability. | 7.8 |
2024-07-29 | CVE-2024-7250 | Comodo | Link Following vulnerability in Comodo Internet Security 12.2.4.8032 Comodo Internet Security Pro cmdagent Link Following Local Privilege Escalation Vulnerability. | 7.8 |
2024-07-29 | CVE-2024-7251 | Comodo | Link Following vulnerability in Comodo Internet Security 12.2.4.8032 Comodo Internet Security Pro cmdagent Link Following Local Privilege Escalation Vulnerability. | 7.8 |
2024-07-29 | CVE-2024-7252 | Comodo | Link Following vulnerability in Comodo Internet Security 12.2.4.8032 Comodo Internet Security Pro cmdagent Link Following Local Privilege Escalation Vulnerability. | 7.8 |
2024-07-29 | CVE-2023-40396 | Apple | Unspecified vulnerability in Apple products The issue was addressed with improved memory handling. | 7.8 |
2024-07-29 | CVE-2023-42958 | Apple | Unspecified vulnerability in Apple Macos A permissions issue was addressed with additional restrictions. | 7.8 |
2024-07-29 | CVE-2024-42093 | Linux | Out-of-bounds Write vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: net/dpaa2: Avoid explicit cpumask var allocation on stack For CONFIG_CPUMASK_OFFSTACK=y kernel, explicit allocation of cpumask variable on stack is not recommended since it can cause potential stack overflow. Instead, kernel code should always use *cpumask_var API(s) to allocate cpumask var in config-neutral way, leaving allocation strategy to CONFIG_CPUMASK_OFFSTACK. Use *cpumask_var API(s) to address it. | 7.8 |
2024-07-29 | CVE-2024-42094 | Linux | Out-of-bounds Write vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: net/iucv: Avoid explicit cpumask var allocation on stack For CONFIG_CPUMASK_OFFSTACK=y kernel, explicit allocation of cpumask variable on stack is not recommended since it can cause potential stack overflow. Instead, kernel code should always use *cpumask_var API(s) to allocate cpumask var in config-neutral way, leaving allocation strategy to CONFIG_CPUMASK_OFFSTACK. Use *cpumask_var API(s) to address it. | 7.8 |
2024-07-29 | CVE-2024-41087 | Linux | Double Free vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: ata: libata-core: Fix double free on error If e.g. | 7.8 |
2024-07-29 | CVE-2024-41092 | Linux | Use After Free vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: drm/i915/gt: Fix potential UAF by revoke of fence registers CI has been sporadically reporting the following issue triggered by igt@i915_selftest@live@hangcheck on ADL-P and similar machines: <6> [414.049203] i915: Running intel_hangcheck_live_selftests/igt_reset_evict_fence ... <6> [414.068804] i915 0000:00:02.0: [drm] GT0: GUC: submission enabled <6> [414.068812] i915 0000:00:02.0: [drm] GT0: GUC: SLPC enabled <3> [414.070354] Unable to pin Y-tiled fence; err:-4 <3> [414.071282] i915_vma_revoke_fence:301 GEM_BUG_ON(!i915_active_is_idle(&fence->active)) ... <4>[ 609.603992] ------------[ cut here ]------------ <2>[ 609.603995] kernel BUG at drivers/gpu/drm/i915/gt/intel_ggtt_fencing.c:301! <4>[ 609.604003] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI <4>[ 609.604006] CPU: 0 PID: 268 Comm: kworker/u64:3 Tainted: G U W 6.9.0-CI_DRM_14785-g1ba62f8cea9c+ #1 <4>[ 609.604008] Hardware name: Intel Corporation Alder Lake Client Platform/AlderLake-P DDR4 RVP, BIOS RPLPFWI1.R00.4035.A00.2301200723 01/20/2023 <4>[ 609.604010] Workqueue: i915 __i915_gem_free_work [i915] <4>[ 609.604149] RIP: 0010:i915_vma_revoke_fence+0x187/0x1f0 [i915] ... <4>[ 609.604271] Call Trace: <4>[ 609.604273] <TASK> ... <4>[ 609.604716] __i915_vma_evict+0x2e9/0x550 [i915] <4>[ 609.604852] __i915_vma_unbind+0x7c/0x160 [i915] <4>[ 609.604977] force_unbind+0x24/0xa0 [i915] <4>[ 609.605098] i915_vma_destroy+0x2f/0xa0 [i915] <4>[ 609.605210] __i915_gem_object_pages_fini+0x51/0x2f0 [i915] <4>[ 609.605330] __i915_gem_free_objects.isra.0+0x6a/0xc0 [i915] <4>[ 609.605440] process_scheduled_works+0x351/0x690 ... In the past, there were similar failures reported by CI from other IGT tests, observed on other platforms. Before commit 63baf4f3d587 ("drm/i915/gt: Only wait for GPU activity before unbinding a GGTT fence"), i915_vma_revoke_fence() was waiting for idleness of vma->active via fence_update(). | 7.8 |
2024-07-29 | CVE-2024-41096 | Linux | Use After Free vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: PCI/MSI: Fix UAF in msi_capability_init KFENCE reports the following UAF: BUG: KFENCE: use-after-free read in __pci_enable_msi_range+0x2c0/0x488 Use-after-free read at 0x0000000024629571 (in kfence-#12): __pci_enable_msi_range+0x2c0/0x488 pci_alloc_irq_vectors_affinity+0xec/0x14c pci_alloc_irq_vectors+0x18/0x28 kfence-#12: 0x0000000008614900-0x00000000e06c228d, size=104, cache=kmalloc-128 allocated by task 81 on cpu 7 at 10.808142s: __kmem_cache_alloc_node+0x1f0/0x2bc kmalloc_trace+0x44/0x138 msi_alloc_desc+0x3c/0x9c msi_domain_insert_msi_desc+0x30/0x78 msi_setup_msi_desc+0x13c/0x184 __pci_enable_msi_range+0x258/0x488 pci_alloc_irq_vectors_affinity+0xec/0x14c pci_alloc_irq_vectors+0x18/0x28 freed by task 81 on cpu 7 at 10.811436s: msi_domain_free_descs+0xd4/0x10c msi_domain_free_locked.part.0+0xc0/0x1d8 msi_domain_alloc_irqs_all_locked+0xb4/0xbc pci_msi_setup_msi_irqs+0x30/0x4c __pci_enable_msi_range+0x2a8/0x488 pci_alloc_irq_vectors_affinity+0xec/0x14c pci_alloc_irq_vectors+0x18/0x28 Descriptor allocation done in: __pci_enable_msi_range msi_capability_init msi_setup_msi_desc msi_insert_msi_desc msi_domain_insert_msi_desc msi_alloc_desc ... Freed in case of failure in __msi_domain_alloc_locked() __pci_enable_msi_range msi_capability_init pci_msi_setup_msi_irqs msi_domain_alloc_irqs_all_locked msi_domain_alloc_locked __msi_domain_alloc_locked => fails msi_domain_free_locked ... That failure propagates back to pci_msi_setup_msi_irqs() in msi_capability_init() which accesses the descriptor for unmasking in the error exit path. Cure it by copying the descriptor and using the copy for the error exit path unmask operation. [ tglx: Massaged change log ] | 7.8 |
2024-07-29 | CVE-2024-41817 | Imagemagick | Uncontrolled Search Path Element vulnerability in Imagemagick ImageMagick is a free and open-source software suite, used for editing and manipulating digital images. | 7.8 |
2024-07-29 | CVE-2024-42072 | Linux | Unspecified vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: bpf: Fix may_goto with negative offset. Zac's syzbot crafted a bpf prog that exposed two bugs in may_goto. The 1st bug is the way may_goto is patched. | 7.8 |
2024-07-29 | CVE-2024-41039 | Linux | Classic Buffer Overflow vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: firmware: cs_dsp: Fix overflow checking of wmfw header Fix the checking that firmware file buffer is large enough for the wmfw header, to prevent overrunning the buffer. The original code tested that the firmware data buffer contained enough bytes for the sums of the size of the structs wmfw_header + wmfw_adsp1_sizes + wmfw_footer But wmfw_adsp1_sizes is only used on ADSP1 firmware. | 7.8 |
2024-07-29 | CVE-2024-41046 | Linux | Double Free vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: net: ethernet: lantiq_etop: fix double free in detach The number of the currently released descriptor is never incremented which results in the same skb being released multiple times. | 7.8 |
2024-07-29 | CVE-2024-41049 | Linux | Use After Free vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: filelock: fix potential use-after-free in posix_lock_inode Light Hsieh reported a KASAN UAF warning in trace_posix_lock_inode(). The request pointer had been changed earlier to point to a lock entry that was added to the inode's list. | 7.8 |
2024-07-29 | CVE-2024-41057 | Linux | Use After Free vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie() We got the following issue in our fault injection stress test: ================================================================== BUG: KASAN: slab-use-after-free in cachefiles_withdraw_cookie+0x4d9/0x600 Read of size 8 at addr ffff888118efc000 by task kworker/u78:0/109 CPU: 13 PID: 109 Comm: kworker/u78:0 Not tainted 6.8.0-dirty #566 Call Trace: <TASK> kasan_report+0x93/0xc0 cachefiles_withdraw_cookie+0x4d9/0x600 fscache_cookie_state_machine+0x5c8/0x1230 fscache_cookie_worker+0x91/0x1c0 process_one_work+0x7fa/0x1800 [...] Allocated by task 117: kmalloc_trace+0x1b3/0x3c0 cachefiles_acquire_volume+0xf3/0x9c0 fscache_create_volume_work+0x97/0x150 process_one_work+0x7fa/0x1800 [...] Freed by task 120301: kfree+0xf1/0x2c0 cachefiles_withdraw_cache+0x3fa/0x920 cachefiles_put_unbind_pincount+0x1f6/0x250 cachefiles_daemon_release+0x13b/0x290 __fput+0x204/0xa00 task_work_run+0x139/0x230 do_exit+0x87a/0x29b0 [...] ================================================================== Following is the process that triggers the issue: p1 | p2 ------------------------------------------------------------ fscache_begin_lookup fscache_begin_volume_access fscache_cache_is_live(fscache_cache) cachefiles_daemon_release cachefiles_put_unbind_pincount cachefiles_daemon_unbind cachefiles_withdraw_cache fscache_withdraw_cache fscache_set_cache_state(cache, FSCACHE_CACHE_IS_WITHDRAWN); cachefiles_withdraw_objects(cache) fscache_wait_for_objects(fscache) atomic_read(&fscache_cache->object_count) == 0 fscache_perform_lookup cachefiles_lookup_cookie cachefiles_alloc_object refcount_set(&object->ref, 1); object->volume = volume fscache_count_object(vcookie->cache); atomic_inc(&fscache_cache->object_count) cachefiles_withdraw_volumes cachefiles_withdraw_volume fscache_withdraw_volume __cachefiles_free_volume kfree(cachefiles_volume) fscache_cookie_state_machine cachefiles_withdraw_cookie cache = object->volume->cache; // cachefiles_volume UAF !!! After setting FSCACHE_CACHE_IS_WITHDRAWN, wait for all the cookie lookups to complete first, and then wait for fscache_cache->object_count == 0 to avoid the cookie exiting after the volume has been freed and triggering the above issue. | 7.8 |
2024-07-29 | CVE-2024-41058 | Linux | Use After Free vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: cachefiles: fix slab-use-after-free in fscache_withdraw_volume() We got the following issue in our fault injection stress test: ================================================================== BUG: KASAN: slab-use-after-free in fscache_withdraw_volume+0x2e1/0x370 Read of size 4 at addr ffff88810680be08 by task ondemand-04-dae/5798 CPU: 0 PID: 5798 Comm: ondemand-04-dae Not tainted 6.8.0-dirty #565 Call Trace: kasan_check_range+0xf6/0x1b0 fscache_withdraw_volume+0x2e1/0x370 cachefiles_withdraw_volume+0x31/0x50 cachefiles_withdraw_cache+0x3ad/0x900 cachefiles_put_unbind_pincount+0x1f6/0x250 cachefiles_daemon_release+0x13b/0x290 __fput+0x204/0xa00 task_work_run+0x139/0x230 Allocated by task 5820: __kmalloc+0x1df/0x4b0 fscache_alloc_volume+0x70/0x600 __fscache_acquire_volume+0x1c/0x610 erofs_fscache_register_volume+0x96/0x1a0 erofs_fscache_register_fs+0x49a/0x690 erofs_fc_fill_super+0x6c0/0xcc0 vfs_get_super+0xa9/0x140 vfs_get_tree+0x8e/0x300 do_new_mount+0x28c/0x580 [...] Freed by task 5820: kfree+0xf1/0x2c0 fscache_put_volume.part.0+0x5cb/0x9e0 erofs_fscache_unregister_fs+0x157/0x1b0 erofs_kill_sb+0xd9/0x1c0 deactivate_locked_super+0xa3/0x100 vfs_get_super+0x105/0x140 vfs_get_tree+0x8e/0x300 do_new_mount+0x28c/0x580 [...] ================================================================== Following is the process that triggers the issue: mount failed | daemon exit ------------------------------------------------------------ deactivate_locked_super cachefiles_daemon_release erofs_kill_sb erofs_fscache_unregister_fs fscache_relinquish_volume __fscache_relinquish_volume fscache_put_volume(fscache_volume, fscache_volume_put_relinquish) zero = __refcount_dec_and_test(&fscache_volume->ref, &ref); cachefiles_put_unbind_pincount cachefiles_daemon_unbind cachefiles_withdraw_cache cachefiles_withdraw_volumes list_del_init(&volume->cache_link) fscache_free_volume(fscache_volume) cache->ops->free_volume cachefiles_free_volume list_del_init(&cachefiles_volume->cache_link); kfree(fscache_volume) cachefiles_withdraw_volume fscache_withdraw_volume fscache_volume->n_accesses // fscache_volume UAF !!! The fscache_volume in cache->volumes must not have been freed yet, but its reference count may be 0. | 7.8 |
2024-07-29 | CVE-2024-41061 | Linux | Improper Validation of Array Index vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix array-index-out-of-bounds in dml2/FCLKChangeSupport [Why] Potential out of bounds access in dml2_calculate_rq_and_dlg_params() because the value of out_lowest_state_idx used as an index for FCLKChangeSupport array can be greater than 1. [How] Currently dml2 core specifies identical values for all FCLKChangeSupport elements. | 7.8 |
2024-07-29 | CVE-2024-41070 | Linux | Use After Free vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group() Al reported a possible use-after-free (UAF) in kvm_spapr_tce_attach_iommu_group(). It looks up `stt` from tablefd, but then continues to use it after doing fdput() on the returned fd. | 7.8 |
2024-07-29 | CVE-2024-41071 | Linux | Improper Validation of Array Index vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: Avoid address calculations via out of bounds array indexing req->n_channels must be set before req->channels[] can be used. This patch fixes one of the issues encountered in [1]. [ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4 [ 83.964258] index 0 is out of range for type 'struct ieee80211_channel *[]' [...] [ 83.964264] Call Trace: [ 83.964267] <TASK> [ 83.964269] dump_stack_lvl+0x3f/0xc0 [ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110 [ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0 [ 83.964281] __ieee80211_start_scan+0x601/0x990 [ 83.964291] nl80211_trigger_scan+0x874/0x980 [ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160 [ 83.964298] genl_rcv_msg+0x240/0x270 [...] [1] https://bugzilla.kernel.org/show_bug.cgi?id=218810 | 7.8 |
2024-07-29 | CVE-2024-41073 | Linux | Double Free vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: nvme: avoid double free special payload If a discard request needs to be retried, and that retry may fail before a new special payload is added, a double free will result. | 7.8 |
2024-07-29 | CVE-2024-7193 | Mp3Tag | Unspecified vulnerability in Mp3Tag A vulnerability has been found in Mp3tag up to 3.26d and classified as problematic. | 7.8 |
2024-07-29 | CVE-2024-41143 | Skygroup | Origin Validation Error vulnerability in Skygroup Skysea Client View Origin validation error vulnerability exists in SKYSEA Client View Ver.3.013.00 to Ver.19.210.04e. | 7.8 |
