CISA Bulletins - Vulnerability Summary for the Week of August 26, 2024

  • Welcome to ITBible, we're your #1 resource for enterprise or homelab IT problems (or just a place to show off your stuff).
C

CISA

Guest

High Vulnerabilities​

Primary
Vendor -- Product
DescriptionPublishedCVSS ScoreSource & Patch Info
Adobe--Acrobat Reader
Acrobat Reader versions 127.0.2651.105 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.2024-08-267.8CVE-2024-41879
[email protected]
aertherwide -- exiftags
Buffer Overflow vulnerability in open source exiftags v.1.01 allows a local attacker to execute arbitrary code via the paresetag function.2024-08-277.8CVE-2024-42851
[email protected]
angeljudesuarez -- tailoring_management_system
A vulnerability classified as critical was found in itsourcecode Tailoring Management System 1.0. This vulnerability affects unknown code of the file staffcatedit.php. The manipulation of the argument title leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.2024-08-269.8CVE-2024-8171
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
angeljudesuarez -- tailoring_management_system
A vulnerability was found in itsourcecode Tailoring Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file staffedit.php. The manipulation of the argument id/stafftype/address/fullname/phonenumber/salary leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.2024-08-279.8CVE-2024-8220
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
apollographql--federation
Apollo Federation is an architecture for declaratively composing APIs into a unified graph. Each team can own their slice of the graph independently, empowering them to deliver autonomously and incrementally. Instances of @apollo/query-planner >=2.0.0 and <2.8.5 are impacted by a denial-of-service vulnerability. @apollo/gateway versions >=2.0.0 and < 2.8.5 and Apollo Router <1.52.1 are also impacted through their use of @apollo/query-panner. If @apollo/query-planner is asked to plan a sufficiently complex query, it may loop infinitely and never complete. This results in unbounded memory consumption and either a crash or out-of-memory (OOM) termination. This issue can be triggered if you have at least one non-@key field that can be resolved by multiple subgraphs. To identify these shared fields, the schema for each subgraph must be reviewed. The mechanism to identify shared fields varies based on the version of Federation your subgraphs are using. You can check if your subgraphs are using Federation 1 or Federation 2 by reviewing their schemas. Federation 2 subgraph schemas will contain a @link directive referencing the version of Federation being used while Federation 1 subgraphs will not. For example, in a Federation 2 subgraph, you will find a line like @link(url: "https://specs.apollo.dev/federation/v2.0"). If a similar @link directive is not present in your subgraph schema, it is using Federation 1. Note that a supergraph can contain a mix of Federation 1 and Federation 2 subgraphs. This issue results from the Apollo query planner attempting to use a Number exceeding Javascript's Number.MAX_VALUE in some cases. In Javascript, Number.MAX_VALUE is (2^1024 - 2^971). When the query planner receives an inbound graphql request, it breaks the query into pieces and for each piece, generates a list of potential execution steps to solve the piece. These candidates represent the steps that the query planner will take to satisfy the pieces of the larger query. As part of normal operations, the query planner requires and calculates the number of possible query plans for the total query. That is, it needs the product of the number of query plan candidates for each piece of the query. Under normal circumstances, after generating all query plan candidates and calculating the number of all permutations, the query planner moves on to stack rank candidates and prune less-than-optimal options. In particularly complex queries, especially those where fields can be solved through multiple subgraphs, this can cause the number of all query plan permutations to balloon. In worst-case scenarios, this can end up being a number larger than Number.MAX_VALUE. In Javascript, if Number.MAX_VALUE is exceeded, Javascript represents the value as "infinity". If the count of candidates is evaluated as infinity, the component of the query planner responsible for pruning less-than-optimal query plans does not actually prune candidates, causing the query planner to evaluate many orders of magnitude more query plan candidates than necessary. This issue has been addressed in @apollo/query-planner v2.8.5, @apollo/gateway v2.8.5, and Apollo Router v1.52.1. Users are advised to upgrade. This issue can be avoided by ensuring there are no fields resolvable from multiple subgraphs. If all subgraphs are using Federation 2, you can confirm that you are not impacted by ensuring that none of your subgraph schemas use the @shareable directive. If you are using Federation 1 subgraphs, you will need to validate that there are no fields resolvable by multiple subgraphs.2024-08-277.5CVE-2024-43414
[email protected]
[email protected]
[email protected]
apollographql--router
The Apollo Router Core is a configurable, high-performance graph router written in Rust to run a federated supergraph that uses Apollo Federation 2. Instances of the Apollo Router running versions >=1.21.0 and < 1.52.1 are impacted by a denial of service vulnerability if all of the following are true: 1. The Apollo Router has been configured to support External Coprocessing. 2. The Apollo Router has been configured to send request bodies to coprocessors. This is a non-default configuration and must be configured intentionally by administrators. Instances of the Apollo Router running versions >=1.7.0 and <1.52.1 are impacted by a denial-of-service vulnerability if all of the following are true: 1. Router has been configured to use a custom-developed Native Rust Plugin. 2. The plugin accesses Request.router_request in the RouterService layer. 3. You are accumulating the body from Request.router_request into memory. If using an impacted configuration, the Router will load entire HTTP request bodies into memory without respect to other HTTP request size-limiting configurations like limits.http_max_request_bytes. This can cause the Router to be out-of-memory (OOM) terminated if a sufficiently large request is sent to the Router. By default, the Router sets limits.http_max_request_bytes to 2 MB. If you have an impacted configuration as defined above, please upgrade to at least Apollo Router 1.52.1. If you cannot upgrade, you can mitigate the denial-of-service opportunity impacting External Coprocessors by setting the coprocessor.router.request.body configuration option to false. Please note that changing this configuration option will change the information sent to any coprocessors you have configured and may impact functionality implemented by those coprocessors. If you have developed a Native Rust Plugin and cannot upgrade, you can update your plugin to either not accumulate the request body or enforce a maximum body size limit. You can also mitigate this issue by limiting HTTP body payload sizes prior to the Router (e.g., in a proxy or web application firewall appliance).2024-08-277.5CVE-2024-43783
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
bdthemes--Ultimate Store Kit Elementor Addons, Woocommerce Builder, EDD Builder, Elementor Store Builder, Product Grid, Product Table, Woocommerce Slider
The Ultimate Store Kit Elementor Addons, Woocommerce Builder, EDD Builder, Elementor Store Builder, Product Grid, Product Table, Woocommerce Slider plugin is vulnerable to PHP Object Injection via deserialization of untrusted input via the _ultimate_store_kit_wishlist cookie in versions up to , and including, 2.0.3. This makes it possible for an unauthenticated attacker to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker or above to delete arbitrary files, retrieve sensitive data, or execute code.2024-08-289.8CVE-2024-8030
[email protected]
[email protected]
Beckhoff--IPC Diagnostics package
The IPC-Diagnostics package included in TwinCAT/BSD is vulnerable to a local authentication bypass by a low privileged attacker.2024-08-277.8CVE-2024-41173
[email protected]
Beckhoff--IPC Diagnostics package
