Weekly Vulnerabilities Reports > December 16 to 22, 2024
Overview
258 new vulnerabilities reported during this period, including 24 critical vulnerabilities and 80 high severity vulnerabilities. This weekly summary report vulnerabilities in 80 products from 53 vendors including IBM, Autodesk, Adobe, Apple, and Jetbrains. Vulnerabilities are notably categorized as "Cross-site Scripting", "Out-of-bounds Write", "SQL Injection", "NULL Pointer Dereference", and "Cross-Site Request Forgery (CSRF)".
- 188 reported vulnerabilities are remotely exploitables.
- 118 reported vulnerabilities are related to weaknesses in OWASP Top Ten.
- 135 reported vulnerabilities are exploitable by an anonymous user.
- IBM has the most reported vulnerabilities, with 14 reported vulnerabilities.
- Codezips has the most reported critical vulnerabilities, with 5 reported vulnerabilities.
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
EXPLOITABLE
EXPLOITABLE
AVAILABLE
ANONYMOUSLY
WEB APPLICATION
Vulnerability Details
The following table list reported vulnerabilities for the period covered by this report:
24 Critical Vulnerabilities
80 High Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2024-12-22 | CVE-2024-12891 | Code Projects | Unspecified vulnerability in Code-Projects Online Exam Mastering System 1.0 A vulnerability classified as critical has been found in code-projects Online Exam Mastering System 1.0. | 8.8 |
2024-12-22 | CVE-2024-12890 | Code Projects | Unspecified vulnerability in Code-Projects Online Exam Mastering System 1.0 A vulnerability was found in code-projects Online Exam Mastering System 1.0. | 8.8 |
2024-12-21 | CVE-2024-12066 | The SMSA Shipping(official) plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the smsa_delete_label() function in all versions up to, and including, 2.2. | 8.8 | |
2024-12-21 | CVE-2024-12771 | The eCommerce Product Catalog Plugin for WordPress plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.3.43. | 8.8 | |
2024-12-20 | CVE-2024-56351 | Jetbrains | Insufficient Session Expiration vulnerability in Jetbrains Teamcity In JetBrains TeamCity before 2024.12 access tokens were not revoked after removing user roles | 8.8 |
2024-12-20 | CVE-2024-12829 | Arista | OS Command Injection vulnerability in Arista NG Firewall 17.1.1 Arista NG Firewall ExecManagerImpl Command Injection Remote Code Execution Vulnerability. | 8.8 |
2024-12-19 | CVE-2024-12785 | Angeljudesuarez | SQL Injection vulnerability in Angeljudesuarez Vehicle Management System 1.0 A vulnerability was found in itsourcecode Vehicle Management System 1.0. | 8.8 |
2024-12-19 | CVE-2024-25131 | A flaw was found in the MustGather.managed.openshift.io Custom Defined Resource (CRD) of OpenShift Dedicated. | 8.8 | |
2024-12-19 | CVE-2020-12820 | Fortinet | Out-of-bounds Write vulnerability in Fortinet Fortios Under non-default configuration, a stack-based buffer overflow in FortiOS version 6.0.10 and below, version 5.6.12 and below may allow a remote attacker authenticated to the SSL VPN to crash the FortiClient NAC daemon (fcnacd) and potentially execute arbitrary code via requesting a large FortiClient file name. | 8.8 |
2024-12-18 | CVE-2024-12692 | Unspecified vulnerability in Google Chrome Type Confusion in V8 in Google Chrome prior to 131.0.6778.204 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 | |
2024-12-18 | CVE-2024-12693 | Out-of-bounds Write vulnerability in Google Chrome Out of bounds memory access in V8 in Google Chrome prior to 131.0.6778.204 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. | 8.8 | |
2024-12-18 | CVE-2024-12694 | Unspecified vulnerability in Google Chrome Use after free in Compositing in Google Chrome prior to 131.0.6778.204 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 | |