2024-08-02 | CVE-2024-38891 | Horizoncloud | Cleartext Transmission of Sensitive Information vulnerability in Horizoncloud Caterease An issue in Horizon Business Services Inc. | 7.5 |
2024-08-02 | CVE-2024-33892 | HMS Networks | Cleartext Storage of Sensitive Information vulnerability in Hms-Networks Ewon Cosy+ Firmware Insecure Permissions vulnerability in Cosy+ devices running a firmware 21.x below 21.2s10 or a firmware 22.x below 22.1s3 are susceptible to leaking information through cookies. | 7.5 |
2024-08-02 | CVE-2024-41310 | Yanzhenjie | Path Traversal vulnerability in Yanzhenjie Andserver AndServer 2.1.12 is vulnerable to Directory Traversal. | 7.5 |
2024-08-02 | CVE-2024-41518 | Mecodia | Unspecified vulnerability in Mecodia Feripro An Incorrect Access Control vulnerability in "/admin/programm/<program_id>/export/statistics" in Feripro <= v2.2.3 allows remote attackers to export an XLSX file with information about registrations and participants. | 7.5 |
2024-08-01 | CVE-2024-32758 | Johnsoncontrols | Inadequate Encryption Strength vulnerability in Johnsoncontrols Exacqvision Client and Exacqvision Server Under certain circumstances the communication between exacqVision Client and exacqVision Server will use insufficient key length and exchange | 7.5 |
2024-08-01 | CVE-2024-41264 | Casbin | Improper Certificate Validation vulnerability in Casbin Casdoor 1.636.0 An issue discovered in casdoor v1.636.0 allows attackers to obtain sensitive information via the ssh.InsecureIgnoreHostKey() method. | 7.5 |
2024-08-01 | CVE-2024-41123 | Ruby Lang | Resource Exhaustion vulnerability in Ruby-Lang Rexml REXML is an XML toolkit for Ruby. | 7.5 |
2024-08-01 | CVE-2024-41946 | Ruby Lang | Resource Exhaustion vulnerability in Ruby-Lang Rexml REXML is an XML toolkit for Ruby. | 7.5 |
2024-08-01 | CVE-2024-28972 | Dell | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Dell Insightiq 5.0.0 Dell InsightIQ, Verion 5.0.0, contains a use of a broken or risky cryptographic algorithm vulnerability. | 7.5 |
2024-08-01 | CVE-2024-6687 | Thisfunctional | Information Exposure Through Log Files vulnerability in Thisfunctional CTT Expresso Para Woocommerce The CTT Expresso para WooCommerce plugin for WordPress is vulnerable to sensitive information exposure in all versions up to and including 3.2.12 via the /wp-content/uploads/cepw directory. | 7.5 |
2024-07-31 | CVE-2024-23444 | Elastic | Missing Encryption of Sensitive Data vulnerability in Elastic Elasticsearch It was discovered by Elastic engineering that when elasticsearch-certutil CLI tool is used with the csr option in order to create a new Certificate Signing Requests, the associated private key that is generated is stored on disk unencrypted even if the --pass parameter is passed in the command invocation. | 7.5 |
2024-07-31 | CVE-2024-39944 | Dahuasecurity | Unspecified vulnerability in Dahuasecurity products A vulnerability has been found in Dahua products.Attackers can send carefully crafted data packets to the interface with vulnerabilities, causing the device to crash. | 7.5 |
2024-07-31 | CVE-2024-39948 | Dahuasecurity | Unspecified vulnerability in Dahuasecurity products A vulnerability has been found in Dahua products. Attackers can send carefully crafted data packets to the interface with vulnerabilities, causing the device to crash. | 7.5 |
2024-07-31 | CVE-2024-39949 | Dahuasecurity | Unspecified vulnerability in Dahuasecurity products A vulnerability has been found in Dahua products. Attackers can send carefully crafted data packets to the interface with vulnerabilities, causing the device to crash. | 7.5 |
2024-07-30 | CVE-2023-33976 | Integer Overflow or Wraparound vulnerability in Google Tensorflow TensorFlow is an end-to-end open source platform for machine learning. | 7.5 | |
2024-07-30 | CVE-2024-5249 | Perforce | Authentication Bypass by Capture-replay vulnerability in Perforce Akana API In versions of Akana API Platform prior to 2024.1.0, SAML tokens can be replayed. | 7.5 |
2024-07-30 | CVE-2022-33167 | IBM | Incorrect Permission Assignment for Critical Resource vulnerability in IBM products IBM Security Directory Integrator 7.2.0 and IBM Security Verify Directory Integrator 10.0.0 could allow a remote attacker to obtain sensitive information, caused by the failure to set the HTTPOnly flag. | 7.5 |
2024-07-30 | CVE-2024-37299 | Discourse | Resource Exhaustion vulnerability in Discourse Discourse is an open source discussion platform. | 7.5 |
2024-07-30 | CVE-2024-23091 | Digitaldruid | Use of Password Hash With Insufficient Computational Effort vulnerability in Digitaldruid Hoteldruid Weak password hashing using MD5 in funzioni.php in HotelDruid before 1.32 allows an attacker to obtain plaintext passwords from hash values. | 7.5 |
2024-07-30 | CVE-2024-38429 | Matrix Globalservices | Unspecified vulnerability in Matrix-Globalservices Tafnit Matrix Tafnit v8 - CWE-552: Files or Directories Accessible to External Parties | 7.5 |
2024-07-30 | CVE-2024-38431 | Matrix Globalservices | Information Exposure Through Discrepancy vulnerability in Matrix-Globalservices Tafnit Matrix Tafnit v8 - CWE-204: Observable Response Discrepancy | 7.5 |
2024-07-30 | CVE-2024-42225 | Linux | Use of Uninitialized Resource vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: replace skb_put with skb_put_zero Avoid potentially reusing uninitialized data | 7.5 |
2024-07-29 | CVE-2024-23261 | Apple | Unspecified vulnerability in Apple Macos A logic issue was addressed with improved state management. | 7.5 |
2024-07-29 | CVE-2024-40786 | Apple | Unspecified vulnerability in Apple Ipados This issue was addressed through improved state management. | 7.5 |
2024-07-29 | CVE-2024-40803 | Apple | Type Confusion vulnerability in Apple Macos A type confusion issue was addressed with improved checks. | 7.5 |
2024-07-29 | CVE-2024-40815 | Apple | Race Condition vulnerability in Apple products A race condition was addressed with additional validation. | 7.5 |
2024-07-29 | CVE-2024-41818 | Fast XML Parser Project | Unspecified vulnerability in Fast-Xml-Parser Project Fast-Xml-Parser 4.2.4 fast-xml-parser is an open source, pure javascript xml parser. | 7.5 |
2024-08-01 | CVE-2024-32865 | Johnsoncontrols | Improper Certificate Validation vulnerability in Johnsoncontrols Exacqvision Server 21.06.11.0/9.6/9.8 Under certain circumstances the exacqVision Server will not properly validate TLS certificates provided by connected devices. | 7.3 |
2024-08-03 | CVE-2024-7446 | Emiloimagtolis | SQL Injection vulnerability in Emiloimagtolis Ticket Reservation System 1.0 A vulnerability, which was classified as critical, was found in itsourcecode Ticket Reservation System 1.0. | 7.2 |
2024-08-03 | CVE-2024-7445 | Emiloimagtolis | SQL Injection vulnerability in Emiloimagtolis Ticket Reservation System 1.0 A vulnerability, which was classified as critical, has been found in itsourcecode Ticket Reservation System 1.0. | 7.2 |
2024-08-02 | CVE-2024-33896 | HMS Networks | OS Command Injection vulnerability in Hms-Networks Ewon Cosy+ Firmware Cosy+ devices running a firmware 21.x below 21.2s10 or a firmware 22.x below 22.1s3 are vulnerable to code injection due to improper parameter blacklisting. | 7.2 |
2024-08-02 | CVE-2024-38482 | Dell | Unspecified vulnerability in Dell Cloudlink CloudLink, versions 7.1.x and 8.x, contain an Improper check or handling of Exceptional Conditions Vulnerability in Cluster Component. | 7.2 |
2024-07-31 | CVE-2022-4002 | Motorola | Command Injection vulnerability in Motorola Q14 Firmware A command injection vulnerability could allow an authenticated user to execute operating system commands as root via a specially crafted API request. | 7.2 |
2024-07-31 | CVE-2024-6770 | The Lifetime free Drag & Drop Contact Form Builder for WordPress VForm plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 2.1.5 due to insufficient input sanitization and output escaping. | 7.2 | |
2024-07-31 | CVE-2024-39946 | Dahuasecurity | Unspecified vulnerability in Dahuasecurity products A vulnerability has been found in Dahua products.After obtaining the administrator's username and password, the attacker can send a carefully crafted data packet to the interface with vulnerabilities, causing device initialization. | 7.2 |
2024-07-31 | CVE-2024-7278 | Itsourcecode | Unspecified vulnerability in Itsourcecode Alton Management System 1.0 A vulnerability was found in itsourcecode Alton Management System 1.0. | 7.2 |
2024-07-31 | CVE-2024-7277 | Itsourcecode | Unspecified vulnerability in Itsourcecode Alton Management System 1.0 A vulnerability was found in itsourcecode Alton Management System 1.0 and classified as critical. | 7.2 |
2024-07-30 | CVE-2024-7275 | Adonesevangelista | Unspecified vulnerability in Adonesevangelista Restaurant Management System 1.0 A vulnerability, which was classified as critical, was found in itsourcecode Alton Management System 1.0. | 7.2 |
2024-07-30 | CVE-2024-7276 | Itsourcecode | Unspecified vulnerability in Itsourcecode Alton Management System 1.0 A vulnerability has been found in itsourcecode Alton Management System 1.0 and classified as critical. | 7.2 |
2024-07-30 | CVE-2024-7274 | Adonesevangelista | SQL Injection vulnerability in Adonesevangelista Restaurant Management System 1.0 A vulnerability, which was classified as critical, has been found in itsourcecode Alton Management System 1.0. | 7.2 |
2024-08-01 | CVE-2024-41144 | Mattermost | Unspecified vulnerability in Mattermost Server Mattermost versions 9.9.x <= 9.9.0, 9.5.x <= 9.5.6, 9.7.x <= 9.7.5, 9.8.x <= 9.8.1 fail to properly validate synced posts, when shared channels are enabled, which allows a malicious remote to create/update/delete arbitrary posts in arbitrary channels | 7.1 |
2024-07-31 | CVE-2023-28074 | Dell | Out-of-bounds Read vulnerability in Dell products Dell BSAFE Crypto-C Micro Edition, version 4.1.5, and Dell BSAFE Micro Edition Suite, versions 4.0 through 4.6.1 and version 5.0, contains an Out-of-bounds Read vulnerability. | 7.1 |
2024-07-30 | CVE-2024-42132 | Linux | Release of Invalid Pointer or Reference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: bluetooth/hci: disallow setting handle bigger than HCI_CONN_HANDLE_MAX Syzbot hit warning in hci_conn_del() caused by freeing handle that was not allocated using ida allocator. This is caused by handle bigger than HCI_CONN_HANDLE_MAX passed by hci_le_big_sync_established_evt(), which makes code think it's unset connection. Add same check for handle upper bound as in hci_conn_set_handle() to prevent warning. | 7.1 |
2024-07-29 | CVE-2024-40774 | Apple | Unspecified vulnerability in Apple products A downgrade issue was addressed with additional code-signing restrictions. | 7.1 |
2024-07-29 | CVE-2024-40787 | Apple | Unspecified vulnerability in Apple products This issue was addressed by adding an additional prompt for user consent. | 7.1 |
2024-07-29 | CVE-2024-40799 | Apple | Out-of-bounds Read vulnerability in Apple products An out-of-bounds read issue was addressed with improved input validation. | 7.1 |
2024-07-29 | CVE-2024-40805 | Apple | Incorrect Default Permissions vulnerability in Apple products A permissions issue was addressed with additional restrictions. | 7.1 |
2024-07-29 | CVE-2024-40814 | Apple | Unspecified vulnerability in Apple Macos A downgrade issue was addressed with additional code-signing restrictions. | 7.1 |
2024-07-29 | CVE-2024-40821 | Apple | Unspecified vulnerability in Apple Macos An access issue was addressed with additional sandbox restrictions. | 7.1 |
2024-07-29 | CVE-2024-41059 | Linux | Use of Uninitialized Resource vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: hfsplus: fix uninit-value in copy_name [syzbot reported] BUG: KMSAN: uninit-value in sized_strscpy+0xc4/0x160 sized_strscpy+0xc4/0x160 copy_name+0x2af/0x320 fs/hfsplus/xattr.c:411 hfsplus_listxattr+0x11e9/0x1a50 fs/hfsplus/xattr.c:750 vfs_listxattr fs/xattr.c:493 [inline] listxattr+0x1f3/0x6b0 fs/xattr.c:840 path_listxattr fs/xattr.c:864 [inline] __do_sys_listxattr fs/xattr.c:876 [inline] __se_sys_listxattr fs/xattr.c:873 [inline] __x64_sys_listxattr+0x16b/0x2f0 fs/xattr.c:873 x64_sys_call+0x2ba0/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:195 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f Uninit was created at: slab_post_alloc_hook mm/slub.c:3877 [inline] slab_alloc_node mm/slub.c:3918 [inline] kmalloc_trace+0x57b/0xbe0 mm/slub.c:4065 kmalloc include/linux/slab.h:628 [inline] hfsplus_listxattr+0x4cc/0x1a50 fs/hfsplus/xattr.c:699 vfs_listxattr fs/xattr.c:493 [inline] listxattr+0x1f3/0x6b0 fs/xattr.c:840 path_listxattr fs/xattr.c:864 [inline] __do_sys_listxattr fs/xattr.c:876 [inline] __se_sys_listxattr fs/xattr.c:873 [inline] __x64_sys_listxattr+0x16b/0x2f0 fs/xattr.c:873 x64_sys_call+0x2ba0/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:195 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f [Fix] When allocating memory to strbuf, initialize memory to 0. | 7.1 |
2024-07-30 | CVE-2024-42162 | Linux | Improper Check for Unusual or Exceptional Conditions vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: gve: Account for stopped queues when reading NIC stats We now account for the fact that the NIC might send us stats for a subset of queues. | 7.0 |
2024-07-30 | CVE-2024-42228 | Linux | Use of Uninitialized Resource vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc Initialize the size before calling amdgpu_vce_cs_reloc, such as case 0x03000001. V2: To really improve the handling we would actually need to have a separate value of 0xffffffff.(Christian) | 7.0 |
2024-07-29 | CVE-2023-42959 | Apple | Race Condition vulnerability in Apple Macos A race condition was addressed with improved state handling. | 7.0 |