The IPC-Diagnostics package in TwinCAT/BSD is susceptible to improper input neutralization by a low-privileged local attacker.2024-08-277.3CVE-2024-41174
[email protected]
brainlowcode -- brain_low-code
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection'), CWE - 564 - SQL Injection: Hibernate vulnerability in Brain Information Technologies Inc. Brain Low-Code allows SQL Injection.This issue affects Brain Low-Code: before 2.1.0.2024-08-279.8CVE-2024-7071
[email protected]
chartist -- chartist
Chartist 1.x through 1.3.0 allows Prototype Pollution via the extend function.2024-08-299.8CVE-2024-45435
[email protected]
[email protected]
CIGES--CIGESv2
SQL injection vulnerability in ATISolutions CIGES affecting versions lower than 2.15.5. This vulnerability allows a remote attacker to send a specially crafted SQL query to the /modules/ajaxServiciosCentro.php point in the idCentro parameter and retrieve all the information stored in the database.2024-08-269.8CVE-2024-8161
[email protected]
Cisco--Cisco NX-OS Software
A vulnerability in the DHCPv6 relay agent of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper handling of specific fields in a DHCPv6 RELAY-REPLY message. An attacker could exploit this vulnerability by sending a crafted DHCPv6 packet to any IPv6 address that is configured on an affected device. A successful exploit could allow the attacker to cause the dhcp_snoop process to crash and restart multiple times, causing the affected device to reload and resulting in a DoS condition.2024-08-288.6CVE-2024-20446
[email protected]
code-projects--Blood Bank System
A vulnerability, which was classified as critical, was found in code-projects Blood Bank System 1.0. Affected is an unknown function of the file /login.php of the component Login Page. The manipulation of the argument user leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.2024-08-267.3CVE-2024-8173
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
code-projects--Hospital Management System
A vulnerability was found in code-projects Hospital Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file index.php of the component Login. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.2024-09-017.3CVE-2024-8368
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
cridio -- listingpro
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in CridioStudio ListingPro allows SQL Injection.This issue affects ListingPro: from n/a through 2.9.4.2024-08-299.8CVE-2024-38795
[email protected]
cridio -- listingpro
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in CridioStudio ListingPro.This issue affects ListingPro: from n/a through 2.9.4.2024-08-299.8CVE-2024-39622
[email protected]
cridio -- listingpro
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in CridioStudio ListingPro allows SQL Injection.This issue affects ListingPro: from n/a through 2.9.4.2024-08-298.8CVE-2024-39620
[email protected]
Dell--Dell Client Platform BIOS
Dell Client Platform BIOS contains a Use of Default Cryptographic Key Vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Secure Boot bypass and arbitrary code execution.2024-08-288.2CVE-2024-39584
[email protected]
Dinesh Karki--WP Armour Extended
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Dinesh Karki WP Armour Extended.This issue affects WP Armour Extended: from n/a through 1.26.2024-08-297.1CVE-2024-43948
[email protected]
dlink -- dir-846w_firmware
D-Link DIR-846W A1 FW100A43 was discovered to contain a remote command execution (RCE) vulnerability via the tomography_ping_address parameter in /HNAP1/ interface.2024-08-279.8CVE-2024-41622
[email protected]
[email protected]
[email protected]
dlink -- dir-846w_firmware
D-Link DIR-846W A1 FW100A43 was discovered to contain a remote command execution (RCE) vulnerability via the lan(0)_dhcps_staticlist parameter. This vulnerability is exploited via a crafted POST request.2024-08-279.8CVE-2024-44341
[email protected]
[email protected]
[email protected]
dlink -- dir-846w_firmware
D-Link DIR-846W A1 FW100A43 was discovered to contain a remote command execution (RCE) vulnerability via the wl(0).(0)_ssid parameter. This vulnerability is exploited via a crafted POST request.2024-08-279.8CVE-2024-44342
[email protected]
[email protected]
[email protected]
dlink -- dir-846w_firmware
D-Link DIR-846W A1 FW100A43 was discovered to contain a remote command execution (RCE) vulnerability via keys smartqos_express_devices and smartqos_normal_devices in SetSmartQoSSettings.2024-08-278.8CVE-2024-44340
[email protected]
[email protected]
[email protected]
dlink -- dns-315l_firmware
A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. It has been classified as critical. This affects the function sprintf of the file /cgi-bin/hd_config.cgi. The manipulation of the argument f_mount leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.2024-08-279.8CVE-2024-8210
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
dlink -- dns-315l_firmware
A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. It has been declared as critical. This vulnerability affects the function cgi_FMT_Std2R1_DiskMGR of the file /cgi-bin/hd_config.cgi. The manipulation of the argument f_newly_dev leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.2024-08-279.8CVE-2024-8211
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
dlink -- dns-315l_firmware
A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. It has been rated as critical. This issue affects the function cgi_FMT_R12R5_2nd_DiskMGR of the file /cgi-bin/hd_config.cgi. The manipulation of the argument f_source_dev leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.2024-08-279.8CVE-2024-8212
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
dlink -- dns-315l_firmware
A vulnerability classified as critical has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. Affected is the function cgi_FMT_R12R5_1st_DiskMGR of the file /cgi-bin/hd_config.cgi. The manipulation of the argument f_source_dev leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.2024-08-279.8CVE-2024-8213
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
dlink -- dns-315l_firmware
A vulnerability classified as critical was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. Affected by this vulnerability is the function cgi_FMT_Std2R5_2nd_DiskMGR of the file /cgi-bin/hd_config.cgi. The manipulation of the argument f_source_dev leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.2024-08-279.8CVE-2024-8214
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
donbermoy -- e-commerce_website
A vulnerability has been found in SourceCodester E-Commerce Website 1.0 and classified as critical. This vulnerability affects unknown code of the file /Admin/registration.php. The manipulation of the argument fname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.2024-08-279.8CVE-2024-8217
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
E4J s.r.l.--VikRentCar
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in E4J s.R.L. VikRentCar allows SQL Injection.This issue affects VikRentCar: from n/a through 1.4.0.2024-08-299.3CVE-2024-39653
[email protected]
Easy Digital Downloads--Easy Digital Downloads
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Easy Digital Downloads allows SQL Injection.This issue affects Easy Digital Downloads: from n/a through 3.2.12.2024-08-299.3CVE-2024-5057
[email protected]
ELECOM CO.,LTD.--WAB-I1750-PS
Missing authentication vulnerability exists in Telnet function of WAB-I1750-PS v1.5.10 and earlier. When Telnet function of the product is enabled, a remote attacker may login to the product without authentication and alter the product's settings.2024-08-308.1CVE-2024-39300
[email protected]
[email protected]
etoilewebdesign -- front_end_users
The Front End Users plugin for WordPress is vulnerable to time-based SQL Injection via the 'order' parameter in all versions up to, and including, 3.2.28 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.2024-08-298.8CVE-2024-7607
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
eyecix--JobSearch
Deserialization of Untrusted Data vulnerability in eyecix JobSearch allows Object Injection.This issue affects JobSearch: from n/a through 2.5.3.2024-08-299.8CVE-2024-43931
[email protected]
fabianros -- job_portal