2024-12-18 | CVE-2024-12695 | Unspecified vulnerability in Google Chrome Out of bounds write in V8 in Google Chrome prior to 131.0.6778.204 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. | 8.8 | |
2024-12-18 | CVE-2024-55952 | Dataease | Unspecified vulnerability in Dataease DataEase is an open source business analytics tool. | 8.8 |
2024-12-18 | CVE-2024-12259 | The CRM WordPress Plugin – RepairBuddy plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.8120. | 8.8 | |
2024-12-17 | CVE-2024-8326 | The s2Member – Excellent for All Kinds of Memberships, Content Restriction Paywalls & Member Access Subscriptions plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 241114 via the 'sc_get_details' function. | 8.8 | |
2024-12-17 | CVE-2024-12293 | The User Role Editor plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.64.3. | 8.8 | |
2024-12-16 | CVE-2024-12666 | Classcms | Unspecified vulnerability in Classcms A vulnerability has been found in ClassCMS up to 4.8 and classified as critical. | 8.8 |
2024-12-16 | CVE-2024-54355 | Wpmailster | Cross-Site Request Forgery (CSRF) vulnerability in Wpmailster WP Mailster Cross-Site Request Forgery (CSRF) vulnerability in brandtoss WP Mailster allows Cross Site Request Forgery.This issue affects WP Mailster: from n/a through 1.8.17.0. | 8.8 |
2024-12-19 | CVE-2024-12790 | Fabianros | Cross-site Scripting vulnerability in Fabianros Hostel Management System 1.0 A vulnerability was found in code-projects Hostel Management Site 1.0. | 8.2 |
2024-12-18 | CVE-2024-55953 | Dataease | SQL Injection vulnerability in Dataease DataEase is an open source business analytics tool. | 8.1 |
2024-12-18 | CVE-2024-12432 | The WPC Shop as a Customer for WooCommerce plugin for WordPress is vulnerable to account takeover and privilege escalation in all versions up to, and including, 1.2.8. | 8.1 | |
2024-12-16 | CVE-2024-6001 | An improper certificate validation vulnerability was reported in LADM that could allow a network attacker with the ability to redirect an update request to a remote server and execute code with elevated privileges. | 8.1 | |
2024-12-16 | CVE-2024-12642 | TenderDocTransfer from Chunghwa Telecom has an Arbitrary File Write vulnerability. | 8.1 | |
2024-12-16 | CVE-2024-12643 | The tbm-client from Chunghwa Telecom has an Arbitrary File Delete vulnerability. | 8.1 | |
2024-12-16 | CVE-2024-12646 | The topm-client from Chunghwa Telecom has an Arbitrary File Delete vulnerability. | 8.1 | |
2024-12-20 | CVE-2024-40695 | IBM Cognos Analytics 11.2.0 through 11.2.4 FP4 and 12.0.0 through 12.0.4 could be vulnerable to malicious file upload by not validating the content of the file uploaded to the web interface. | 8.0 | |
2024-12-20 | CVE-2023-42867 | Apple | Unspecified vulnerability in Apple Garageband This issue was addressed with improved validation of the process entitlement and Team ID. | 7.8 |
2024-12-20 | CVE-2024-12831 | Arista | Incorrect Authorization vulnerability in Arista NG Firewall 17.1.1 Arista NG Firewall uvm_login Incorrect Authorization Privilege Escalation Vulnerability. | 7.8 |
2024-12-19 | CVE-2024-12175 | Rockwellautomation | Use After Free vulnerability in Rockwellautomation Arena Another “use after free” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to use a resource that was already used. | 7.8 |
2024-12-19 | CVE-2020-15934 | Fortinet | Improper Privilege Management vulnerability in Fortinet Forticlient An execution with unnecessary privileges vulnerability in the VCM engine of FortiClient for Linux versions 6.2.7 and below, version 6.4.0. | 7.8 |