2024-07-29 | CVE-2024-41040 | Linux | Use After Free vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: net/sched: Fix UAF when resolving a clash KASAN reports the following UAF: BUG: KASAN: slab-use-after-free in tcf_ct_flow_table_process_conn+0x12b/0x380 [act_ct] Read of size 1 at addr ffff888c07603600 by task handler130/6469 Call Trace: <IRQ> dump_stack_lvl+0x48/0x70 print_address_description.constprop.0+0x33/0x3d0 print_report+0xc0/0x2b0 kasan_report+0xd0/0x120 __asan_load1+0x6c/0x80 tcf_ct_flow_table_process_conn+0x12b/0x380 [act_ct] tcf_ct_act+0x886/0x1350 [act_ct] tcf_action_exec+0xf8/0x1f0 fl_classify+0x355/0x360 [cls_flower] __tcf_classify+0x1fd/0x330 tcf_classify+0x21c/0x3c0 sch_handle_ingress.constprop.0+0x2c5/0x500 __netif_receive_skb_core.constprop.0+0xb25/0x1510 __netif_receive_skb_list_core+0x220/0x4c0 netif_receive_skb_list_internal+0x446/0x620 napi_complete_done+0x157/0x3d0 gro_cell_poll+0xcf/0x100 __napi_poll+0x65/0x310 net_rx_action+0x30c/0x5c0 __do_softirq+0x14f/0x491 __irq_exit_rcu+0x82/0xc0 irq_exit_rcu+0xe/0x20 common_interrupt+0xa1/0xb0 </IRQ> <TASK> asm_common_interrupt+0x27/0x40 Allocated by task 6469: kasan_save_stack+0x38/0x70 kasan_set_track+0x25/0x40 kasan_save_alloc_info+0x1e/0x40 __kasan_krealloc+0x133/0x190 krealloc+0xaa/0x130 nf_ct_ext_add+0xed/0x230 [nf_conntrack] tcf_ct_act+0x1095/0x1350 [act_ct] tcf_action_exec+0xf8/0x1f0 fl_classify+0x355/0x360 [cls_flower] __tcf_classify+0x1fd/0x330 tcf_classify+0x21c/0x3c0 sch_handle_ingress.constprop.0+0x2c5/0x500 __netif_receive_skb_core.constprop.0+0xb25/0x1510 __netif_receive_skb_list_core+0x220/0x4c0 netif_receive_skb_list_internal+0x446/0x620 napi_complete_done+0x157/0x3d0 gro_cell_poll+0xcf/0x100 __napi_poll+0x65/0x310 net_rx_action+0x30c/0x5c0 __do_softirq+0x14f/0x491 Freed by task 6469: kasan_save_stack+0x38/0x70 kasan_set_track+0x25/0x40 kasan_save_free_info+0x2b/0x60 ____kasan_slab_free+0x180/0x1f0 __kasan_slab_free+0x12/0x30 slab_free_freelist_hook+0xd2/0x1a0 __kmem_cache_free+0x1a2/0x2f0 kfree+0x78/0x120 nf_conntrack_free+0x74/0x130 [nf_conntrack] nf_ct_destroy+0xb2/0x140 [nf_conntrack] __nf_ct_resolve_clash+0x529/0x5d0 [nf_conntrack] nf_ct_resolve_clash+0xf6/0x490 [nf_conntrack] __nf_conntrack_confirm+0x2c6/0x770 [nf_conntrack] tcf_ct_act+0x12ad/0x1350 [act_ct] tcf_action_exec+0xf8/0x1f0 fl_classify+0x355/0x360 [cls_flower] __tcf_classify+0x1fd/0x330 tcf_classify+0x21c/0x3c0 sch_handle_ingress.constprop.0+0x2c5/0x500 __netif_receive_skb_core.constprop.0+0xb25/0x1510 __netif_receive_skb_list_core+0x220/0x4c0 netif_receive_skb_list_internal+0x446/0x620 napi_complete_done+0x157/0x3d0 gro_cell_poll+0xcf/0x100 __napi_poll+0x65/0x310 net_rx_action+0x30c/0x5c0 __do_softirq+0x14f/0x491 The ct may be dropped if a clash has been resolved but is still passed to the tcf_ct_flow_table_process_conn function for further usage. | 7.0 |
267 Medium Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2024-07-31 | CVE-2024-31201 | Proges | Unquoted Search Path or Element vulnerability in Proges Thermoscan IP 20211103 A “CWE-428: Unquoted Search Path or Element” affects the ThermoscanIP_Scrutation service. | 6.7 |
2024-07-29 | CVE-2024-27878 | Apple | Classic Buffer Overflow vulnerability in Apple Macos A buffer overflow issue was addressed with improved memory handling. | 6.7 |
2024-08-02 | CVE-2024-33895 | HMS Networks | Use of Hard-coded Credentials vulnerability in Hms-Networks Ewon Cosy+ Firmware Cosy+ devices running a firmware 21.x below 21.2s10 or a firmware 22.x below 22.1s3 use a unique key to encrypt the configuration parameters. | 6.6 |
2024-08-04 | CVE-2024-6331 | Stitionai | Injection vulnerability in Stitionai Devika stitionai/devika main branch as of commit cdfb782b0e634b773b10963c8034dc9207ba1f9f is vulnerable to Local File Read (LFI) by Prompt Injection. | 6.5 |
2024-08-03 | CVE-2024-37286 | Elastic | Information Exposure Through Log Files vulnerability in Elastic APM Server APM server logs contain document body from a partially failed bulk index request. | 6.5 |
2024-08-03 | CVE-2024-38321 | IBM | Information Exposure Through Log Files vulnerability in IBM Business Automation Workflow IBM Business Automation Workflow 22.0.2, 23.0.1, 23.0.2, and 24.0.0 stores potentially sensitive information in log files under certain situations that could be read by an authenticated user. | 6.5 |
2024-08-02 | CVE-2024-38878 | Siemens | Path Traversal vulnerability in Siemens Omnivise T3000 Application Server R9.2 A vulnerability has been identified in Omnivise T3000 Application Server R9.2 (All versions), Omnivise T3000 R8.2 SP3 (All versions), Omnivise T3000 R8.2 SP4 (All versions). | 6.5 |
2024-08-02 | CVE-2024-7323 | Digiwin | Path Traversal vulnerability in Digiwin Easyflow .Net Digiwin EasyFlow .NET lacks proper access control for specific functionality, and the functionality do not adequately filter user input. | 6.5 |
2024-08-02 | CVE-2024-40719 | Changingtec | Inadequate Encryption Strength vulnerability in Changingtec TCB Servisign The encryption strength of the authorization keys in CHANGING Information Technology TCBServiSign Windows Version is insufficient. | 6.5 |
2024-08-01 | CVE-2024-39274 | Mattermost | Unspecified vulnerability in Mattermost Mattermost versions 9.9.x <= 9.9.0, 9.5.x <= 9.5.6, 9.7.x <= 9.7.5 and 9.8.x <= 9.8.1 fail to properly validate that the channel that comes from the sync message is a shared channel, when shared channels are enabled, which allows a malicious remote to add users to arbitrary teams and channels | 6.5 |
2024-07-31 | CVE-2022-4003 | Motorola | Unspecified vulnerability in Motorola Q14 Firmware A denial-of-service vulnerability could allow an authenticated user to trigger an internal service restart via a specially crafted API request. | 6.5 |
2024-07-31 | CVE-2024-6977 | Catonetworks | Information Exposure Through Log Files vulnerability in Catonetworks Cato Client A vulnerability in Cato Networks SDP Client on Windows allows the insertion of sensitive information into the log file, which can lead to an account takeover. | 6.5 |
2024-07-31 | CVE-2024-7135 | The Tainacan plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'get_file' function in all versions up to, and including, 0.21.7. | 6.5 | |
2024-07-31 | CVE-2024-7264 | Haxx | Out-of-bounds Read vulnerability in Haxx Libcurl libcurl's ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. | 6.5 |
2024-07-31 | CVE-2024-39947 | Dahuasecurity | Unspecified vulnerability in Dahuasecurity products A vulnerability has been found in Dahua products.After obtaining the ordinary user's username and password, the attacker can send a carefully crafted data packet to the interface with vulnerabilities, causing the device to crash. | 6.5 |
2024-07-30 | CVE-2023-38001 | IBM | Unspecified vulnerability in IBM Aspera Orchestrator 4.0.1 IBM Aspera Orchestrator 4.0.1 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. | 6.5 |
2024-07-30 | CVE-2024-41804 | Xibosignage | SQL Injection vulnerability in Xibosignage Xibo Xibo is a content management system (CMS). | 6.5 |
2024-07-29 | CVE-2024-40782 | Apple | Use After Free vulnerability in Apple products A use-after-free issue was addressed with improved memory management. | 6.5 |
2024-07-29 | CVE-2024-40789 | Apple | Unspecified vulnerability in Apple products An out-of-bounds access issue was addressed with improved bounds checking. | 6.5 |
2024-08-03 | CVE-2024-7356 | The Zephyr Project Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘filename’ parameter in all versions up to, and including, 3.3.100 due to insufficient input sanitization and output escaping. | 6.4 | |
2024-08-02 | CVE-2024-3827 | The Spectra Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via block ids in all versions up to, and including, 1.1.4 due to insufficient input sanitization and output escaping on user supplied attributes. | 6.4 | |
2024-08-01 | CVE-2024-41949 | Biscuitsec | Unspecified vulnerability in Biscuitsec Biscuit-Auth biscuit-rust is the Rust implementation of Biscuit, an authentication and authorization token for microservices architectures. | 6.4 |
2024-08-01 | CVE-2024-36492 | Mattermost | Unspecified vulnerability in Mattermost Mattermost versions 9.9.x <= 9.9.0, 9.5.x <= 9.5.6, 9.7.x <= 9.7.5, 9.8.x <= 9.8.1 fail to disallow the modification of local users when syncing users in shared channels. | 6.4 |
2024-08-01 | CVE-2024-2455 | The Element Pack - Addon for Elementor Page Builder WordPress Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the widget wrapper link URL in all versions up to, and including, 7.9.0 due to insufficient input sanitization and output escaping on user supplied attributes. | 6.4 | |
2024-08-01 | CVE-2024-6346 | The Gutenberg Blocks, Page Builder – ComboBlocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the redirectURL parameter of the Date Countdown widget, in all versions up to, and including, 2.2.85a due to insufficient input sanitization and output escaping on user supplied attributes. | 6.4 | |
2024-08-01 | CVE-2024-2090 | Doublesharp | Server-Side Request Forgery (SSRF) vulnerability in Doublesharp Remote Content Shortcode The Remote Content Shortcode plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.5 via the remote_content shortcode. | 6.4 |
2024-07-31 | CVE-2024-6208 | The Download Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wpdm_all_packages' shortcode in all versions up to, and including, 3.2.97 due to insufficient input sanitization and output escaping on the 'cols' parameter. | 6.4 | |
2024-08-01 | CVE-2024-41962 | Yonle | Unspecified vulnerability in Yonle Bostr Bostr is an nostr relay aggregator proxy that acts like a regular nostr relay. | 6.3 |
2024-08-01 | CVE-2024-7330 | Youdiancms | Server-Side Request Forgery (SSRF) vulnerability in Youdiancms 7.0 A vulnerability has been found in YouDianCMS 7 and classified as critical. | 6.3 |
2024-07-30 | CVE-2024-42161 | Linux | Use of Uninitialized Resource vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: bpf: Avoid uninitialized value in BPF_CORE_READ_BITFIELD [Changes from V1: - Use a default branch in the switch statement to initialize `val'.] GCC warns that `val' may be used uninitialized in the BPF_CRE_READ_BITFIELD macro, defined in bpf_core_read.h as: [...] unsigned long long val; \ [...] \ switch (__CORE_RELO(s, field, BYTE_SIZE)) { \ case 1: val = *(const unsigned char *)p; break; \ case 2: val = *(const unsigned short *)p; break; \ case 4: val = *(const unsigned int *)p; break; \ case 8: val = *(const unsigned long long *)p; break; \ } \ [...] val; \ } \ This patch adds a default entry in the switch statement that sets `val' to zero in order to avoid the warning, and random values to be used in case __builtin_preserve_field_info returns unexpected values for BPF_FIELD_BYTE_SIZE. Tested in bpf-next master. No regressions. | 6.3 |
2024-07-29 | CVE-2023-42918 | Apple | Unspecified vulnerability in Apple Macos A permissions issue was addressed with additional restrictions. | 6.3 |
2024-08-02 | CVE-2024-33893 | HMS Networks | Cross-site Scripting vulnerability in Hms-Networks Ewon Cosy+ Firmware Cosy+ devices running a firmware 21.x below 21.2s10 or a firmware 22.x below 22.1s3 are vulnerable to XSS when displaying the logs due to improper input sanitization. | 6.1 |
2024-08-02 | CVE-2024-7204 | AI3 | Cross-site Scripting vulnerability in AI3 Qbibot 8.0.9 Ai3 QbiBot does not properly filter user input, allowing unauthenticated remote attackers to insert JavaScript code into the chat box. | 6.1 |
2024-08-01 | CVE-2024-39631 | Contest Gallery | Cross-site Scripting vulnerability in Contest-Gallery Contest Gallery Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Contest Gallery allows Stored XSS.This issue affects Contest Gallery: from n/a through 23.1.2. | 6.1 |
2024-08-01 | CVE-2024-39643 | Metagauss | Cross-site Scripting vulnerability in Metagauss Registrationmagic Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in RegistrationMagic Forms RegistrationMagic allows Stored XSS.This issue affects RegistrationMagic: from n/a through 6.0.0.1. | 6.1 |
2024-08-01 | CVE-2024-39646 | Kunalnagar | Cross-site Scripting vulnerability in Kunalnagar Custom 404 PRO Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Kunal Nagar Custom 404 Pro allows Reflected XSS.This issue affects Custom 404 Pro: from n/a through 3.11.1. | 6.1 |
2024-08-01 | CVE-2024-39647 | Kofimokome | Cross-site Scripting vulnerability in Kofimokome Message Filter for Contact Form 7 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Kofi Mokome Message Filter for Contact Form 7 allows Reflected XSS.This issue affects Message Filter for Contact Form 7: from n/a through 1.6.1.1. | 6.1 |
2024-08-01 | CVE-2024-7211 | 1E | Open Redirect vulnerability in 1E Platform The 1E Platform's component utilized the third-party Duende Identity Server, which suffered from an open redirect vulnerability, permitting an attacker to control the redirection path of end users. Note: 1E Platform's component utilizing the third-party Duende Identity Server has been updated with the patch that includes the fix. | 6.1 |
2024-08-01 | CVE-2024-7359 | Oretnom23 | Cross-site Scripting vulnerability in Oretnom23 Tracking Monitoring Management System 1.0 A vulnerability was found in SourceCodester Tracking Monitoring Management System 1.0. | 6.1 |
2024-08-01 | CVE-2024-7342 | Baidu | Unrestricted Upload of File with Dangerous Type vulnerability in Baidu Ueditor A vulnerability was found in Baidu UEditor 1.4.3.3. | 6.1 |
2024-08-01 | CVE-2024-7343 | Baidu | Cross-site Scripting vulnerability in Baidu Ueditor 1.4.2 A vulnerability was found in Baidu UEditor 1.4.2. | 6.1 |
2024-07-31 | CVE-2024-41953 | Zitadel | Cross-site Scripting vulnerability in Zitadel Zitadel is an open source identity management system. | 6.1 |
2024-07-31 | CVE-2024-31199 | Proges | Cross-site Scripting vulnerability in Proges Sensor NET Connect Firmware V2 2.24 A “CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')” allows malicious users to permanently inject arbitrary Javascript code. | 6.1 |
2024-07-31 | CVE-2024-7321 | Adonesevangelista | Cross-site Scripting vulnerability in Adonesevangelista Online Blood Bank Management System 1.0 A vulnerability classified as problematic was found in itsourcecode Online Blood Bank Management System 1.0. | 6.1 |
2024-07-31 | CVE-2024-7310 | Jkev | Cross-site Scripting vulnerability in Jkev Record Management System 1.0 A vulnerability was found in SourceCodester Record Management System 1.0. | 6.1 |
2024-07-30 | CVE-2024-37165 | Discourse | Cross-site Scripting vulnerability in Discourse Discourse is an open source discussion platform. | 6.1 |
2024-07-30 | CVE-2024-39320 | Discourse | Improper Restriction of Rendered UI Layers or Frames vulnerability in Discourse Discourse is an open source discussion platform. | 6.1 |
2024-07-30 | CVE-2024-7127 | Stackposts | Cross-site Scripting vulnerability in Stackposts Social Marketing Tool Improper Neutralization of Input During Web Page Generation vulnerability in Stackposts Social Marketing Tool allows Cross-site Scripting (XSS) attack. By submitting the payload in the username during registration, it can be executed later in the application panel. | 6.1 |