A vulnerability was found in code-projects Job Portal 1.0. It has been classified as critical. Affected is an unknown function of the file /forget.php. The manipulation of the argument email/mobile leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.2024-08-269.8CVE-2024-8167
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
fabianros -- online_bus_reservation_site
A vulnerability was found in code-projects Online Bus Reservation Site 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file login.php. The manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.2024-08-269.8CVE-2024-8168
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
fabianros -- online_quiz_site
A vulnerability was found in code-projects Online Quiz Site 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file signupuser.php. The manipulation of the argument lid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.2024-08-269.8CVE-2024-8169
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
fabianros -- online_quiz_site
A vulnerability was found in code-projects Online Quiz Site 1.0 and classified as critical. This issue affects some unknown processing of the file index.php. The manipulation of the argument loginid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.2024-08-279.8CVE-2024-8218
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
fabianros -- responsive_hotel_site
A vulnerability was found in code-projects Responsive Hotel Site 1.0. It has been classified as critical. Affected is an unknown function of the file index.php. The manipulation of the argument name/phone/email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.2024-08-279.8CVE-2024-8219
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
fastcom -- fw300r_firmware
A stack overflow in FAST FW300R v1.3.13 Build 141023 Rel.61347n allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via a crafted file path.2024-08-269.8CVE-2024-41285
[email protected]
[email protected]
[email protected]
feehi -- feehicms
A vulnerability, which was classified as critical, was found in FeehiCMS up to 2.1.1. This affects the function update of the file /admin/index.php?r=friendly-link%2Fupdate. The manipulation of the argument FriendlyLink[image] leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.2024-08-299.8CVE-2024-8294
[email protected]
[email protected]
[email protected]
[email protected]
feehi -- feehicms
A vulnerability has been found in FeehiCMS up to 2.1.1 and classified as critical. This vulnerability affects the function createBanner of the file /admin/index.php?r=banner%2Fbanner-create. The manipulation of the argument BannerForm leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8295&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8295']CVE-2024-8295[/URL]
[URL='https://gitee.com/A0kooo/cve_article/blob/master/feehi_cms/file_upload2/Fichkems%20banner%20file%20upload%20vulnerability.md'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.276070'][email protected][/URL]
[URL='https://vuldb.com/?id.276070'][email protected][/URL]
[URL='https://vuldb.com/?submit.394560'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]feehi -- feehicms
[/TD]
[TD]A vulnerability was found in FeehiCMS up to 2.1.1 and classified as critical. This issue affects the function insert of the file /admin/index.php?r=user%2Fcreate. The manipulation of the argument User[avatar] leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8296&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8296']CVE-2024-8296[/URL]
[URL='https://gitee.com/A0kooo/cve_article/blob/master/feehi_cms/file_upload3/Fichkems%20user%20file%20upload%20vulnerability.md'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.276071'][email protected][/URL]
[URL='https://vuldb.com/?id.276071'][email protected][/URL]
[URL='https://vuldb.com/?submit.394568'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]flowiseai -- flowise
[/TD]
[TD]An Authentication Bypass vulnerability exists in Flowise version 1.8.2. This could allow a remote, unauthenticated attacker to access API endpoints as an administrator and allow them to access restricted functionality.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8181&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N']8.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8181']CVE-2024-8181[/URL]
[URL='https://tenable.com/security/research/tra-2024-22-0'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]flowiseai -- flowise
[/TD]
[TD]An Unauthenticated Denial of Service (DoS) vulnerability exists in Flowise version 1.8.2 leading to a complete crash of the instance running a vulnerable version due to improper handling of user supplied input to the "/api/v1/get-upload-file" api endpoint.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8182&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H']7.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8182']CVE-2024-8182[/URL]
[URL='https://tenable.com/security/research/tra-2024-34'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Fonts Plugin--Fonts
[/TD]
[TD]Cross-Site Request Forgery (CSRF) vulnerability in Fonts Plugin Fonts allows Stored XSS.This issue affects Fonts: from n/a through 3.7.7.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43301&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L']7.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43301']CVE-2024-43301[/URL]
[URL='https://patchstack.com/database/vulnerability/olympus-google-fonts/wordpress-fonts-plugin-3-7-7-cross-site-request-forgery-csrf-to-stored-xssvulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]fortra -- filecatalyst_workflow
[/TD]
[TD]The default credentials for the setup HSQL database (HSQLDB) for FileCatalyst Workflow are published in a vendor knowledgebase article. Misuse of these credentials could lead to a compromise of confidentiality, integrity, or availability of the software. The HSQLDB is only included to facilitate installation, has been deprecated, and is not intended for production use per vendor guides. However, users who have not configured FileCatalyst Workflow to use an alternative database per recommendations are vulnerable to attack from any source that can reach the HSQLDB.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-6633&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-6633']CVE-2024-6633[/URL]
[URL='https://www.fortra.com/security/advisories/product-security/fi-2024-011']df4dee71-de3a-4139-9588-11b62fe6c0ff[/URL]
[/TD]
[/TR]
[TR]
[TD]fortra -- filecatalyst_workflow
[/TD]
[TD]A vulnerability exists in FileCatalyst Workflow whereby a field accessible to the super admin can be used to perform an SQL injection attack which can lead to a loss of confidentiality, integrity, and availability.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-6632&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H']7.2[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-6632']CVE-2024-6632[/URL]
[URL='https://www.fortra.com/security/advisories/product-security/fi-2024-010']df4dee71-de3a-4139-9588-11b62fe6c0ff[/URL]
[/TD]
[/TR]
[TR]
[TD]funnelforms--Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor Funnelforms Free
[/TD]
[TD]The Funnelforms Free plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'af2_add_font' function in all versions up to, and including, 3.7.3.2. This makes it possible for authenticated attackers, with administrator-level and above permissions, to upload arbitrary files on the affected site's server which may make remote code execution possible.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-6311&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H']7.2[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-6311']CVE-2024-6311[/URL]
[URL='https://plugins.trac.wordpress.org/browser/funnelforms-free/tags/3.7.3.2/admin/menu_ajax_functions/formularbuilder_fonts.php#L47'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/browser/funnelforms-free/tags/3.7.4.1/admin/menu_ajax_functions/formularbuilder_fonts.php?rev=3141470#L50'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/cbd42fc4-ab4a-4053-b765-18272eacd2bc?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Gether Technology--6SHR System
[/TD]
[TD]6SHR system from Gether Technology does not properly validate the specific page parameter, allowing remote attackers with regular privilege to inject SQL command to read, modify, and delete database contents.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8329&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']8.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8329']CVE-2024-8329[/URL]