2024-12-19 | CVE-2021-26115 | Fortinet | OS Command Injection vulnerability in Fortinet Fortiwan An OS command injection (CWE-78) vulnerability in FortiWAN version 4.5.7 and below Command Line Interface may allow a local, authenticated and unprivileged attacker to escalate their privileges to root via executing a specially-crafted command.An OS command injection (CWE-78) vulnerability in FortiWAN Command Line Interface may allow a local, authenticated and unprivileged attacker to escalate their privileges to root via executing a specially-crafted command. | 7.8 |
2024-12-19 | CVE-2024-35141 | IBM | Unspecified vulnerability in IBM Security Verify Access Docker IBM Security Verify Access Docker 10.0.0 through 10.0.6 could allow a local user to escalate their privileges due to execution of unnecessary privileges. | 7.8 |
2024-12-19 | CVE-2022-44512 | Adobe | Out-of-bounds Write vulnerability in Adobe products Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-19 | CVE-2022-44513 | Adobe | Out-of-bounds Write vulnerability in Adobe products Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-19 | CVE-2022-44514 | Adobe | Use After Free vulnerability in Adobe products Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-19 | CVE-2022-44518 | Adobe | Use After Free vulnerability in Adobe products Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-19 | CVE-2022-44520 | Adobe | Use After Free vulnerability in Adobe products Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-18 | CVE-2024-47480 | Dell | Link Following vulnerability in Dell Inventory Collector 12.3.0.6 Dell Inventory Collector Client, versions prior to 12.7.0, contains an Improper Link Resolution Before File Access vulnerability. | 7.8 |
2024-12-17 | CVE-2024-11422 | Autodesk | Out-of-bounds Write vulnerability in Autodesk Navisworks A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, may force an Out-of-Bounds Write vulnerability. | 7.8 |
2024-12-17 | CVE-2024-12178 | Autodesk | Out-of-bounds Write vulnerability in Autodesk Navisworks A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force a Memory Corruption vulnerability. | 7.8 |
2024-12-17 | CVE-2024-12179 | Autodesk | Out-of-bounds Write vulnerability in Autodesk Navisworks A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can be used to cause a Heap-based Overflow vulnerability. | 7.8 |
2024-12-17 | CVE-2024-12191 | Autodesk | Out-of-bounds Write vulnerability in Autodesk Navisworks A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, may force an Out-of-Bounds Write vulnerability. | 7.8 |
2024-12-17 | CVE-2024-12192 | Autodesk | Out-of-bounds Write vulnerability in Autodesk Navisworks A maliciously crafted DWF file, when parsed through Autodesk Navisworks, may force an Out-of-Bounds Write vulnerability. | 7.8 |
2024-12-17 | CVE-2024-12193 | Autodesk | Out-of-bounds Write vulnerability in Autodesk Navisworks A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, may force an Out-of-Bounds Write vulnerability. | 7.8 |
2024-12-17 | CVE-2024-12194 | Autodesk | Out-of-bounds Write vulnerability in Autodesk Navisworks A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force a Memory Corruption vulnerability. | 7.8 |
2024-12-17 | CVE-2024-12197 | Autodesk | Out-of-bounds Write vulnerability in Autodesk Navisworks A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, may force an Out-of-Bounds Write vulnerability. | 7.8 |
2024-12-17 | CVE-2024-12198 | Autodesk | Out-of-bounds Write vulnerability in Autodesk Navisworks A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, may force an Out-of-Bounds Write vulnerability. | 7.8 |
2024-12-17 | CVE-2024-12199 | Autodesk | Out-of-bounds Write vulnerability in Autodesk Navisworks A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, may force an Out-of-Bounds Write vulnerability. | 7.8 |