2024-07-30 | CVE-2024-38430 | Matrix Globalservices | Unspecified vulnerability in Matrix-Globalservices Tafnit Matrix - CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | 6.1 |
2024-07-30 | CVE-2024-42224 | Linux | Improper Check for Unusual or Exceptional Conditions vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: net: dsa: mv88e6xxx: Correct check for empty list Since commit a3c53be55c95 ("net: dsa: mv88e6xxx: Support multiple MDIO busses") mv88e6xxx_default_mdio_bus() has checked that the return value of list_first_entry() is non-NULL. This appears to be intended to guard against the list chip->mdios being empty. | 6.1 |
2024-07-30 | CVE-2024-7218 | Oretnom23 | Cross-site Scripting vulnerability in Oretnom23 School LOG Management System 1.0 A vulnerability was found in SourceCodester School Log Management System 1.0. | 6.1 |
2024-07-29 | CVE-2024-27877 | Apple | Unspecified vulnerability in Apple Macos The issue was addressed with improved memory handling. | 6.1 |
2024-07-29 | CVE-2024-40785 | Apple | Cross-site Scripting vulnerability in Apple products This issue was addressed with improved checks. | 6.1 |
2024-07-29 | CVE-2024-40817 | Apple | Improper Restriction of Rendered UI Layers or Frames vulnerability in Apple Macos The issue was addressed with improved UI handling. | 6.1 |
2024-07-29 | CVE-2024-41810 | Twisted | Cross-site Scripting vulnerability in Twisted Twisted is an event-based framework for internet applications, supporting Python 3.6+. | 6.1 |
2024-07-31 | CVE-2024-41256 | Filestash | Improper Certificate Validation vulnerability in Filestash Default configurations in the ShareProofVerifier function of filestash v0.4 causes the application to skip the TLS certificate verification process when sending out email verification codes, possibly allowing attackers to access sensitive data via a man-in-the-middle attack. | 5.9 |
2024-07-31 | CVE-2024-41108 | Fogproject | Missing Authorization vulnerability in Fogproject 1.5.10/1.5.10.15 FOG is a free open-source cloning/imaging/rescue suite/inventory management system. | 5.9 |
2024-07-29 | CVE-2024-27823 | Apple | Race Condition vulnerability in Apple products A race condition was addressed with improved locking. | 5.9 |
2024-08-01 | CVE-2024-32931 | Johnsoncontrols | Unspecified vulnerability in Johnsoncontrols Exacqvision web Service 20.06.11.0/20.06.3.0/21.03 Under certain circumstances the exacqVision Web Service can expose authentication token details within communications. | 5.7 |
2024-07-31 | CVE-2017-3772 | Lenovo | Unspecified vulnerability in Lenovo Pcmanager A vulnerability was reported in Lenovo PC Manager versions prior to 2.6.40.3154 that could allow an attacker to cause a system reboot. | 5.5 |
2024-07-31 | CVE-2024-31203 | Proges | Out-of-bounds Write vulnerability in Proges Thermoscan IP 20211103 A “CWE-121: Stack-based Buffer Overflow” in the wd210std.dll dynamic library packaged with the ThermoscanIP installer allows a local attacker to possibly trigger a Denial-of-Service (DoS) condition on the target component. | 5.5 |
2024-07-31 | CVE-2024-39379 | Adobe | Out-of-bounds Read vulnerability in Adobe Acrobat 120.0.2210.91 Acrobat for Edge versions 126.0.2592.81 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. | 5.5 |
2024-07-30 | CVE-2024-41437 | Dbohdan | Out-of-bounds Write vulnerability in Dbohdan Hicolor 0.5.0 A heap buffer overflow in the function cp_unfilter() (/vendor/cute_png.h) of hicolor v0.5.0 allows attackers to cause a Denial of Service (DoS) via a crafted PNG file. | 5.5 |
2024-07-30 | CVE-2024-41439 | Dbohdan | Out-of-bounds Write vulnerability in Dbohdan Hicolor 0.5.0 A heap buffer overflow in the function cp_block() (/vendor/cute_png.h) of hicolor v0.5.0 allows attackers to cause a Denial of Service (DoS) via a crafted PNG file. | 5.5 |
2024-07-30 | CVE-2024-41443 | Dbohdan | Out-of-bounds Write vulnerability in Dbohdan Hicolor 0.5.0 A stack overflow in the function cp_dynamic() (/vendor/cute_png.h) of hicolor v0.5.0 allows attackers to cause a Denial of Service (DoS) via a crafted PNG file. | 5.5 |
2024-07-30 | CVE-2023-26288 | IBM | Unspecified vulnerability in IBM Aspera Orchestrator 4.0.1 IBM Aspera Orchestrator 4.0.1 does not invalidate session after a password change which could allow an authenticated user to impersonate another user on the system. | 5.5 |
2024-07-30 | CVE-2024-42101 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes In nouveau_connector_get_modes(), the return value of drm_mode_duplicate() is assigned to mode, which will lead to a possible NULL pointer dereference on failure of drm_mode_duplicate(). | 5.5 |
2024-07-30 | CVE-2024-42106 | Linux | Use of Uninitialized Resource vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: inet_diag: Initialize pad field in struct inet_diag_req_v2 KMSAN reported uninit-value access in raw_lookup() [1]. | 5.5 |
2024-07-30 | CVE-2024-42109 | Linux | Unspecified vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: unconditionally flush pending work before notifier syzbot reports: KASAN: slab-uaf in nft_ctx_update include/net/netfilter/nf_tables.h:1831 KASAN: slab-uaf in nft_commit_release net/netfilter/nf_tables_api.c:9530 KASAN: slab-uaf int nf_tables_trans_destroy_work+0x152b/0x1750 net/netfilter/nf_tables_api.c:9597 Read of size 2 at addr ffff88802b0051c4 by task kworker/1:1/45 [..] Workqueue: events nf_tables_trans_destroy_work Call Trace: nft_ctx_update include/net/netfilter/nf_tables.h:1831 [inline] nft_commit_release net/netfilter/nf_tables_api.c:9530 [inline] nf_tables_trans_destroy_work+0x152b/0x1750 net/netfilter/nf_tables_api.c:9597 Problem is that the notifier does a conditional flush, but its possible that the table-to-be-removed is still referenced by transactions being processed by the worker, so we need to flush unconditionally. We could make the flush_work depend on whether we found a table to delete in nf-next to avoid the flush for most cases. AFAICS this problem is only exposed in nf-next, with commit e169285f8c56 ("netfilter: nf_tables: do not store nft_ctx in transaction objects"), with this commit applied there is an unconditional fetch of table->family which is whats triggering the above splat. | 5.5 |
2024-07-30 | CVE-2024-42122 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Add NULL pointer check for kzalloc [Why & How] Check return pointer of kzalloc before using it. | 5.5 |
2024-07-30 | CVE-2024-42133 | Linux | Unspecified vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Ignore too large handle values in BIG hci_le_big_sync_established_evt is necessary to filter out cases where the handle value is belonging to ida id range, otherwise ida will be erroneously released in hci_conn_cleanup. | 5.5 |
2024-07-30 | CVE-2024-42134 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: virtio-pci: Check if is_avq is NULL [bug] In the virtio_pci_common.c function vp_del_vqs, vp_dev->is_avq is involved to determine whether it is admin virtqueue, but this function vp_dev->is_avq may be empty. | 5.5 |
2024-07-30 | CVE-2024-42135 | Linux | Unspecified vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: vhost_task: Handle SIGKILL by flushing work and exiting Instead of lingering until the device is closed, this has us handle SIGKILL by: 1. | 5.5 |
2024-07-30 | CVE-2024-42137 | Linux | Unspecified vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: Bluetooth: qca: Fix BT enable failure again for QCA6390 after warm reboot Commit 272970be3dab ("Bluetooth: hci_qca: Fix driver shutdown on closed serdev") will cause below regression issue: BT can't be enabled after below steps: cold boot -> enable BT -> disable BT -> warm reboot -> BT enable failure if property enable-gpios is not configured within DT|ACPI for QCA6390. The commit is to fix a use-after-free issue within qca_serdev_shutdown() by adding condition to avoid the serdev is flushed or wrote after closed but also introduces this regression issue regarding above steps since the VSC is not sent to reset controller during warm reboot. Fixed by sending the VSC to reset controller within qca_serdev_shutdown() once BT was ever enabled, and the use-after-free issue is also fixed by this change since the serdev is still opened before it is flushed or wrote. Verified by the reported machine Dell XPS 13 9310 laptop over below two kernel commits: commit e00fc2700a3f ("Bluetooth: btusb: Fix triggering coredump implementation for QCA") of bluetooth-next tree. commit b23d98d46d28 ("Bluetooth: btusb: Fix triggering coredump implementation for QCA") of linus mainline tree. | 5.5 |
2024-07-30 | CVE-2024-42139 | Linux | Improper Check for Unusual or Exceptional Conditions vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: ice: Fix improper extts handling Extts events are disabled and enabled by the application ts2phc. However, in case where the driver is removed when the application is running, a specific extts event remains enabled and can cause a kernel crash. As a side effect, when the driver is reloaded and application is started again, remaining extts event for the channel from a previous run will keep firing and the message "extts on unexpected channel" might be printed to the user. To avoid that, extts events shall be disabled when PTP is released. | 5.5 |
2024-07-30 | CVE-2024-42140 | Linux | Improper Locking vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: riscv: kexec: Avoid deadlock in kexec crash path If the kexec crash code is called in the interrupt context, the machine_kexec_mask_interrupts() function will trigger a deadlock while trying to acquire the irqdesc spinlock and then deactivate irqchip in irq_set_irqchip_state() function. Unlike arm64, riscv only requires irq_eoi handler to complete EOI and keeping irq_set_irqchip_state() will only leave this possible deadlock without any use. | 5.5 |
2024-07-30 | CVE-2024-42141 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ISO: Check socket flag instead of hcon This fixes the following Smatch static checker warning: net/bluetooth/iso.c:1364 iso_sock_recvmsg() error: we previously assumed 'pi->conn->hcon' could be null (line 1359) net/bluetooth/iso.c 1347 static int iso_sock_recvmsg(struct socket *sock, struct msghdr *msg, 1348 size_t len, int flags) 1349 { 1350 struct sock *sk = sock->sk; 1351 struct iso_pinfo *pi = iso_pi(sk); 1352 1353 BT_DBG("sk %p", sk); 1354 1355 if (test_and_clear_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) { 1356 lock_sock(sk); 1357 switch (sk->sk_state) { 1358 case BT_CONNECT2: 1359 if (pi->conn->hcon && ^^^^^^^^^^^^^^ If ->hcon is NULL 1360 test_bit(HCI_CONN_PA_SYNC, &pi->conn->hcon->flags)) { 1361 iso_conn_big_sync(sk); 1362 sk->sk_state = BT_LISTEN; 1363 } else { --> 1364 iso_conn_defer_accept(pi->conn->hcon); ^^^^^^^^^^^^^^ then we're toast 1365 sk->sk_state = BT_CONFIG; 1366 } 1367 release_sock(sk); 1368 return 0; 1369 case BT_CONNECTED: 1370 if (test_bit(BT_SK_PA_SYNC, | 5.5 |
2024-07-30 | CVE-2024-42142 | Linux | Unspecified vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: net/mlx5: E-switch, Create ingress ACL when needed Currently, ingress acl is used for three features. | 5.5 |
2024-07-30 | CVE-2024-42144 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: thermal/drivers/mediatek/lvts_thermal: Check NULL ptr on lvts_data Verify that lvts_data is not NULL before using it. | 5.5 |
2024-07-30 | CVE-2024-42145 | Linux | Allocation of Resources Without Limits or Throttling vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: IB/core: Implement a limit on UMAD receive List The existing behavior of ib_umad, which maintains received MAD packets in an unbounded list, poses a risk of uncontrolled growth. As user-space applications extract packets from this list, the rate of extraction may not match the rate of incoming packets, leading to potential list overflow. To address this, we introduce a limit to the size of the list. | 5.5 |
2024-07-30 | CVE-2024-42146 | Linux | Unspecified vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: drm/xe: Add outer runtime_pm protection to xe_live_ktest@xe_dma_buf Any kunit doing any memory access should get their own runtime_pm outer references since they don't use the standard driver API entries. | 5.5 |
2024-07-30 | CVE-2024-42149 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: fs: don't misleadingly warn during thaw operations The block device may have been frozen before it was claimed by a filesystem. | 5.5 |
2024-07-30 | CVE-2024-42150 | Linux | Unspecified vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: net: txgbe: remove separate irq request for MSI and INTx When using MSI or INTx interrupts, request_irq() for pdev->irq will conflict with request_threaded_irq() for txgbe->misc.irq, to cause system crash. | 5.5 |
2024-07-30 | CVE-2024-42151 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: bpf: mark bpf_dummy_struct_ops.test_1 parameter as nullable Test case dummy_st_ops/dummy_init_ret_value passes NULL as the first parameter of the test_1() function. | 5.5 |
2024-07-30 | CVE-2024-42153 | Linux | Improper Locking vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: i2c: pnx: Fix potential deadlock warning from del_timer_sync() call in isr When del_timer_sync() is called in an interrupt context it throws a warning because of potential deadlock. | 5.5 |
2024-07-30 | CVE-2024-42223 | Linux | Integer Overflow or Wraparound vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: media: dvb-frontends: tda10048: Fix integer overflow state->xtal_hz can be up to 16M, so it can overflow a 32 bit integer when multiplied by pll_mfactor. Create a new 64 bit variable to hold the calculations. | 5.5 |
2024-07-30 | CVE-2024-42231 | Linux | Incorrect Calculation vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: btrfs: zoned: fix calc_available_free_space() for zoned mode calc_available_free_space() returns the total size of metadata (or system) block groups, which can be allocated from unallocated disk space. | 5.5 |
2024-07-29 | CVE-2024-27809 | Apple | Unspecified vulnerability in Apple Macos A privacy issue was addressed with improved private data redaction for log entries. | 5.5 |
2024-07-29 | CVE-2024-27863 | Apple | Unspecified vulnerability in Apple products An information disclosure issue was addressed with improved private data redaction for log entries. | 5.5 |