[URL='https://www.twcert.org.tw/en/cp-139-8034-657b7-2.html'][email protected][/URL]
[URL='https://www.twcert.org.tw/tw/cp-132-8030-e2eac-1.html'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Gether Technology--6SHR System
[/TD]
[TD]6SHR system from Gether Technology does not properly validate uploaded file types, allowing remote attackers with regular privileges to upload web shell scripts and use them to execute arbitrary system commands on the server.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8330&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']8.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8330']CVE-2024-8330[/URL]
[URL='https://www.twcert.org.tw/en/cp-139-8035-53926-2.html'][email protected][/URL]
[URL='https://www.twcert.org.tw/tw/cp-132-8031-a2f21-1.html'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]getkirby--kirby
[/TD]
[TD]Kirby is a CMS targeting designers and editors. Kirby allows to restrict the permissions of specific user roles. Users of that role can only perform permitted actions. Permissions for creating and deleting languages have already existed and could be configured, but were not enforced by Kirby's frontend or backend code. A permission for updating existing languages has not existed before the patched versions. So disabling the languages.* wildcard permission for a role could not have prohibited updates to existing language definitions. The missing permission checks allowed attackers with Panel access to manipulate the language definitions. The problem has been patched in Kirby 3.6.6.6, Kirby 3.7.5.5, Kirby 3.8.4.4, Kirby 3.9.8.2, Kirby 3.10.1.1, and Kirby 4.3.1. Please update to one of these or a later version to fix the vulnerability. There are no known workarounds for this vulnerability.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-41964&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H']8.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-41964']CVE-2024-41964[/URL]
[URL='https://github.com/getkirby/kirby/commit/ab95d172667c3cd529917c2bc94d3c7969706d23'][email protected][/URL]
[URL='https://github.com/getkirby/kirby/security/advisories/GHSA-jm9m-rqr3-wfmh'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]gitapp -- dingfanzu
[/TD]
[TD]A vulnerability was found in dingfanzu CMS up to 29d67d9044f6f93378e6eb6ff92272217ff7225c. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /ajax/checkin.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8301&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8301']CVE-2024-8301[/URL]
[URL='https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/dingfanzu-CMS/dingfanzu-CMS%20checkin.php%20username%20SQL-inject.md'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.276073'][email protected][/URL]
[URL='https://vuldb.com/?id.276073'][email protected][/URL]
[URL='https://vuldb.com/?submit.396294'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]google -- chrome
[/TD]
[TD]Heap buffer overflow in Skia in Google Chrome prior to 128.0.6613.113 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8193&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H']8.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8193']CVE-2024-8193[/URL]
[URL='https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_28.html'][email protected][/URL]
[URL='https://issues.chromium.org/issues/360265320'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]google -- chrome
[/TD]
[TD]Type Confusion in V8 in Google Chrome prior to 128.0.6613.113 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8194&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H']8.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8194']CVE-2024-8194[/URL]
[URL='https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_28.html'][email protected][/URL]
[URL='https://issues.chromium.org/issues/360533914'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]google -- chrome
[/TD]
[TD]Heap buffer overflow in Skia in Google Chrome prior to 128.0.6613.113 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8198&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H']8.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8198']CVE-2024-8198[/URL]
[URL='https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_28.html'][email protected][/URL]
[URL='https://issues.chromium.org/issues/360758697'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]gVectors Team--wpForo Forum
[/TD]
[TD]Exposure of Sensitive Information to an Unauthorized Actor vulnerability in gVectors Team wpForo Forum.This issue affects wpForo Forum: from n/a through 2.3.4.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43289&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N']7.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43289']CVE-2024-43289[/URL]
[URL='https://patchstack.com/database/vulnerability/wpforo/wordpress-wpforo-forum-plugin-2-3-4-unauthenticated-sensitive-data-exposure-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]gzequan -- eq_enterprise_management_system
[/TD]
[TD]An issue in EQ Enterprise Management System before v2.0.0 allows attackers to execute a directory traversal via crafted requests.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-44761&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44761']CVE-2024-44761[/URL]
[URL='https://github.com/WarmBrew/web_vul/blob/main/EQ/EQEMS.md'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Hillstone Networks--Hillstone Networks Web Application Firewall
[/TD]
[TD]Improper Input Validation vulnerability in Hillstone Networks Hillstone Networks Web Application Firewall on 5.5R6 allows Command Injection.This issue affects Hillstone Networks Web Application Firewall: from 5.5R6-2.6.7 through 5.5R6-2.8.13.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8073&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8073']CVE-2024-8073[/URL]
[URL='https://www.hillstonenet.com.cn/security-notification/2024/08/21/mlzrld-2/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Hitachi--Hitachi Ops Center Common Services
[/TD]
[TD]Authentication Bypass vulnerability in Hitachi Ops Center Common Services.This issue affects Hitachi Ops Center Common Services: from 10.9.3-00 before 11.0.2-01.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-7125&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']7.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-7125']CVE-2024-7125[/URL]
[URL='https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2024-143/index.html'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]hitachienergy -- microscada_x_sys600
[/TD]
[TD]The product does not validate any query towards persistent data, resulting in a risk of injection attacks.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-4872&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-4872']CVE-2024-4872[/URL]
[URL='https://publisher.hitachienergy.com/preview?DocumentID=8DBD000160&LanguageCode=en&DocumentPartId=&Action=Launch'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]hitachienergy -- microscada_x_sys600
[/TD]
[TD]The product exposes a service that is intended for local only to all network interfaces without any authentication.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-7940&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-7940']CVE-2024-7940[/URL]
[URL='https://publisher.hitachienergy.com/preview?DocumentID=8DBD000160&LanguageCode=en&DocumentPartId=&Action=Launch'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]hitachienergy -- microscada_x_sys600
[/TD]
[TD]The product allows user input to control or influence paths or file names that are used in filesystem operations, allowing the attacker to access or modify system files or other files that are critical to the application.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-3980&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']8.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-3980']CVE-2024-3980[/URL]
[URL='https://publisher.hitachienergy.com/preview?DocumentID=8DBD000160&LanguageCode=en&DocumentPartId=&Action=Launch'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]hitachienergy -- microscada_x_sys600