2024-12-17 | CVE-2024-12200 | Autodesk | Out-of-bounds Write vulnerability in Autodesk Navisworks A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, may force an Out-of-Bounds Write vulnerability. | 7.8 |
2024-12-17 | CVE-2024-12669 | Autodesk | Out-of-bounds Write vulnerability in Autodesk Navisworks A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can be used to cause a Heap-based Overflow vulnerability. | 7.8 |
2024-12-17 | CVE-2024-12670 | Autodesk | Out-of-bounds Write vulnerability in Autodesk Navisworks A maliciously crafted DWF file, when parsed through Autodesk Navisworks, can be used to cause a Heap-based Overflow vulnerability. | 7.8 |
2024-12-17 | CVE-2024-12671 | Autodesk | Out-of-bounds Write vulnerability in Autodesk Navisworks A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, may force an Out-of-Bounds Write vulnerability. | 7.8 |
2024-12-16 | CVE-2024-4762 | An improper validation vulnerability was reported in the firmware update mechanism of LADM and LDCC that could allow a local attacker to escalate privileges. | 7.8 | |
2024-12-17 | CVE-2024-9624 | The WP All Import Pro plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 4.9.3 due to missing SSRF protection on the pmxi_curl_download function. | 7.6 | |
2024-12-20 | CVE-2024-44195 | Apple | Unspecified vulnerability in Apple Macos 15.0 A logic issue was addressed with improved validation. | 7.5 |
2024-12-20 | CVE-2022-32204 | Huawei | Unspecified vulnerability in Huawei Cv81-Wdm Firmware 01.70.49.29.46 There is an improper input verification vulnerability in Huawei printer product. | 7.5 |
2024-12-20 | CVE-2022-34159 | Huawei | Unspecified vulnerability in Huawei Cv81-Wdm Firmware 01.70.49.29.46 Huawei printers have an input verification vulnerability. | 7.5 |
2024-12-20 | CVE-2024-54538 | Apple | Unspecified vulnerability in Apple products A denial-of-service issue was addressed with improved input validation. | 7.5 |
2024-12-19 | CVE-2020-12819 | Fortinet | Out-of-bounds Write vulnerability in Fortinet Fortios A heap-based buffer overflow vulnerability in the processing of Link Control Protocol messages in FortiGate versions 5.6.12, 6.0.10, 6.2.4 and 6.4.1 and earlier may allow a remote attacker with valid SSL VPN credentials to crash the SSL VPN daemon by sending a large LCP packet, when tunnel mode is enabled. | 7.5 |
2024-12-18 | CVE-2024-11912 | The Travel Booking WordPress Theme theme for WordPress is vulnerable to blind time-based SQL Injection via the ‘order_id’ parameter in all versions up to, and including, 3.1.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. | 7.5 | |
2024-12-18 | CVE-2024-12025 | The Collapsing Categories plugin for WordPress is vulnerable to SQL Injection via the 'taxonomy' parameter of the /wp-json/collapsing-categories/v1/get REST API in all versions up to, and including, 3.0.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. | 7.5 | |
2024-12-17 | CVE-2024-9779 | A flaw was found in Open Cluster Management (OCM) when a user has access to the worker nodes which contain the cluster-manager or klusterlet deployments. | 7.5 | |
2024-12-17 | CVE-2024-49819 | IBM | Cleartext Transmission of Sensitive Information vulnerability in IBM Security Guardium KEY Lifecycle Manager IBM Security Guardium Key Lifecycle Manager 4.1, 4.1.1, 4.2.0, and 4.2.1 could allow a remote attacker to obtain sensitive information in cleartext in a communication channel that can be sniffed by unauthorized actors. | 7.5 |
2024-12-21 | CVE-2024-11977 | The The kk Star Ratings – Rate Post & Collect User Feedbacks plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 5.4.10. | 7.3 | |
2024-12-20 | CVE-2024-12830 | Arista | Path Traversal vulnerability in Arista NG Firewall 17.1.1 Arista NG Firewall custom_handler Directory Traversal Remote Code Execution Vulnerability. | 7.3 |