2024-07-29 | CVE-2024-27871 | Apple | Path Traversal vulnerability in Apple Macos A path handling issue was addressed with improved validation. | 5.5 |
2024-07-29 | CVE-2024-27872 | Apple | Unspecified vulnerability in Apple Macos This issue was addressed with improved validation of symlinks. | 5.5 |
2024-07-29 | CVE-2024-27873 | Apple | Out-of-bounds Write vulnerability in Apple Macos An out-of-bounds write issue was addressed with improved input validation. | 5.5 |
2024-07-29 | CVE-2024-27884 | Apple | Unspecified vulnerability in Apple products This issue was addressed with a new entitlement. | 5.5 |
2024-07-29 | CVE-2024-27886 | Apple | Unspecified vulnerability in Apple Macos A logic issue was addressed with improved restrictions. | 5.5 |
2024-07-29 | CVE-2024-27887 | Apple | Path Traversal vulnerability in Apple Macos A path handling issue was addressed with improved validation. | 5.5 |
2024-07-29 | CVE-2024-27888 | Apple | Incorrect Default Permissions vulnerability in Apple Macos A permissions issue was addressed by removing vulnerable code and adding additional checks. | 5.5 |
2024-07-29 | CVE-2024-40775 | Apple | Unspecified vulnerability in Apple Macos A downgrade issue was addressed with additional code-signing restrictions. | 5.5 |
2024-07-29 | CVE-2024-40777 | Apple | Out-of-bounds Write vulnerability in Apple products An out-of-bounds access issue was addressed with improved bounds checking. | 5.5 |
2024-07-29 | CVE-2024-40779 | Apple | Out-of-bounds Read vulnerability in Apple products An out-of-bounds read was addressed with improved bounds checking. | 5.5 |
2024-07-29 | CVE-2024-40780 | Apple | Out-of-bounds Read vulnerability in Apple products An out-of-bounds read was addressed with improved bounds checking. | 5.5 |
2024-07-29 | CVE-2024-40783 | Apple | Unspecified vulnerability in Apple Macos The issue was addressed with improved restriction of data container access. | 5.5 |
2024-07-29 | CVE-2024-40784 | Apple | Integer Overflow or Wraparound vulnerability in Apple products An integer overflow was addressed with improved input validation. | 5.5 |
2024-07-29 | CVE-2024-40788 | Apple | Type Confusion vulnerability in Apple products A type confusion issue was addressed with improved memory handling. | 5.5 |
2024-07-29 | CVE-2024-40793 | Apple | Unspecified vulnerability in Apple products This issue was addressed by removing the vulnerable code. | 5.5 |
2024-07-29 | CVE-2024-40800 | Apple | Unspecified vulnerability in Apple Macos An input validation issue was addressed with improved input validation. | 5.5 |
2024-07-29 | CVE-2024-40804 | Apple | Unspecified vulnerability in Apple Macos The issue was addressed with improved checks. | 5.5 |
2024-07-29 | CVE-2024-40806 | Apple | Out-of-bounds Read vulnerability in Apple products An out-of-bounds read issue was addressed with improved input validation. | 5.5 |
2024-07-29 | CVE-2024-40807 | Apple | Unspecified vulnerability in Apple Macos A logic issue was addressed with improved checks. | 5.5 |
2024-07-29 | CVE-2024-40811 | Apple | Unspecified vulnerability in Apple Macos The issue was addressed with improved checks. | 5.5 |
2024-07-29 | CVE-2024-40816 | Apple | Out-of-bounds Read vulnerability in Apple Macos An out-of-bounds read was addressed with improved input validation. | 5.5 |
2024-07-29 | CVE-2024-40823 | Apple | Unspecified vulnerability in Apple Macos The issue was addressed with improved checks. | 5.5 |
2024-07-29 | CVE-2024-40824 | Apple | Unspecified vulnerability in Apple products This issue was addressed through improved state management. | 5.5 |
2024-07-29 | CVE-2024-40827 | Apple | Unspecified vulnerability in Apple Macos The issue was addressed with improved checks. | 5.5 |
2024-07-29 | CVE-2024-40833 | Apple | Unspecified vulnerability in Apple Macos A logic issue was addressed with improved checks. | 5.5 |
2024-07-29 | CVE-2024-40835 | Apple | Unspecified vulnerability in Apple products A logic issue was addressed with improved checks. | 5.5 |
2024-07-29 | CVE-2024-40836 | Apple | Unspecified vulnerability in Apple products A logic issue was addressed with improved checks. | 5.5 |
2024-07-29 | CVE-2023-42943 | Apple | Unspecified vulnerability in Apple Macos A privacy issue was addressed with improved private data redaction for log entries. | 5.5 |
2024-07-29 | CVE-2024-42085 | Linux | Improper Locking vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: core: remove lock of otg mode during gadget suspend/resume to avoid deadlock When config CONFIG_USB_DWC3_DUAL_ROLE is selected, and trigger system to enter suspend status with below command: echo mem > /sys/power/state There will be a deadlock issue occurring. | 5.5 |
2024-07-29 | CVE-2024-42089 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: ASoC: fsl-asoc-card: set priv->pdev before using it priv->pdev pointer was set after being used in fsl_asoc_card_audmux_init(). Move this assignment at the start of the probe function, so sub-functions can correctly use pdev through priv. fsl_asoc_card_audmux_init() dereferences priv->pdev to get access to the dev struct, used with dev_err macros. As priv is zero-initialised, there would be a NULL pointer dereference. Note that if priv->dev is dereferenced before assignment but never used, for example if there is no error to be printed, the driver won't crash probably due to compiler optimisations. | 5.5 |
2024-07-29 | CVE-2024-42090 | Linux | Improper Locking vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER In create_pinctrl(), pinctrl_maps_mutex is acquired before calling add_setting(). | 5.5 |
2024-07-29 | CVE-2024-41083 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: netfs: Fix netfs_page_mkwrite() to check folio->mapping is valid Fix netfs_page_mkwrite() to check that folio->mapping is valid once it has taken the folio lock (as filemap_page_mkwrite() does). | 5.5 |
2024-07-29 | CVE-2024-41084 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: cxl/region: Avoid null pointer dereference in region lookup cxl_dpa_to_region() looks up a region based on a memdev and DPA. It wrongly assumes an endpoint found mapping the DPA is also of a fully assembled region. | 5.5 |
2024-07-29 | CVE-2024-41085 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: cxl/mem: Fix no cxl_nvd during pmem region auto-assembling When CXL subsystem is auto-assembling a pmem region during cxl endpoint port probing, always hit below calltrace. BUG: kernel NULL pointer dereference, address: 0000000000000078 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page RIP: 0010:cxl_pmem_region_probe+0x22e/0x360 [cxl_pmem] Call Trace: <TASK> ? __die+0x24/0x70 ? page_fault_oops+0x82/0x160 ? do_user_addr_fault+0x65/0x6b0 ? exc_page_fault+0x7d/0x170 ? asm_exc_page_fault+0x26/0x30 ? cxl_pmem_region_probe+0x22e/0x360 [cxl_pmem] ? cxl_pmem_region_probe+0x1ac/0x360 [cxl_pmem] cxl_bus_probe+0x1b/0x60 [cxl_core] really_probe+0x173/0x410 ? __pfx___device_attach_driver+0x10/0x10 __driver_probe_device+0x80/0x170 driver_probe_device+0x1e/0x90 __device_attach_driver+0x90/0x120 bus_for_each_drv+0x84/0xe0 __device_attach+0xbc/0x1f0 bus_probe_device+0x90/0xa0 device_add+0x51c/0x710 devm_cxl_add_pmem_region+0x1b5/0x380 [cxl_core] cxl_bus_probe+0x1b/0x60 [cxl_core] The cxl_nvd of the memdev needs to be available during the pmem region probe. | 5.5 |
2024-07-29 | CVE-2024-41088 | Linux | Infinite Loop vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: can: mcp251xfd: fix infinite loop when xmit fails When the mcp251xfd_start_xmit() function fails, the driver stops processing messages, and the interrupt routine does not return, running indefinitely even after killing the running application. Error messages: [ 441.298819] mcp251xfd spi2.0 can0: ERROR in mcp251xfd_start_xmit: -16 [ 441.306498] mcp251xfd spi2.0 can0: Transmit Event FIFO buffer not empty. | 5.5 |
2024-07-29 | CVE-2024-41089 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes In nv17_tv_get_hd_modes(), the return value of drm_mode_duplicate() is assigned to mode, which will lead to a possible NULL pointer dereference on failure of drm_mode_duplicate(). | 5.5 |
2024-07-29 | CVE-2024-41093 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: avoid using null object of framebuffer Instead of using state->fb->obj[0] directly, get object from framebuffer by calling drm_gem_fb_get_obj() and return error code when object is null to avoid using null object of framebuffer. | 5.5 |
2024-07-29 | CVE-2024-41094 | Linux | Unspecified vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: drm/fbdev-dma: Only set smem_start is enable per module option Only export struct fb_info.fix.smem_start if that is required by the user and the memory does not come from vmalloc(). Setting struct fb_info.fix.smem_start breaks systems where DMA memory is backed by vmalloc address space. | 5.5 |
2024-07-29 | CVE-2024-41095 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes In nv17_tv_get_ld_modes(), the return value of drm_mode_duplicate() is assigned to mode, which will lead to a possible NULL pointer dereference on failure of drm_mode_duplicate(). | 5.5 |
2024-07-29 | CVE-2024-41097 | Linux | Unspecified vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: usb: atm: cxacru: fix endpoint checking in cxacru_bind() Syzbot is still reporting quite an old issue [1] that occurs due to incomplete checking of present usb endpoints. | 5.5 |
2024-07-29 | CVE-2024-41098 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: ata: libata-core: Fix null pointer dereference on error If the ata_port_alloc() call in ata_host_alloc() fails, ata_host_release() will get called. However, the code in ata_host_release() tries to free ata_port struct members unconditionally, which can lead to the following: BUG: unable to handle page fault for address: 0000000000003990 PGD 0 P4D 0 Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI CPU: 10 PID: 594 Comm: (udev-worker) Not tainted 6.10.0-rc5 #44 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40 04/01/2014 RIP: 0010:ata_host_release.cold+0x2f/0x6e [libata] Code: e4 4d 63 f4 44 89 e2 48 c7 c6 90 ad 32 c0 48 c7 c7 d0 70 33 c0 49 83 c6 0e 41 RSP: 0018:ffffc90000ebb968 EFLAGS: 00010246 RAX: 0000000000000041 RBX: ffff88810fb52e78 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffff88813b3218c0 RDI: ffff88813b3218c0 RBP: ffff88810fb52e40 R08: 0000000000000000 R09: 6c65725f74736f68 R10: ffffc90000ebb738 R11: 73692033203a746e R12: 0000000000000004 R13: 0000000000000000 R14: 0000000000000011 R15: 0000000000000006 FS: 00007f6cc55b9980(0000) GS:ffff88813b300000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000003990 CR3: 00000001122a2000 CR4: 0000000000750ef0 PKRU: 55555554 Call Trace: <TASK> ? __die_body.cold+0x19/0x27 ? page_fault_oops+0x15a/0x2f0 ? exc_page_fault+0x7e/0x180 ? asm_exc_page_fault+0x26/0x30 ? ata_host_release.cold+0x2f/0x6e [libata] ? ata_host_release.cold+0x2f/0x6e [libata] release_nodes+0x35/0xb0 devres_release_group+0x113/0x140 ata_host_alloc+0xed/0x120 [libata] ata_host_alloc_pinfo+0x14/0xa0 [libata] ahci_init_one+0x6c9/0xd20 [ahci] Do not access ata_port struct members unconditionally. | 5.5 |
2024-07-29 | CVE-2024-42063 | Linux | Use of Uninitialized Resource vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: bpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode syzbot reported uninit memory usages during map_{lookup,delete}_elem. ========== BUG: KMSAN: uninit-value in __dev_map_lookup_elem kernel/bpf/devmap.c:441 [inline] BUG: KMSAN: uninit-value in dev_map_lookup_elem+0xf3/0x170 kernel/bpf/devmap.c:796 __dev_map_lookup_elem kernel/bpf/devmap.c:441 [inline] dev_map_lookup_elem+0xf3/0x170 kernel/bpf/devmap.c:796 ____bpf_map_lookup_elem kernel/bpf/helpers.c:42 [inline] bpf_map_lookup_elem+0x5c/0x80 kernel/bpf/helpers.c:38 ___bpf_prog_run+0x13fe/0xe0f0 kernel/bpf/core.c:1997 __bpf_prog_run256+0xb5/0xe0 kernel/bpf/core.c:2237 ========== The reproducer should be in the interpreter mode. The C reproducer is trying to run the following bpf prog: 0: (18) r0 = 0x0 2: (18) r1 = map[id:49] 4: (b7) r8 = 16777216 5: (7b) *(u64 *)(r10 -8) = r8 6: (bf) r2 = r10 7: (07) r2 += -229 ^^^^^^^^^^ 8: (b7) r3 = 8 9: (b7) r4 = 0 10: (85) call dev_map_lookup_elem#1543472 11: (95) exit It is due to the "void *key" (r2) passed to the helper. | 5.5 |
2024-07-29 | CVE-2024-42064 | Linux | Unspecified vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Skip pipe if the pipe idx not set properly [why] Driver crashes when pipe idx not set properly [how] Add code to skip the pipe that idx not set properly | 5.5 |
2024-07-29 | CVE-2024-42065 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: drm/xe: Add a NULL check in xe_ttm_stolen_mgr_init Add an explicit check to ensure that the mgr is not NULL. | 5.5 |
2024-07-29 | CVE-2024-42066 | Linux | Integer Overflow or Wraparound vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: drm/xe: Fix potential integer overflow in page size calculation Explicitly cast tbo->page_alignment to u64 before bit-shifting to prevent overflow when assigning to min_page_size. | 5.5 |
2024-07-29 | CVE-2024-42067 | Linux | Unchecked Return Value vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: bpf: Take return from set_memory_rox() into account with bpf_jit_binary_lock_ro() set_memory_rox() can fail, leaving memory unprotected. Check return and bail out when bpf_jit_binary_lock_ro() returns an error. | 5.5 |
2024-07-29 | CVE-2024-42068 | Linux | Unchecked Return Value vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: bpf: Take return from set_memory_ro() into account with bpf_prog_lock_ro() set_memory_ro() can fail, leaving memory unprotected. Check its return and take it into account as an error. | 5.5 |
2024-07-29 | CVE-2024-42069 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: net: mana: Fix possible double free in error handling path When auxiliary_device_add() returns error and then calls auxiliary_device_uninit(), callback function adev_release calls kfree(madev). | 5.5 |
2024-07-29 | CVE-2024-42070 | Linux | Memory Leak vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers register store validation for NFT_DATA_VALUE is conditional, however, the datatype is always either NFT_DATA_VALUE or NFT_DATA_VERDICT. | 5.5 |