[/TD]
[TD]An attacker with local access to machine where MicroSCADA X SYS600 is installed, could enable the session logging supporting the product and try to exploit a session hijacking of an already established session. By default, the session logging level is not enabled and only users with administrator rights can enable it.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-3982&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H']8.2[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-3982']CVE-2024-3982[/URL]
[URL='https://publisher.hitachienergy.com/preview?DocumentID=8DBD000160&LanguageCode=en&DocumentPartId=&Action=Launch'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]hornero--Clean Login
[/TD]
[TD]The Clean Login plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.14.5 via the 'template' attribute of the clean-login-register shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other "safe" file types can be uploaded and included.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8252&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']8.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8252']CVE-2024-8252[/URL]
[URL='https://plugins.trac.wordpress.org/browser/clean-login/tags/1.14.5/include/frontend.php#L20'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/browser/clean-login/tags/1.14.5/include/shortcodes.php#L146'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3143241%40clean-login&new=3143241%40clean-login&sfp_email=&sfph_mail='][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/b9f99b51-e1b1-4cd3-a9f7-24e4b59811a7?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]HP Inc.--HP Security Manager
[/TD]
[TD]HP Security Manager is potentially vulnerable to Remote Code Execution as a result of code vulnerability within the product's solution open-source libraries.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-7720&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-7720']CVE-2024-7720[/URL]
[URL='https://support.hp.com/us-en/document/ish_11074404-11074432-16/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]HWA JIUH DIGITAL TECHNOLOGY--Easy test Online Learning and Testing Platform
[/TD]
[TD]Easy test Online Learning and Testing Platform from HWA JIUH DIGITAL TECHNOLOGY does not properly validate a specific page parameter, allowing remote attackers with regular privilege to inject arbitrary SQL commands to read, modify, and delete database contents.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8327&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']8.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8327']CVE-2024-8327[/URL]
[URL='https://www.twcert.org.tw/en/cp-139-8032-a3d5c-2.html'][email protected][/URL]
[URL='https://www.twcert.org.tw/tw/cp-132-8028-360e1-1.html'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]IBM--Sterling Connect:Direct Web Services
[/TD]
[TD]IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 uses default credentials for potentially critical functionality.[/TD]
[TD]2024-08-31[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-39747&vector=CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H']8.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-39747']CVE-2024-39747[/URL]
[URL='https://exchange.xforce.ibmcloud.com/vulnerabilities/297314'][email protected][/URL]
[URL='https://www.ibm.com/support/pages/node/7166947'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]in2code -- powermail
[/TD]
[TD]An issue was discovered in powermail extension through 12.3.5 for TYPO3. Several actions in the OutputController can directly be called, due to missing or insufficiently implemented access checks, resulting in Broken Access Control. Depending on the configuration of the Powermail Frontend plugins, an unauthenticated attacker can exploit this to edit, update, delete, or export data of persisted forms. This can only be exploited when the Powermail Frontend plugins are used. The fixed versions are 7.5.0, 8.5.0, 10.9.0, and 12.4.0.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-45233&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-45233']CVE-2024-45233[/URL]
[URL='https://typo3.org/security/advisory/typo3-ext-sa-2024-006'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]jpillora--chisel
[/TD]
[TD]Chisel is a fast TCP/UDP tunnel, transported over HTTP, secured via SSH. The Chisel server doesn't ever read the documented [ICODE]AUTH[/ICODE] environment variable used to set credentials, which allows any unauthenticated user to connect, even if credentials were set. Anyone running the Chisel server that is using the [ICODE]AUTH[/ICODE] environment variable to specify credentials to authenticate against is affected by this vulnerability. Chisel is often used to provide an entrypoint to a private network, which means services that are gated by Chisel may be affected. Additionally, Chisel is often used for exposing services to the internet. An attacker could MITM requests by connecting to a Chisel server and requesting to forward traffic from a remote port. This issue has been addressed in release version 1.10.0. All users are advised to upgrade. There are no known workarounds for this vulnerability.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43798&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N']8.6[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43798']CVE-2024-43798[/URL]
[URL='https://github.com/jpillora/chisel/security/advisories/GHSA-38jh-8h67-m7mj'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]kitsada8621 -- digital_library_management_system
[/TD]
[TD]A vulnerability was found in kitsada8621 Digital Library Management System 1.0. It has been classified as problematic. Affected is the function JwtRefreshAuth of the file middleware/jwt_refresh_token_middleware.go. The manipulation of the argument Authorization leads to improper output neutralization for logs. It is possible to launch the attack remotely. The name of the patch is 81b3336b4c9240f0bf50c13cb8375cf860d945f1. It is recommended to apply a patch to fix this issue.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8297&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N']7.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8297']CVE-2024-8297[/URL]
[URL='https://github.com/kitsada8621/Digital-Library-Management-System/commit/81b3336b4c9240f0bf50c13cb8375cf860d945f1'][email protected][/URL]
[URL='https://github.com/kitsada8621/Digital-Library-Management-System/issues/1'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.276072'][email protected][/URL]
[URL='https://vuldb.com/?id.276072'][email protected][/URL]
[URL='https://vuldb.com/?submit.394613'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]linux -- linux_kernel
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: mm: list_lru: fix UAF for memory cgroup The mem_cgroup_from_slab_obj() is supposed to be called under rcu lock or cgroup_mutex or others which could prevent returned memcg from being freed. Fix it by adding missing rcu read lock. Found by code inspection. [[email protected]: only grab rcu lock when necessary, per Vlastimil] Link: https://lkml.kernel.org/r/[email protected][/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43888&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']7.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43888']CVE-2024-43888[/URL]
[URL='https://git.kernel.org/stable/c/4589f77c18dd98b65f45617b6d1e95313cf6fcab']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/5161b48712dcd08ec427c450399d4d1483e21dea']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]linux -- linux_kernel