2024-12-19 | CVE-2024-11157 | Rockwellautomation | Out-of-bounds Write vulnerability in Rockwellautomation Arena A third-party vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to write beyond the boundaries of allocated memory in a DOE file. | 7.3 |
2024-12-19 | CVE-2024-11364 | Rockwellautomation | Use of Uninitialized Resource vulnerability in Rockwellautomation Arena Another “uninitialized variable” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to access a variable prior to it being initialized. | 7.3 |
2024-12-19 | CVE-2024-12672 | Rockwellautomation | Unspecified vulnerability in Rockwellautomation Arena A third-party vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to write beyond the boundaries of allocated memory in a DOE file. | 7.3 |
2024-12-19 | CVE-2024-11740 | W3Eden | Code Injection vulnerability in W3Eden Download Manager The The Download Manager plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 3.3.03. | 7.3 |
2024-12-21 | CVE-2024-12721 | Webbuilder143 | Deserialization of Untrusted Data vulnerability in Webbuilder143 Custom Product Tabs for Woocommerce The Custom Product Tabs For WooCommerce plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.2.4 via deserialization of untrusted input from the 'wb_custom_tabs' parameter. | 7.2 |
2024-12-18 | CVE-2024-12686 | Beyondtrust | OS Command Injection vulnerability in Beyondtrust Remote Support A vulnerability has been discovered in Privileged Remote Access (PRA) and Remote Support (RS) which can allow an attacker with existing administrative privileges to inject commands and run as a site user. | 7.2 |
2024-12-20 | CVE-2024-56356 | Jetbrains | XXE vulnerability in Jetbrains Teamcity In JetBrains TeamCity before 2024.12 insecure XMLParser configuration could lead to potential XXE attack | 7.1 |
2024-12-19 | CVE-2024-51532 | Dell | Argument Injection or Modification vulnerability in Dell Powerstoreos Dell PowerStore contains an Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability. | 7.1 |
2024-12-18 | CVE-2024-39804 | A library injection vulnerability exists in Microsoft PowerPoint 16.83 for macOS. | 7.1 | |
2024-12-18 | CVE-2024-41138 | A library injection vulnerability exists in the com.microsoft.teams2.modulehost.app helper app of Microsoft Teams (work or school) 24046.2813.2770.1094 for macOS. | 7.1 | |
2024-12-18 | CVE-2024-41145 | A library injection vulnerability exists in the WebView.app helper app of Microsoft Teams (work or school) 24046.2813.2770.1094 for macOS. | 7.1 | |
2024-12-18 | CVE-2024-41159 | A library injection vulnerability exists in Microsoft OneNote 16.83 for macOS. | 7.1 | |
2024-12-18 | CVE-2024-41165 | A library injection vulnerability exists in Microsoft Word 16.83 for macOS. | 7.1 | |
2024-12-16 | CVE-2024-12644 | The tbm-client from Chunghwa Telecom has an Arbitrary File vulnerability. | 7.1 |
151 Medium Vulnerabilities
3 Low Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2024-12-17 | CVE-2024-49820 | IBM | Cleartext Transmission of Sensitive Information vulnerability in IBM Security Guardium KEY Lifecycle Manager IBM Security Guardium Key Lifecycle Manager 4.1, 4.1.1, 4.2.0, and 4.2.1 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. | 3.7 |
2024-12-17 | CVE-2024-9654 | Awesomemotive | Incorrect Authorization vulnerability in Awesomemotive Easy Digital Downloads The Easy Digital Downloads plugin for WordPress is vulnerable to Improper Authorization in versions 3.1 through 3.3.4. | 3.7 |
2024-12-20 | CVE-2024-44298 | Apple | Insecure Storage of Sensitive Information vulnerability in Apple Macos 15.0 A privacy issue was addressed with improved private data redaction for log entries. | 3.3 |