2024-07-29 | CVE-2024-42071 | Linux | Excessive Iteration vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: ionic: use dev_consume_skb_any outside of napi If we're not in a NAPI softirq context, we need to be careful about how we call napi_consume_skb(), specifically we need to call it with budget==0 to signal to it that we're not in a safe context. This was found while running some configuration stress testing of traffic and a change queue config loop running, and this curious note popped out: [ 4371.402645] BUG: using smp_processor_id() in preemptible [00000000] code: ethtool/20545 [ 4371.402897] caller is napi_skb_cache_put+0x16/0x80 [ 4371.403120] CPU: 25 PID: 20545 Comm: ethtool Kdump: loaded Tainted: G OE 6.10.0-rc3-netnext+ #8 [ 4371.403302] Hardware name: HPE ProLiant DL360 Gen10/ProLiant DL360 Gen10, BIOS U32 01/23/2021 [ 4371.403460] Call Trace: [ 4371.403613] <TASK> [ 4371.403758] dump_stack_lvl+0x4f/0x70 [ 4371.403904] check_preemption_disabled+0xc1/0xe0 [ 4371.404051] napi_skb_cache_put+0x16/0x80 [ 4371.404199] ionic_tx_clean+0x18a/0x240 [ionic] [ 4371.404354] ionic_tx_cq_service+0xc4/0x200 [ionic] [ 4371.404505] ionic_tx_flush+0x15/0x70 [ionic] [ 4371.404653] ? ionic_lif_qcq_deinit.isra.23+0x5b/0x70 [ionic] [ 4371.404805] ionic_txrx_deinit+0x71/0x190 [ionic] [ 4371.404956] ionic_reconfigure_queues+0x5f5/0xff0 [ionic] [ 4371.405111] ionic_set_ringparam+0x2e8/0x3e0 [ionic] [ 4371.405265] ethnl_set_rings+0x1f1/0x300 [ 4371.405418] ethnl_default_set_doit+0xbb/0x160 [ 4371.405571] genl_family_rcv_msg_doit+0xff/0x130 [...] I found that ionic_tx_clean() calls napi_consume_skb() which calls napi_skb_cache_put(), but before that last call is the note /* Zero budget indicate non-NAPI context called us, like netpoll */ and DEBUG_NET_WARN_ON_ONCE(!in_softirq()); Those are pretty big hints that we're doing it wrong. | 5.5 |
2024-07-29 | CVE-2024-42073 | Linux | Use After Free vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_buffers: Fix memory corruptions on Spectrum-4 systems The following two shared buffer operations make use of the Shared Buffer Status Register (SBSR): # devlink sb occupancy snapshot pci/0000:01:00.0 # devlink sb occupancy clearmax pci/0000:01:00.0 The register has two masks of 256 bits to denote on which ingress / egress ports the register should operate on. | 5.5 |
2024-07-29 | CVE-2024-42074 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: ASoC: amd: acp: add a null check for chip_pdev structure When acp platform device creation is skipped, chip->chip_pdev value will remain NULL. | 5.5 |
2024-07-29 | CVE-2024-42075 | Linux | Use After Free vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: bpf: Fix remap of arena. The bpf arena logic didn't account for mremap operation. | 5.5 |
2024-07-29 | CVE-2024-42076 | Linux | Use of Uninitialized Resource vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: net: can: j1939: Initialize unused data in j1939_send_one() syzbot reported kernel-infoleak in raw_recvmsg() [1]. | 5.5 |
2024-07-29 | CVE-2024-42077 | Linux | Unspecified vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix DIO failure due to insufficient transaction credits The code in ocfs2_dio_end_io_write() estimates number of necessary transaction credits using ocfs2_calc_extend_credits(). | 5.5 |
2024-07-29 | CVE-2024-42078 | Linux | Improper Initialization vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: nfsd: initialise nfsd_info.mutex early. nfsd_info.mutex can be dereferenced by svc_pool_stats_start() immediately after the new netns is created. | 5.5 |
2024-07-29 | CVE-2024-42079 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: gfs2: Fix NULL pointer dereference in gfs2_log_flush In gfs2_jindex_free(), set sdp->sd_jdesc to NULL under the log flush lock to provide exclusion against gfs2_log_flush(). In gfs2_log_flush(), check if sdp->sd_jdesc is non-NULL before dereferencing it. | 5.5 |
2024-07-29 | CVE-2024-42080 | Linux | Out-of-bounds Write vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: RDMA/restrack: Fix potential invalid address access struct rdma_restrack_entry's kern_name was set to KBUILD_MODNAME in ib_create_cq(), while if the module exited but forgot del this rdma_restrack_entry, it would cause a invalid address access in rdma_restrack_clean() when print the owner of this rdma_restrack_entry. These code is used to help find one forgotten PD release in one of the ULPs. | 5.5 |
2024-07-29 | CVE-2024-42081 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: drm/xe/xe_devcoredump: Check NULL before assignments Assign 'xe_devcoredump_snapshot *' and 'xe_device *' only if 'coredump' is not NULL. v2 - Fix commit messages. v3 - Define variables before code.(Ashutosh/Jose) v4 - Drop return check for coredump_to_xe. | 5.5 |
2024-07-29 | CVE-2024-42082 | Linux | Allocation of Resources Without Limits or Throttling vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: xdp: Remove WARN() from __xdp_reg_mem_model() syzkaller reports a warning in __xdp_reg_mem_model(). The warning occurs only if __mem_id_init_hash_table() returns an error. | 5.5 |
2024-07-29 | CVE-2024-42083 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: ionic: fix kernel panic due to multi-buffer handling Currently, the ionic_run_xdp() doesn't handle multi-buffer packets properly for XDP_TX and XDP_REDIRECT. When a jumbo frame is received, the ionic_run_xdp() first makes xdp frame with all necessary pages in the rx descriptor. And if the action is either XDP_TX or XDP_REDIRECT, it should unmap dma-mapping and reset page pointer to NULL for all pages, not only the first page. But it doesn't for SG pages. | 5.5 |
2024-07-29 | CVE-2024-41025 | Linux | Memory Leak vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: misc: fastrpc: Fix memory leak in audio daemon attach operation Audio PD daemon send the name as part of the init IOCTL call. | 5.5 |
2024-07-29 | CVE-2024-41036 | Linux | Improper Locking vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: net: ks8851: Fix deadlock with the SPI chip variant When SMP is enabled and spinlocks are actually functional then there is a deadlock with the 'statelock' spinlock between ks8851_start_xmit_spi and ks8851_irq: watchdog: BUG: soft lockup - CPU#0 stuck for 27s! call trace: queued_spin_lock_slowpath+0x100/0x284 do_raw_spin_lock+0x34/0x44 ks8851_start_xmit_spi+0x30/0xb8 ks8851_start_xmit+0x14/0x20 netdev_start_xmit+0x40/0x6c dev_hard_start_xmit+0x6c/0xbc sch_direct_xmit+0xa4/0x22c __qdisc_run+0x138/0x3fc qdisc_run+0x24/0x3c net_tx_action+0xf8/0x130 handle_softirqs+0x1ac/0x1f0 __do_softirq+0x14/0x20 ____do_softirq+0x10/0x1c call_on_irq_stack+0x3c/0x58 do_softirq_own_stack+0x1c/0x28 __irq_exit_rcu+0x54/0x9c irq_exit_rcu+0x10/0x1c el1_interrupt+0x38/0x50 el1h_64_irq_handler+0x18/0x24 el1h_64_irq+0x64/0x68 __netif_schedule+0x6c/0x80 netif_tx_wake_queue+0x38/0x48 ks8851_irq+0xb8/0x2c8 irq_thread_fn+0x2c/0x74 irq_thread+0x10c/0x1b0 kthread+0xc8/0xd8 ret_from_fork+0x10/0x20 This issue has not been identified earlier because tests were done on a device with SMP disabled and so spinlocks were actually NOPs. Now use spin_(un)lock_bh for TX queue related locking to avoid execution of softirq work synchronously that would lead to a deadlock. | 5.5 |
2024-07-29 | CVE-2024-41037 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: Intel: hda: fix null deref on system suspend entry When system enters suspend with an active stream, SOF core calls hw_params_upon_resume(). | 5.5 |
2024-07-29 | CVE-2024-41038 | Linux | Classic Buffer Overflow vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers Check that all fields of a V2 algorithm header fit into the available firmware data buffer. The wmfw V2 format introduced variable-length strings in the algorithm block header. | 5.5 |
2024-07-29 | CVE-2024-41048 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: skmsg: Skip zero length skb in sk_msg_recvmsg When running BPF selftests (./test_progs -t sockmap_basic) on a Loongarch platform, the following kernel panic occurs: [...] Oops[#1]: CPU: 22 PID: 2824 Comm: test_progs Tainted: G OE 6.10.0-rc2+ #18 Hardware name: LOONGSON Dabieshan/Loongson-TC542F0, BIOS Loongson-UDK2018 ... | 5.5 |
2024-07-29 | CVE-2024-41052 | Linux | Use of Uninitialized Resource vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: vfio/pci: Init the count variable in collecting hot-reset devices The count variable is used without initialization, it results in mistakes in the device counting and crashes the userspace if the get hot reset info path is triggered. | 5.5 |
2024-07-29 | CVE-2024-41053 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: Fix ufshcd_abort_one racing issue When ufshcd_abort_one is racing with the completion ISR, the completed tag of the request's mq_hctx pointer will be set to NULL by ISR. | 5.5 |
2024-07-29 | CVE-2024-41054 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: Fix ufshcd_clear_cmd racing issue When ufshcd_clear_cmd is racing with the completion ISR, the completed tag of the request's mq_hctx pointer will be set to NULL by the ISR. | 5.5 |
2024-07-29 | CVE-2024-41055 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: mm: prevent derefencing NULL ptr in pfn_section_valid() Commit 5ec8e8ea8b77 ("mm/sparsemem: fix race in accessing memory_section->usage") changed pfn_section_valid() to add a READ_ONCE() call around "ms->usage" to fix a race with section_deactivate() where ms->usage can be cleared. | 5.5 |
2024-07-29 | CVE-2024-41060 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: drm/radeon: check bo_va->bo is non-NULL before using it The call to radeon_vm_clear_freed might clear bo_va->bo, so we have to check it before dereferencing it. | 5.5 |
2024-07-29 | CVE-2024-41063 | Linux | Improper Locking vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_core: cancel all works upon hci_unregister_dev() syzbot is reporting that calling hci_release_dev() from hci_error_reset() due to hci_dev_put() from hci_error_reset() can cause deadlock at destroy_workqueue(), for hci_error_reset() is called from hdev->req_workqueue which destroy_workqueue() needs to flush. We need to make sure that hdev->{rx_work,cmd_work,tx_work} which are queued into hdev->workqueue and hdev->{power_on,error_reset} which are queued into hdev->req_workqueue are no longer running by the moment destroy_workqueue(hdev->workqueue); destroy_workqueue(hdev->req_workqueue); are called from hci_release_dev(). Call cancel_work_sync() on these work items from hci_unregister_dev() as soon as hdev->list is removed from hci_dev_list. | 5.5 |
2024-07-29 | CVE-2024-41064 | Linux | Unspecified vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: powerpc/eeh: avoid possible crash when edev->pdev changes If a PCI device is removed during eeh_pe_report_edev(), edev->pdev will change and can cause a crash, hold the PCI rescan/remove lock while taking a copy of edev->pdev->bus. | 5.5 |
2024-07-29 | CVE-2024-41066 | Linux | Memory Leak vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: ibmvnic: Add tx check to prevent skb leak Below is a summary of how the driver stores a reference to an skb during transmit: tx_buff[free_map[consumer_index]]->skb = new_skb; free_map[consumer_index] = IBMVNIC_INVALID_MAP; consumer_index ++; Where variable data looks like this: free_map == [4, IBMVNIC_INVALID_MAP, IBMVNIC_INVALID_MAP, 0, 3] consumer_index^ tx_buff == [skb=null, skb=<ptr>, skb=<ptr>, skb=null, skb=null] The driver has checks to ensure that free_map[consumer_index] pointed to a valid index but there was no check to ensure that this index pointed to an unused/null skb address. | 5.5 |
2024-07-29 | CVE-2024-41076 | Linux | Memory Leak vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: NFSv4: Fix memory leak in nfs4_set_security_label We leak nfs_fattr and nfs4_label every time we set a security xattr. | 5.5 |
2024-07-29 | CVE-2024-41077 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: null_blk: fix validation of block size Block size should be between 512 and PAGE_SIZE and be a power of 2. | 5.5 |
2024-07-29 | CVE-2024-41080 | Linux | Improper Locking vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: io_uring: fix possible deadlock in io_register_iowq_max_workers() The io_register_iowq_max_workers() function calls io_put_sq_data(), which acquires the sqd->lock without releasing the uring_lock. Similar to the commit 009ad9f0c6ee ("io_uring: drop ctx->uring_lock before acquiring sqd->lock"), this can lead to a potential deadlock situation. To resolve this issue, the uring_lock is released before calling io_put_sq_data(), and then it is re-acquired after the function call. This change ensures that the locks are acquired in the correct order, preventing the possibility of a deadlock. | 5.5 |
2024-08-02 | CVE-2024-41519 | Mecodia | Cross-site Scripting vulnerability in Mecodia Feripro Feripro <= v2.2.3 is vulnerable to Cross Site Scripting (XSS) via "/admin/programm/<program_id>/zuordnung/veranstaltungen/<event_id>" through the "school" input field. | 5.4 |
2024-08-02 | CVE-2024-4643 | Bdthemes | Cross-site Scripting vulnerability in Bdthemes Element Pack The Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘end_redirect_link’ parameter in versions up to, and including, 5.7.1 due to insufficient input sanitization and output escaping. | 5.4 |
2024-08-01 | CVE-2024-39644 | Modernaweb | Cross-site Scripting vulnerability in Modernaweb Black Widgets for Elementor Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Modernaweb Studio Black Widgets For Elementor allows Stored XSS.This issue affects Black Widgets For Elementor: from n/a through 1.3.5. | 5.4 |
2024-08-01 | CVE-2024-39667 | Bdthemes | Cross-site Scripting vulnerability in Bdthemes Element Pack Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in BdThemes Element Pack Elementor Addons allows Stored XSS.This issue affects Element Pack Elementor Addons: from n/a through 5.6.11. | 5.4 |
2024-08-01 | CVE-2024-39668 | Idioweb | Cross-site Scripting vulnerability in Idioweb Extensions for Elementor Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in petesheppard84 Extensions for Elementor allows Stored XSS.This issue affects Extensions for Elementor: from n/a through 2.0.31. | 5.4 |
2024-08-01 | CVE-2024-7368 | Oretnom23 | Cross-site Scripting vulnerability in Oretnom23 Simple Realtime Quiz System 1.0 A vulnerability has been found in SourceCodester Simple Realtime Quiz System 1.0 and classified as problematic. | 5.4 |
2024-08-01 | CVE-2024-39837 | Mattermost | Unspecified vulnerability in Mattermost Server Mattermost versions 9.9.x <= 9.9.0, 9.5.x <= 9.5.6 fail to properly restrict channel creation which allows a malicious remote to create arbitrary channels, when shared channels were enabled. | 5.4 |