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: media: xc2028: avoid use-after-free in load_firmware_cb() syzkaller reported use-after-free in load_firmware_cb() [1]. The reason is because the module allocated a struct tuner in tuner_probe(), and then the module initialization failed, the struct tuner was released. A worker which created during module initialization accesses this struct tuner later, it caused use-after-free. The process is as follows: task-6504 worker_thread tuner_probe <= alloc dvb_frontend [2] ... request_firmware_nowait <= create a worker ... tuner_remove <= free dvb_frontend ... request_firmware_work_func <= the firmware is ready load_firmware_cb <= but now the dvb_frontend has been freed To fix the issue, check the dvd_frontend in load_firmware_cb(), if it is null, report a warning and just return. [1]: ================================================================== BUG: KASAN: use-after-free in load_firmware_cb+0x1310/0x17a0 Read of size 8 at addr ffff8000d7ca2308 by task kworker/2:3/6504 Call trace: load_firmware_cb+0x1310/0x17a0 request_firmware_work_func+0x128/0x220 process_one_work+0x770/0x1824 worker_thread+0x488/0xea0 kthread+0x300/0x430 ret_from_fork+0x10/0x20 Allocated by task 6504: kzalloc tuner_probe+0xb0/0x1430 i2c_device_probe+0x92c/0xaf0 really_probe+0x678/0xcd0 driver_probe_device+0x280/0x370 __device_attach_driver+0x220/0x330 bus_for_each_drv+0x134/0x1c0 __device_attach+0x1f4/0x410 device_initial_probe+0x20/0x30 bus_probe_device+0x184/0x200 device_add+0x924/0x12c0 device_register+0x24/0x30 i2c_new_device+0x4e0/0xc44 v4l2_i2c_new_subdev_board+0xbc/0x290 v4l2_i2c_new_subdev+0xc8/0x104 em28xx_v4l2_init+0x1dd0/0x3770 Freed by task 6504: kfree+0x238/0x4e4 tuner_remove+0x144/0x1c0 i2c_device_remove+0xc8/0x290 __device_release_driver+0x314/0x5fc device_release_driver+0x30/0x44 bus_remove_device+0x244/0x490 device_del+0x350/0x900 device_unregister+0x28/0xd0 i2c_unregister_device+0x174/0x1d0 v4l2_device_unregister+0x224/0x380 em28xx_v4l2_init+0x1d90/0x3770 The buggy address belongs to the object at ffff8000d7ca2000 which belongs to the cache kmalloc-2k of size 2048 The buggy address is located 776 bytes inside of 2048-byte region [ffff8000d7ca2000, ffff8000d7ca2800) The buggy address belongs to the page: page:ffff7fe00035f280 count:1 mapcount:0 mapping:ffff8000c001f000 index:0x0 flags: 0x7ff800000000100(slab) raw: 07ff800000000100 ffff7fe00049d880 0000000300000003 ffff8000c001f000 raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff8000d7ca2200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff8000d7ca2280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb >ffff8000d7ca2300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffff8000d7ca2380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff8000d7ca2400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ================================================================== [2] Actually, it is allocated for struct tuner, and dvb_frontend is inside.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43900&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']7.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43900']CVE-2024-43900[/URL]
[URL='https://git.kernel.org/stable/c/208deb6d8c3cb8c3acb1f41eb31cf68ea08726d5']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/68594cec291ff9523b9feb3f43fd853dcddd1f60']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/850304152d367f104d21c77cfbcc05806504218b']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/ef517bdfc01818419f7bd426969a0c86b14f3e0e']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]linux -- linux_kernel
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: idpf: fix UAFs when destroying the queues The second tagged commit started sometimes (very rarely, but possible) throwing WARNs from net/core/page_pool.c:page_pool_disable_direct_recycling(). Turned out idpf frees interrupt vectors with embedded NAPIs [I]before[/I] freeing the queues making page_pools' NAPI pointers lead to freed memory before these pools are destroyed by libeth. It's not clear whether there are other accesses to the freed vectors when destroying the queues, but anyway, we usually free queue/interrupt vectors only when the queues are destroyed and the NAPIs are guaranteed to not be referenced anywhere. Invert the allocation and freeing logic making queue/interrupt vectors be allocated first and freed last. Vectors don't require queues to be present, so this is safe. Additionally, this change allows to remove that useless queue->q_vector pointer cleanup, as vectors are still valid when freeing the queues (+ both are freed within one function, so it's not clear why nullify the pointers at all).[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-44932&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']7.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44932']CVE-2024-44932[/URL]
[URL='https://git.kernel.org/stable/c/290f1c033281c1a502a3cd1c53c3a549259c491f']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/3cde714b0e77206ed1b5cf31f28c18ba9ae946fd']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]linux -- linux_kernel
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: net: bridge: mcast: wait for previous gc cycles when removing port syzbot hit a use-after-free[1] which is caused because the bridge doesn't make sure that all previous garbage has been collected when removing a port. What happens is: CPU 1 CPU 2 start gc cycle remove port acquire gc lock first wait for lock call br_multicasg_gc() directly acquire lock now but free port the port can be freed while grp timers still running Make sure all previous gc cycles have finished by using flush_work before freeing the port. [1] BUG: KASAN: slab-use-after-free in br_multicast_port_group_expired+0x4c0/0x550 net/bridge/br_multicast.c:861 Read of size 8 at addr ffff888071d6d000 by task syz.5.1232/9699 CPU: 1 PID: 9699 Comm: syz.5.1232 Not tainted 6.10.0-rc5-syzkaller-00021-g24ca36a562d6 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 Call Trace: <IRQ> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:114 print_address_description mm/kasan/report.c:377 [inline] print_report+0xc3/0x620 mm/kasan/report.c:488 kasan_report+0xd9/0x110 mm/kasan/report.c:601 br_multicast_port_group_expired+0x4c0/0x550 net/bridge/br_multicast.c:861 call_timer_fn+0x1a3/0x610 kernel/time/timer.c:1792 expire_timers kernel/time/timer.c:1843 [inline] __run_timers+0x74b/0xaf0 kernel/time/timer.c:2417 __run_timer_base kernel/time/timer.c:2428 [inline] __run_timer_base kernel/time/timer.c:2421 [inline] run_timer_base+0x111/0x190 kernel/time/timer.c:2437[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-44934&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']7.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44934']CVE-2024-44934[/URL]
[URL='https://git.kernel.org/stable/c/0d8b26e10e680c01522d7cc14abe04c3265a928f']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/1e16828020c674b3be85f52685e8b80f9008f50f']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/92c4ee25208d0f35dafc3213cdf355fbe449e078']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/b2f794b168cf560682ff976b255aa6d29d14a658']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/e3145ca904fa8dbfd1a5bf0187905bc117b0efce']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]linux -- linux_kernel
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to do sanity check on F2FS_INLINE_DATA flag in inode during GC syzbot reports a f2fs bug as below: ------------[ cut here ]------------ kernel BUG at fs/f2fs/inline.c:258! CPU: 1 PID: 34 Comm: kworker/u8:2 Not tainted 6.9.0-rc6-syzkaller-00012-g9e4bc4bcae01 #0 RIP: 0010:f2fs_write_inline_data+0x781/0x790 fs/f2fs/inline.c:258 Call Trace: f2fs_write_single_data_page+0xb65/0x1d60 fs/f2fs/data.c:2834 f2fs_write_cache_pages fs/f2fs/data.c:3133 [inline] __f2fs_write_data_pages fs/f2fs/data.c:3288 [inline] f2fs_write_data_pages+0x1efe/0x3a90 fs/f2fs/data.c:3315 do_writepages+0x35b/0x870 mm/page-writeback.c:2612 __writeback_single_inode+0x165/0x10b0 fs/fs-writeback.c:1650 writeback_sb_inodes+0x905/0x1260 fs/fs-writeback.c:1941 wb_writeback+0x457/0xce0 fs/fs-writeback.c:2117 wb_do_writeback fs/fs-writeback.c:2264 [inline] wb_workfn+0x410/0x1090 fs/fs-writeback.c:2304 process_one_work kernel/workqueue.c:3254 [inline] process_scheduled_works+0xa12/0x17c0 kernel/workqueue.c:3335 worker_thread+0x86d/0xd70 kernel/workqueue.c:3416 kthread+0x2f2/0x390 kernel/kthread.c:388 ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 The root cause is: inline_data inode can be fuzzed, so that there may be valid blkaddr in its direct node, once f2fs triggers background GC to migrate the block, it will hit f2fs_bug_on() during dirty page writeback. Let's add sanity check on F2FS_INLINE_DATA flag in inode during GC, so that, it can forbid migrating inline_data inode's data block for fixing.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-44942&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']7.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44942']CVE-2024-44942[/URL]