2024-08-01 | CVE-2024-5330 | Soflyy | Cross-site Scripting vulnerability in Soflyy Breakdance The Breakdance plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the breakdance_css_file_paths_cache parameter in all versions up to, and including, 1.7.2 due to insufficient input sanitization and output escaping. | 5.4 |
2024-07-31 | CVE-2024-4187 | Opentext | Cross-site Scripting vulnerability in Opentext Filr 24.1.1/24.2 Stored XSS vulnerability has been discovered in OpenText™ Filr product, affecting versions 24.1.1 and 24.2. | 5.4 |
2024-07-31 | CVE-2024-41955 | Opensecurity | Open Redirect vulnerability in Opensecurity Mobile Security Framework Mobile Security Framework (MobSF) is a security research platform for mobile applications in Android, iOS and Windows Mobile. | 5.4 |
2024-07-31 | CVE-2024-41947 | Xwiki | Cross-site Scripting vulnerability in Xwiki XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. | 5.4 |
2024-07-31 | CVE-2024-7309 | Jkev | Cross-site Scripting vulnerability in Jkev Record Management System 1.0 A vulnerability was found in SourceCodester Record Management System 1.0. | 5.4 |
2024-07-31 | CVE-2024-7303 | Adonesevangelista | Cross-site Scripting vulnerability in Adonesevangelista Online Blood Bank Management System 1.0 A vulnerability was found in itsourcecode Online Blood Bank Management System 1.0. | 5.4 |
2024-07-31 | CVE-2024-7285 | Oretnom23 | Cross-site Scripting vulnerability in Oretnom23 Establishment Billing Management System 1.0 A vulnerability has been found in SourceCodester Establishment Billing Management System 1.0 and classified as problematic. | 5.4 |
2024-07-31 | CVE-2024-7284 | Oretnom23 | Cross-site Scripting vulnerability in Oretnom23 LOT Reservation Management System 1.0 A vulnerability, which was classified as problematic, was found in SourceCodester Lot Reservation Management System 1.0. | 5.4 |
2024-07-30 | CVE-2023-26289 | IBM | Improper Encoding or Escaping of Output vulnerability in IBM Aspera Orchestrator 4.0.1 IBM Aspera Orchestrator 4.0.1 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. | 5.4 |
2024-07-30 | CVE-2024-7225 | Munyweki | Unspecified vulnerability in Munyweki Insurance Management System 1.0 A vulnerability was found in SourceCodester Insurance Management System 1.0. | 5.4 |
2024-07-29 | CVE-2024-37856 | Oretnom23 | Cross-site Scripting vulnerability in Oretnom23 Lost and Found Information System 1.0 Cross Site Scripting vulnerability in Lost and Found Information System 1.0 allows a remote attacker to escalate privileges via the first, last, middle name fields in the User Profile page. | 5.4 |
2024-07-29 | CVE-2024-6578 | Aimstack | Unspecified vulnerability in Aimstack AIM 3.19.3 A stored cross-site scripting (XSS) vulnerability exists in aimhubio/aim version 3.19.3. | 5.4 |
2024-07-29 | CVE-2024-41819 | Enchantedcode | Cross-site Scripting vulnerability in Enchantedcode Note Mark Note Mark is a web-based Markdown notes app. | 5.4 |
2024-07-29 | CVE-2024-6124 | M Files | Cross-site Scripting vulnerability in M-Files Hubshare 3.3.10.9/3.3.11.3 Reflected XSS in M-Files Hubshare before version 5.0.6.0 allows an attacker to execute arbitrary JavaScript code in the context of the victim's browser session | 5.4 |
2024-07-29 | CVE-2024-6881 | M Files | Cross-site Scripting vulnerability in M-Files Hubshare 3.3.10.9/3.3.11.3 Stored XSS in M-Files Hubshare versions before 5.0.6.0 allows an authenticated attacker to execute arbitrary JavaScript in user's browser session | 5.4 |
2024-07-29 | CVE-2024-7200 | Oretnom23 | Unspecified vulnerability in Oretnom23 Complaints Report Management System 1.0 A vulnerability, which was classified as problematic, has been found in SourceCodester Complaints Report Management System 1.0. | 5.4 |
2024-08-02 | CVE-2024-42349 | Fogproject | Information Exposure Through Log Files vulnerability in Fogproject FOG is a cloning/imaging/rescue suite/inventory management system. | 5.3 |
2024-08-02 | CVE-2024-41517 | Mecodia | Unspecified vulnerability in Mecodia Feripro An Incorrect Access Control vulnerability in "/admin/benutzer/institution/rechteverwaltung/uebersicht" in Feripro <= v2.2.3 allows remote attackers to get a list of all users and their corresponding privileges. | 5.3 |
2024-08-02 | CVE-2024-6704 | The Comments – wpDiscuz plugin for WordPress is vulnerable to HTML Injection in all versions up to, and including, 7.6.21. | 5.3 | |
2024-08-02 | CVE-2024-6567 | The Ebook Store plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 5.8001. | 5.3 | |
2024-08-01 | CVE-2024-41957 | VIM | Double Free vulnerability in VIM Vim is an open source command line text editor. | 5.3 |
2024-08-01 | CVE-2024-1715 | The AdFoxly – Ad Manager, AdSense Ads & Ads.txt plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the adfoxly_ad_status() function in all versions up to, and including, 1.8.5. | 5.3 | |
2024-08-01 | CVE-2024-7339 | Provision ISR TVT | A vulnerability has been found in TVT DVR TD-2104TS-CL, DVR TD-2108TS-HP, Provision-ISR DVR SH-4050A5-5L(MM) and AVISION DVR AV108T and classified as problematic. | 5.3 |
2024-07-31 | CVE-2024-7328 | Youdiancms | Unspecified vulnerability in Youdiancms 7.0 A vulnerability, which was classified as problematic, has been found in YouDianCMS 7. | 5.3 |
2024-07-31 | CVE-2024-41254 | Litestream | Improper Verification of Cryptographic Signature vulnerability in Litestream An issue was discovered in litestream v0.3.13. | 5.3 |
2024-07-31 | CVE-2024-41258 | Filestash | Improper Verification of Cryptographic Signature vulnerability in Filestash An issue was discovered in filestash v0.4. | 5.3 |
2024-07-31 | CVE-2024-41952 | Zitadel | Information Exposure Through Discrepancy vulnerability in Zitadel Zitadel is an open source identity management system. | 5.3 |
2024-07-31 | CVE-2024-2508 | The WP Mobile Menu plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the save_menu_item_icon function in all versions up to, and including, 2.8.4.4. | 5.3 | |
2024-07-30 | CVE-2024-5250 | Perforce | Information Exposure Through an Error Message vulnerability in Perforce Akana API In versions of Akana API Platform prior to 2024.1.0 overly verbose errors can be found in SAML integrations | 5.3 |
2024-07-30 | CVE-2024-7216 | Totolink | Unspecified vulnerability in Totolink Lr1200 Firmware 9.3.1Cu.2832 A vulnerability was found in TOTOLINK LR1200 9.3.1cu.2832. | 5.3 |
2024-07-29 | CVE-2024-27881 | Apple | Unspecified vulnerability in Apple Macos A privacy issue was addressed with improved private data redaction for log entries. | 5.3 |
2024-07-29 | CVE-2024-40794 | Apple | Unspecified vulnerability in Apple products This issue was addressed through improved state management. | 5.3 |
2024-07-29 | CVE-2024-40796 | Apple | Unspecified vulnerability in Apple Macos A privacy issue was addressed with improved private data redaction for log entries. | 5.3 |
2024-08-02 | CVE-2024-7319 | Openstack Redhat | An incomplete fix for CVE-2023-1625 was found in openstack-heat. | 5.0 |
2024-08-01 | CVE-2024-41948 | Biscuitsec | Unspecified vulnerability in Biscuitsec Biscuit-Java biscuit-java is the java implementation of Biscuit, an authentication and authorization token for microservices architectures. | 5.0 |
2024-08-02 | CVE-2024-27182 | Apache | Files or Directories Accessible to External Parties vulnerability in Apache Linkis 1.3.2/1.4.0/1.5.0 In Apache Linkis <= 1.5.0, Arbitrary file deletion in Basic management services on A user with an administrator account could delete any file accessible by the Linkis system user . Users are recommended to upgrade to version 1.6.0, which fixes this issue. | 4.9 |
2024-07-31 | CVE-2024-6725 | The Formidable Forms – Contact Form Plugin, Survey, Quiz, Payment, Calculator Form & Custom Form Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘html’ parameter in all versions up to, and including, 6.11.1 due to insufficient input sanitization and output escaping. | 4.9 | |
2024-07-31 | CVE-2024-39945 | Dahuasecurity | Unspecified vulnerability in Dahuasecurity products A vulnerability has been found in Dahua products. After obtaining the administrator's username and password, the attacker can send a carefully crafted data packet to the interface with vulnerabilities, causing the device to crash. | 4.9 |
2024-07-30 | CVE-2024-41916 | Arubanetworks | Unspecified vulnerability in Arubanetworks Clearpass Policy Manager A vulnerability exists in ClearPass Policy Manager that allows for an attacker with administrative privileges to access sensitive information in a cleartext format. | 4.9 |
2024-07-30 | CVE-2024-5486 | Arubanetworks | Unspecified vulnerability in Arubanetworks Clearpass Policy Manager A vulnerability exists in ClearPass Policy Manager that allows for an attacker with administrative privileges to access sensitive information in a cleartext format. | 4.9 |
2024-07-30 | CVE-2024-41803 | Xibosignage | SQL Injection vulnerability in Xibosignage Xibo Xibo is a content management system (CMS). | 4.9 |
2024-08-04 | CVE-2024-7453 | Fastadmin | Cross-site Scripting vulnerability in Fastadmin 1.5.0.20240328 A vulnerability was found in FastAdmin 1.5.0.20240328. | 4.8 |
2024-08-01 | CVE-2024-39626 | 5Starplugins | Cross-site Scripting vulnerability in 5Starplugins Pretty Simple Popup Builder Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in 5 Star Plugins Pretty Simple Popup Builder allows Stored XSS.This issue affects Pretty Simple Popup Builder: from n/a through 1.0.7. | 4.8 |
2024-08-01 | CVE-2024-39627 | Imagely | Cross-site Scripting vulnerability in Imagely Nextgen Gallery Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Imagely NextGEN Gallery allows Stored XSS.This issue affects NextGEN Gallery: from n/a through 3.59.3. | 4.8 |
2024-08-01 | CVE-2024-39629 | Themegrill | Cross-site Scripting vulnerability in Themegrill Himalayas Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in ThemeGrill Himalayas allows Stored XSS.This issue affects Himalayas: from n/a through 1.3.2. | 4.8 |
2024-08-01 | CVE-2024-4353 | Concretecms | Cross-site Scripting vulnerability in Concretecms Concrete CMS Concrete CMS versions 9.0.0 through 9.3.2 are affected by a stored XSS vulnerability in the generate dashboard board instance functionality. | 4.8 |
2024-07-30 | CVE-2024-3986 | Themeboy | Cross-site Scripting vulnerability in Themeboy Sportspress The SportsPress WordPress plugin before 2.7.22 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | 4.8 |
2024-07-29 | CVE-2024-41676 | Openmage | Cross-site Scripting vulnerability in Openmage Magento Magento-lts is a long-term support alternative to Magento Community Edition (CE). | 4.8 |
2024-08-01 | CVE-2024-5678 | Zohocorp | SQL Injection vulnerability in Zohocorp Manageengine Applications Manager Zohocorp ManageEngine Applications Manager versions 170900 and below are vulnerable to the authenticated admin-only SQL Injection in the Create Monitor feature. | 4.7 |
2024-07-30 | CVE-2024-41305 | Wondercms | Server-Side Request Forgery (SSRF) vulnerability in Wondercms 3.4.3 A Server-Side Request Forgery (SSRF) in the Plugins Page of WonderCMS v3.4.3 allows attackers to force the application to make arbitrary requests via injection of crafted URLs into the pluginThemeUrl parameter. | 4.7 |
2024-07-30 | CVE-2024-42102 | Linux | Divide By Zero vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" Patch series "mm: Avoid possible overflows in dirty throttling". Dirty throttling logic assumes dirty limits in page units fit into 32-bits. | 4.7 |
2024-07-30 | CVE-2024-42107 | Linux | Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: ice: Don't process extts if PTP is disabled The ice_ptp_extts_event() function can race with ice_ptp_release() and result in a NULL pointer dereference which leads to a kernel panic. Panic occurs because the ice_ptp_extts_event() function calls ptp_clock_event() with a NULL pointer. | 4.7 |
2024-07-30 | CVE-2024-42152 | Linux | Memory Leak vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: nvmet: fix a possible leak when destroy a ctrl during qp establishment In nvmet_sq_destroy we capture sq->ctrl early and if it is non-NULL we know that a ctrl was allocated (in the admin connect request handler) and we need to release pending AERs, clear ctrl->sqs and sq->ctrl (for nvme-loop primarily), and drop the final reference on the ctrl. However, a small window is possible where nvmet_sq_destroy starts (as a result of the client giving up and disconnecting) concurrently with the nvme admin connect cmd (which may be in an early stage). | 4.7 |
2024-07-30 | CVE-2024-42227 | Linux | Unspecified vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix overlapping copy within dml_core_mode_programming [WHY] &mode_lib->mp.Watermark and &locals->Watermark are the same address. | 4.7 |
2024-07-31 | CVE-2024-37900 | Xwiki | Code Injection vulnerability in Xwiki XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. | 4.6 |
2024-07-31 | CVE-2024-31200 | Proges | Unspecified vulnerability in Proges Sensor NET Connect Firmware V2 2.24 A “CWE-201: Insertion of Sensitive Information Into Sent Data” affecting the administrative account allows an attacker with physical access to the machine to retrieve the password in cleartext when an administrative session is open in the browser. | 4.6 |
2024-07-31 | CVE-2024-3082 | Proges | Insufficiently Protected Credentials vulnerability in Proges Sensor NET Connect Firmware V2 2.24 A “CWE-256: Plaintext Storage of a Password” affecting the administrative account allows an attacker with physical access to the machine to retrieve the password in cleartext unless specific security measures at other layers (e.g., full-disk encryption) have been enabled. | 4.6 |
2024-07-29 | CVE-2024-40813 | Apple | Unspecified vulnerability in Apple Iphone OS A lock screen issue was addressed with improved state management. | 4.6 |
2024-07-29 | CVE-2024-40818 | Apple | Unspecified vulnerability in Apple products This issue was addressed by restricting options offered on a locked device. | 4.6 |
2024-07-29 | CVE-2024-40829 | Apple | Unspecified vulnerability in Apple products The issue was addressed with improved checks. | 4.6 |
2024-08-01 | CVE-2024-25948 | Dell | Out-of-bounds Write vulnerability in Dell EMC Idrac Service Module Dell iDRAC Service Module version 5.3.0.0 and prior, contain a Out of bound Write Vulnerability. | 4.4 |
2024-08-01 | CVE-2024-38481 | Dell | Out-of-bounds Read vulnerability in Dell EMC Idrac Service Module Dell iDRAC Service Module version 5.3.0.0 and prior, contain a Out of bound Read Vulnerability. | 4.4 |
2024-08-01 | CVE-2024-38489 | Dell | Out-of-bounds Write vulnerability in Dell EMC Idrac Service Module Dell iDRAC Service Module version 5.3.0.0 and prior contains Out of bound write Vulnerability. | 4.4 |
2024-08-01 | CVE-2024-38490 | Dell | Out-of-bounds Write vulnerability in Dell EMC Idrac Service Module Dell iDRAC Service Module version 5.3.0.0 and prior, contain a Out of bound Write Vulnerability. | 4.4 |
2024-08-01 | CVE-2024-25947 | Dell | Out-of-bounds Write vulnerability in Dell EMC Idrac Service Module Dell iDRAC Service Module version 5.3.0.0 and prior, contain an Out of bound Read Vulnerability. | 4.4 |
2024-07-31 | CVE-2024-37135 | Dell | Unspecified vulnerability in Dell Dm5500 Firmware 5.14.0.0/5.15.0.0 DM5500 5.16.0.0, contains an information disclosure vulnerability. | 4.4 |
2024-07-30 | CVE-2024-42114 | Linux | Improper Locking vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values syzbot is able to trigger softlockups, setting NL80211_ATTR_TXQ_QUANTUM to 2^31. We had a similar issue in sch_fq, fixed with commit d9e15a273306 ("pkt_sched: fq: do not accept silly TCA_FQ_QUANTUM") watchdog: BUG: soft lockup - CPU#1 stuck for 26s! [kworker/1:0:24] Modules linked in: irq event stamp: 131135 hardirqs last enabled at (131134): [<ffff80008ae8778c>] __exit_to_kernel_mode arch/arm64/kernel/entry-common.c:85 [inline] hardirqs last enabled at (131134): [<ffff80008ae8778c>] exit_to_kernel_mode+0xdc/0x10c arch/arm64/kernel/entry-common.c:95 hardirqs last disabled at (131135): [<ffff80008ae85378>] __el1_irq arch/arm64/kernel/entry-common.c:533 [inline] hardirqs last disabled at (131135): [<ffff80008ae85378>] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:551 softirqs last enabled at (125892): [<ffff80008907e82c>] neigh_hh_init net/core/neighbour.c:1538 [inline] softirqs last enabled at (125892): [<ffff80008907e82c>] neigh_resolve_output+0x268/0x658 net/core/neighbour.c:1553 softirqs last disabled at (125896): [<ffff80008904166c>] local_bh_disable+0x10/0x34 include/linux/bottom_half.h:19 CPU: 1 PID: 24 Comm: kworker/1:0 Not tainted 6.9.0-rc7-syzkaller-gfda5695d692c #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 Workqueue: mld mld_ifc_work pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __list_del include/linux/list.h:195 [inline] pc : __list_del_entry include/linux/list.h:218 [inline] pc : list_move_tail include/linux/list.h:310 [inline] pc : fq_tin_dequeue include/net/fq_impl.h:112 [inline] pc : ieee80211_tx_dequeue+0x6b8/0x3b4c net/mac80211/tx.c:3854 lr : __list_del_entry include/linux/list.h:218 [inline] lr : list_move_tail include/linux/list.h:310 [inline] lr : fq_tin_dequeue include/net/fq_impl.h:112 [inline] lr : ieee80211_tx_dequeue+0x67c/0x3b4c net/mac80211/tx.c:3854 sp : ffff800093d36700 x29: ffff800093d36a60 x28: ffff800093d36960 x27: dfff800000000000 x26: ffff0000d800ad50 x25: ffff0000d800abe0 x24: ffff0000d800abf0 x23: ffff0000e0032468 x22: ffff0000e00324d4 x21: ffff0000d800abf0 x20: ffff0000d800abf8 x19: ffff0000d800abf0 x18: ffff800093d363c0 x17: 000000000000d476 x16: ffff8000805519dc x15: ffff7000127a6cc8 x14: 1ffff000127a6cc8 x13: 0000000000000004 x12: ffffffffffffffff x11: ffff7000127a6cc8 x10: 0000000000ff0100 x9 : 0000000000000000 x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000 x5 : ffff80009287aa08 x4 : 0000000000000008 x3 : ffff80008034c7fc x2 : ffff0000e0032468 x1 : 00000000da0e46b8 x0 : ffff0000e0032470 Call trace: __list_del include/linux/list.h:195 [inline] __list_del_entry include/linux/list.h:218 [inline] list_move_tail include/linux/list.h:310 [inline] fq_tin_dequeue include/net/fq_impl.h:112 [inline] ieee80211_tx_dequeue+0x6b8/0x3b4c net/mac80211/tx.c:3854 wake_tx_push_queue net/mac80211/util.c:294 [inline] ieee80211_handle_wake_tx_queue+0x118/0x274 net/mac80211/util.c:315 drv_wake_tx_queue net/mac80211/driver-ops.h:1350 [inline] schedule_and_wake_txq net/mac80211/driver-ops.h:1357 [inline] ieee80211_queue_skb+0x18e8/0x2244 net/mac80211/tx.c:1664 ieee80211_tx+0x260/0x400 net/mac80211/tx.c:1966 ieee80211_xmit+0x278/0x354 net/mac80211/tx.c:2062 __ieee80211_subif_start_xmit+0xab8/0x122c net/mac80211/tx.c:4338 ieee80211_subif_start_xmit+0xe0/0x438 net/mac80211/tx.c:4532 __netdev_start_xmit include/linux/netdevice.h:4903 [inline] netdev_start_xmit include/linux/netdevice.h:4917 [inline] xmit_one net/core/dev.c:3531 [inline] dev_hard_start_xmit+0x27c/0x938 net/core/dev.c:3547 __dev_queue_xmit+0x1678/0x33fc net/core/dev.c:4341 dev_queue_xmit include/linux/netdevice.h:3091 [inline] neigh_resolve_output+0x558/0x658 net/core/neighbour.c:1563 neigh_output include/net/neighbour.h:542 [inline] ip6_fini ---truncated--- | 4.4 |
2024-07-30 | CVE-2024-42123 | Linux | Double Free vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix double free err_addr pointer warnings In amdgpu_umc_bad_page_polling_timeout, the amdgpu_umc_handle_bad_pages will be run many times so that double free err_addr in some special case. So set the err_addr to NULL to avoid the warnings. | 4.4 |
2024-07-30 | CVE-2024-42131 | Linux | Integer Overflow or Wraparound vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: mm: avoid overflows in dirty throttling logic The dirty throttling logic is interspersed with assumptions that dirty limits in PAGE_SIZE units fit into 32-bit (so that various multiplications fit into 64-bits). | 4.4 |
2024-07-30 | CVE-2024-42154 | Linux | Improper Check for Unusual or Exceptional Conditions vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: tcp_metrics: validate source addr length I don't see anything checking that TCP_METRICS_ATTR_SADDR_IPV4 is at least 4 bytes long, and the policy doesn't have an entry for this attribute at all (neither does it for IPv6 but v6 is manually validated). | 4.4 |
2024-07-30 | CVE-2024-42230 | Linux | Unspecified vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: powerpc/pseries: Fix scv instruction crash with kexec kexec on pseries disables AIL (reloc_on_exc), required for scv instruction support, before other CPUs have been shut down. | 4.4 |
2024-07-29 | CVE-2024-27853 | Apple | Unspecified vulnerability in Apple Macos This issue was addressed with improved checks. | 4.4 |
2024-07-29 | CVE-2024-27882 | Apple | Unspecified vulnerability in Apple Macos A permissions issue was addressed with additional restrictions. | 4.4 |
2024-07-29 | CVE-2024-27883 | Apple | Unspecified vulnerability in Apple Macos A permissions issue was addressed with additional restrictions. | 4.4 |
2024-07-29 | CVE-2024-40834 | Apple | Unspecified vulnerability in Apple Macos This issue was addressed by adding an additional prompt for user consent. | 4.4 |
2024-08-03 | CVE-2024-7438 | Simplemachines | Authorization Bypass Through User-Controlled Key vulnerability in Simplemachines Simple Machines Forum 2.1.4 A vulnerability has been found in SimpleMachines SMF 2.1.4 and classified as problematic. | 4.3 |
2024-08-03 | CVE-2024-7437 | Simplemachines | Authorization Bypass Through User-Controlled Key vulnerability in Simplemachines Simple Machines Forum 2.1.4 A vulnerability, which was classified as critical, was found in SimpleMachines SMF 2.1.4. | 4.3 |
2024-08-03 | CVE-2024-6709 | The Sync Post With Other Site plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'sps_add_update_post' function in all versions up to, and including, 1.6. | 4.3 | |
2024-08-03 | CVE-2024-6872 | The Build Your Dream Website Fast with 400+ Starter Templates and Landing Pages, No Coding Needed, One-Click Import for Elementor & Gutenberg Blocks! – TemplateSpare plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'templatespare_activate_required_theme' and 'templatespare_get_theme_status' functions in all versions up to, and including, 2.4.2. | 4.3 | |
2024-08-02 | CVE-2024-40722 | Changingtec | Out-of-bounds Write vulnerability in Changingtec TCB Servisign The specific API in TCBServiSign Windows Version from CHANGING Information Technology does does not properly validate the length of server-side input. | 4.3 |
2024-08-02 | CVE-2024-40723 | Changingtec | Out-of-bounds Write vulnerability in Changingtec Hwatai Servisign The specific API in HWATAIServiSign Windows Version from CHANGING Information Technology does not properly validate the length of server-side inputs. | 4.3 |
2024-08-02 | CVE-2024-22278 | Linuxfoundation | Unspecified vulnerability in Linuxfoundation Harbor Incorrect user permission validation in Harbor <v2.9.5 and Harbor <v2.10.3 allows authenticated users to modify configurations. | 4.3 |
2024-08-01 | CVE-2024-29977 | Mattermost | Unspecified vulnerability in Mattermost Mattermost versions 9.9.x <= 9.9.0, 9.5.x <= 9.5.6 fail to properly validate synced reactions, when shared channels are enabled, which allows a malicious remote to create arbitrary reactions on arbitrary posts | 4.3 |
2024-08-01 | CVE-2024-39839 | Mattermost | Unspecified vulnerability in Mattermost Server Mattermost versions 9.9.x <= 9.9.0, 9.5.x <= 9.5.6, 9.7.x <= 9.7.5, 9.8.x <= 9.8.1 fail to disallow users to set their own remote username, when shared channels were enabled, which allows a user on a remote to set their remote username prop to an arbitrary string, which would be then synced to the local server as long as the user hadn't been synced before. | 4.3 |
2024-08-01 | CVE-2024-41162 | Mattermost | Unspecified vulnerability in Mattermost Server Mattermost versions 9.9.x <= 9.9.0, 9.5.x <= 9.5.6, 9.7.x <= 9.7.5 and 9.8.x <= 9.8.1 fail to disallow the modification of local channels by a remote, when shared channels are enabled, which allows a malicious remote to make an arbitrary local channel read-only. | 4.3 |
2024-08-01 | CVE-2024-41926 | Mattermost | Origin Validation Error vulnerability in Mattermost Server Mattermost versions 9.9.x <= 9.9.0 and 9.5.x <= 9.5.6 fail to validate the source of sync messages and only allow the correct remote IDs, which allows a malicious remote to set arbitrary RemoteId values for synced users and therefore claim that a user was synced from another remote. | 4.3 |
2024-08-01 | CVE-2024-5331 | Soflyy | Missing Authorization vulnerability in Soflyy Breakdance The Breakdance plugin for WordPress is vulnerable to unauthorized access of data in all versions up to, and including, 1.7.2. | 4.3 |
2024-07-31 | CVE-2024-37898 | Xwiki | Missing Authorization vulnerability in Xwiki XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. | 4.3 |
2024-07-29 | CVE-2024-40776 | Apple | Use After Free vulnerability in Apple products A use-after-free issue was addressed with improved memory management. | 4.3 |
2024-08-01 | CVE-2024-41965 | VIM | Double Free vulnerability in VIM Vim is an open source command line text editor. | 4.2 |
2024-07-30 | CVE-2024-42156 | Linux | Unspecified vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: s390/pkey: Wipe copies of clear-key structures on failure Wipe all sensitive data from stack for all IOCTLs, which convert a clear-key into a protected- or secure-key. | 4.1 |
2024-07-30 | CVE-2024-42157 | Linux | Unspecified vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: s390/pkey: Wipe sensitive data on failure Wipe sensitive data from stack also if the copy_to_user() fails. | 4.1 |
2024-07-30 | CVE-2024-42158 | Linux | Incorrect Resource Transfer Between Spheres vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: s390/pkey: Use kfree_sensitive() to fix Coccinelle warnings Replace memzero_explicit() and kfree() with kfree_sensitive() to fix warnings reported by Coccinelle: WARNING opportunity for kfree_sensitive/kvfree_sensitive (line 1506) WARNING opportunity for kfree_sensitive/kvfree_sensitive (line 1643) WARNING opportunity for kfree_sensitive/kvfree_sensitive (line 1770) | 4.1 |
2024-07-30 | CVE-2024-42229 | Linux | Unspecified vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: crypto: aead,cipher - zeroize key buffer after use I.G 9.7.B for FIPS 140-3 specifies that variables temporarily holding cryptographic information should be zeroized once they are no longer needed. | 4.1 |
12 Low Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2024-07-29 | CVE-2024-6984 | Canonical | Information Exposure Through an Error Message vulnerability in Canonical Juju An issue was discovered in Juju that resulted in the leak of the sensitive context ID, which allows a local unprivileged attacker to access other sensitive data or relation accessible to the local charm. | 3.8 |
2024-07-29 | CVE-2024-40778 | Apple | Unspecified vulnerability in Apple Iphone OS An authentication issue was addressed with improved state management. | 3.3 |
2024-07-29 | CVE-2024-40795 | Apple | Unspecified vulnerability in Apple products This issue was addressed with improved data protection. | 3.3 |
2024-07-29 | CVE-2024-40798 | Apple | Unspecified vulnerability in Apple Macos This issue was addressed with improved redaction of sensitive information. | 3.3 |
2024-07-29 | CVE-2024-40832 | Apple | Unspecified vulnerability in Apple Macos The issue was addressed with improved checks. | 3.3 |
2024-07-29 | CVE-2023-42925 | Apple | Unspecified vulnerability in Apple Iphone OS The issue was addressed with improved restriction of data container access. | 3.3 |
2024-07-29 | CVE-2023-42948 | Apple | Unspecified vulnerability in Apple Macos This issue was addressed through improved state management. | 3.3 |
2024-07-29 | CVE-2023-42949 | Apple | Unspecified vulnerability in Apple products This issue was addressed with improved data protection. | 3.3 |
2024-07-29 | CVE-2023-42957 | Apple | Unspecified vulnerability in Apple products A permissions issue was addressed with additional restrictions. | 3.3 |
2024-07-29 | CVE-2024-27862 | Apple | Unspecified vulnerability in Apple Macos A logic issue was addressed with improved state management. | 2.4 |
2024-07-29 | CVE-2024-40822 | Apple | Unspecified vulnerability in Apple products This issue was addressed by restricting options offered on a locked device. | 2.4 |
2024-07-30 | CVE-2024-42155 | Linux | Unspecified vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: s390/pkey: Wipe copies of protected- and secure-keys Although the clear-key of neither protected- nor secure-keys is accessible, this key material should only be visible to the calling process. | 1.9 |