[URL='https://git.kernel.org/stable/c/26c07775fb5dc74351d1c3a2bc3cdf609b03e49f']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/ae00e6536a2dd54b64b39e9a39548870cf835745']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/fc01008c92f40015aeeced94750855a7111b6929']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]lopalopa -- music_management_system
[/TD]
[TD]A Cross-Site Request Forgery (CSRF) vulnerability was found in Kashipara Music Management System v1.0 via a crafted request to the /music/ajax.php?action=save_user page.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-42793&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H']8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-42793']CVE-2024-42793[/URL]
[URL='https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/CSRF%20-%20Edit%20User.pdf'][email protected][/URL]
[URL='https://www.kashipara.com/project/php/12978/music-management-system-in-php-php-project-source-code'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]lopalopa -- responsive_school_management_system
[/TD]
[TD]A SQL injection vulnerability in /smsa/admin_login.php in Kashipara Responsive School Management System v3.2.0 allows an attacker to execute arbitrary SQL commands via the "username" parameter of the Admin Login Page[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-41236&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H']7.2[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-41236']CVE-2024-41236[/URL]
[URL='https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Responsive%20School%20Management%20System%20v3.2.0/SQL%20Injection%20-%20Admin.pdf'][email protected][/URL]
[URL='https://www.kashipara.com/project/php/12362/responsive-school-management-system-php-project-source-code'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Magic Post Thumbnail--Magic Post Thumbnail
[/TD]
[TD]Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Magic Post Thumbnail allows Reflected XSS.This issue affects Magic Post Thumbnail: from n/a through 5.2.9.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43921&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L']7.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43921']CVE-2024-43921[/URL]
[URL='https://patchstack.com/database/vulnerability/magic-post-thumbnail/wordpress-generate-images-magic-post-thumbnail-plugin-5-2-9-cross-site-scripting-xss-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]ManageEngine--Endpoint Central
[/TD]
[TD]Zohocorp ManageEngine Endpoint Central affected by Incorrect authorization vulnerability while isolating the devices.This issue affects Endpoint Central: before 11.3.2406.08 and before 11.3.2400.15[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-38868&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L']7.6[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-38868']CVE-2024-38868[/URL]
[URL='https://www.manageengine.com/products/desktop-central/security-updates-ngav.html']0fc0942c-577d-436f-ae8e-945763c79b02[/URL]
[/TD]
[/TR]
[TR]
[TD]ManageEngine--Exchange Reporter Plus
[/TD]
[TD]Zohocorp ManageEngine Exchange Reporter Plus versions before 5715 are vulnerable to SQL Injection in the reports module.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-6204&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L']8.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-6204']CVE-2024-6204[/URL]
[URL='https://www.manageengine.com/products/exchange-reports/advisory/CVE-2024-6204.html']0fc0942c-577d-436f-ae8e-945763c79b02[/URL]
[/TD]
[/TR]
[TR]
[TD]ManageEngine--Password Manager Pro
[/TD]
[TD]Zohocorp ManageEngine Password Manager Pro versions before 12431 and ManageEngine PAM360 versions before 7001 are affected by authenticated SQL Injection vulnerability via a global search option.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-5546&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L']8.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-5546']CVE-2024-5546[/URL]
[URL='https://www.manageengine.com/products/passwordmanagerpro/advisory/cve-2024-5546.html']0fc0942c-577d-436f-ae8e-945763c79b02[/URL]
[/TD]
[/TR]
[TR]
[TD]maxfoundry--Media Library Folders
[/TD]
[TD]The Media Library Folders plugin for WordPress is vulnerable to second order SQL Injection via the 'sort_type' parameter of the 'mlf_change_sort_type' AJAX action in all versions up to, and including, 8.2.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-7857&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-7857']CVE-2024-7857[/URL]
[URL='https://plugins.trac.wordpress.org/browser/media-library-plus/tags/8.2.2/media-library-plus.php#L1766'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/browser/media-library-plus/tags/8.2.2/media-library-plus.php#L3339'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/changeset/3139954/media-library-plus/trunk/media-library-plus.php'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/d2266254-9281-4859-8630-f7bb5c0ead19?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]menulux -- managment_portal
[/TD]
[TD]Improper Privilege Management vulnerability in Menulux Information Technologies Managment Portal allows Collect Data as Provided by Users.This issue affects Managment Portal: through 21.05.2024.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-4428&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-4428']CVE-2024-4428[/URL]
[URL='https://www.usom.gov.tr/bildirim/tr-24-1356'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]meshtastic--firmware
[/TD]
[TD]Meshtastic device firmware is a firmware for meshtastic devices to run an open source, off-grid, decentralized, mesh network built to run on affordable, low-power devices. Meshtastic device firmware is subject to a denial of serivce vulnerability in MQTT handling, fixed in version 2.4.1 of the Meshtastic firmware and on the Meshtastic public MQTT Broker. It's strongly suggested that all users of Meshtastic, particularly those that connect to a privately hosted MQTT server, update to this or a more recent stable version right away. There are no known workarounds for this vulnerability.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-45038&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H']7.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-45038']CVE-2024-45038[/URL]
[URL='https://github.com/meshtastic/firmware/security/advisories/GHSA-3x3r-vw9f-pxq5'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]mndpsingh287--Theme Editor
[/TD]
[TD]The Theme Editor plugin for WordPress is vulnerable to deserialization of untrusted input via the 'images_array' parameter in versions up to, and including 2.8. This makes it possible for authenticated attackers with administrative privileges to call files using a PHAR wrapper that will deserialize and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-2440&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H']7.2[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-2440']CVE-2022-2440[/URL]
[URL='https://plugins.trac.wordpress.org/browser/theme-editor/trunk/ms_child_theme_editor.php#L495'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/changeset/3142694/'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/88fe46bf-8e85-4550-92ad-bdd426e5a745?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]MuffinGroup--Betheme
[/TD]
[TD]The Betheme theme for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 27.5.6 via deserialization of untrusted input of the 'mfn-page-items' post meta value. This makes it possible for authenticated attackers, with contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-2694&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']8.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-2694']CVE-2024-2694[/URL]
[URL='https://themeforest.net/item/betheme-responsive-multipurpose-wordpress-theme/7758048'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/a7c31409-c84a-4197-b08c-b70df5e66a80?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]An SEH-based buffer overflow in the BPQ32 HTTP Server in BPQ32 6.0.24.1 allows remote attackers with access to the Web Terminal to achieve remote code execution via an HTTP POST /TermInput request.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-34087&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-34087']CVE-2024-34087[/URL]
[URL='https://groups.io/g/bpq32'][email protected][/URL]
[URL='https://themodernham.com/bbs-hacking-discovering-rce-within-bpq32-seh-based-buffer-overflow/'][email protected][/URL]
[URL='https://www.cantab.net/users/john.wiseman/Documents/'][email protected][/URL]
[URL='https://www.youtube.com/%40ModernHam'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]TOTOLINK AC1200 Wireless Router A3002RU V2.1.1-B20230720.1011 is vulnerable to Buffer Overflow. The formWlEncrypt CGI handler in the boa program fails to limit the length of the wlan_ssid field from user input. This allows attackers to craft malicious HTTP requests by supplying an excessively long value for the wlan_ssid field, leading to a stack overflow. This can be further exploited to execute arbitrary commands or launch denial-of-service attacks.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-34198&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-34198']CVE-2024-34198[/URL]
[URL='https://gist.github.com/Swind1er/02f6cb414e440c34878f20fef756e286'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\manageFilesFolders.php[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-41361&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-41361']CVE-2024-41361[/URL]
[URL='https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2398'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\trackEdit.php[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-41364&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-41364']CVE-2024-41364[/URL]
[URL='https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2400'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\userScripts.php[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-41366&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-41366']CVE-2024-41366[/URL]
[URL='https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2399'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\api\playlist\appendFileToPlaylist.php[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-41367&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-41367']CVE-2024-41367[/URL]
[URL='https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2397'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\inc.setWlanIpMail.php[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-41368&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-41368']CVE-2024-41368[/URL]
[URL='https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2396'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\inc.setWifi.php[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-41369&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-41369']CVE-2024-41369[/URL]
[URL='https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2401'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]Organizr v1.90 was discovered to contain a SQL injection vulnerability via chat/setlike.php.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-41370&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-41370']CVE-2024-41370[/URL]
[URL='https://github.com/causefx/Organizr'][email protected][/URL]
[URL='https://github.com/causefx/Organizr/issues/1998'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]Organizr v1.90 was discovered to contain a SQL injection vulnerability via chat/settyping.php.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-41372&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-41372']CVE-2024-41372[/URL]
[URL='https://github.com/causefx/Organizr'][email protected][/URL]
[URL='https://github.com/causefx/Organizr/issues/1999'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]SeaCMS v12.9 has a SQL injection vulnerability in the key parameter of /js/player/dmplayer/dmku/index.php?ac=so.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-41444&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-41444']CVE-2024-41444[/URL]
[URL='https://gist.github.com/looppppp/fa328c81ce19c1097d10f95c763d0d50'][email protected][/URL]
[URL='https://github.com/seacms-net/CMS'][email protected][/URL]
[URL='https://www.seacms.net/p-549'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]Beijing Digital China Cloud Technology Co., Ltd. DCME-320 v.7.4.12.60 has a command execution vulnerability, which can be exploited to obtain device administrator privileges via the getVar function in the code/function/system/tool/ping.php file.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-42905&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-42905']CVE-2024-42905[/URL]
[URL='https://github.com/ZackSecurity/VulnerReport/blob/cve/DCN/1.md'][email protected][/URL]
[URL='https://immense-mirror-b42.notion.site/Beijing-Digital-China-Yunke-Information-Technology-Co-Ltd-DCN-firewall-has-a-command-execution-vuln-31bdd1228f6d47c09e854af5f0e7059f'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]An arbitrary file write issue in the exfiltration endpoint in BYOB (Build Your Own Botnet) 2.0 allows attackers to overwrite SQLite databases and bypass authentication via an unauthenticated HTTP request with a crafted parameter. This occurs in file_add in api/files/routes.py.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-45256&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-45256']CVE-2024-45256[/URL]
[URL='https://blog.chebuya.com/posts/unauthenticated-remote-command-execution-on-byob/'][email protected][/URL]
[URL='https://github.com/chebuya/exploits/tree/main/BYOB-RCE'][email protected][/URL]
[URL='https://github.com/malwaredllc/byob'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]A SQL injection vulnerability in the poll component in SkySystem Arfa-CMS before 5.1.3124 allows remote attackers to execute arbitrary SQL commands via the psid parameter.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-45265&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-45265']CVE-2024-45265[/URL]
[URL='https://github.com/TheHermione/CVE-2024-45265'][email protected][/URL]
[URL='https://skyss.ru'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]The App::cpanminus package through 1.7047 for Perl downloads code via insecure HTTP, enabling code execution for network attackers.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-45321&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-45321']CVE-2024-45321[/URL]
[URL='https://github.com/miyagawa/cpanminus/issues/611'][email protected][/URL]
[URL='https://github.com/miyagawa/cpanminus/pull/674'][email protected][/URL]
[URL='https://security.metacpan.org/2024/08/26/cpanminus-downloads-code-using-insecure-http.html'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]One Identity Safeguard for Privileged Passwords before 7.5.2 allows unauthorized access because of an issue related to cookies. This only affects virtual appliance installations (VMware or HyperV). The fixed versions are 7.0.5.1 LTS, 7.4.2, and 7.5.2.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-45488&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-45488']CVE-2024-45488[/URL]
[URL='https://support.oneidentity.com/kb/4376740/safeguard-for-privileged-passwords-security-vulnerability-notification-defect-460620'][email protected][/URL]
[URL='https://support.oneidentity.com/product-notification/noti-00001628'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length for XML_ParseBuffer.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-45490&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-45490']CVE-2024-45490[/URL]
[URL='https://github.com/libexpat/libexpat/issues/887'][email protected][/URL]
[URL='https://github.com/libexpat/libexpat/pull/890'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]A weak password requirement issue was discovered in Teldats Router RS123, RS123w allows a remote attacker to escalate privileges[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-39997&vector=CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-39997']CVE-2022-39997[/URL]
[URL='https://github.com/uyhacked/Teldat-s-Router/blob/main/Teldat'][email protected][/URL]
[URL='https://github.com/uyhacked/Teldat-s-Router/blob/main/Teldat%27s%20Router%20Vulnerability.md'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]A Cross-Site Request Forgery (CSRF) vulnerability was found in Kashipara Music Management System v1.0 via /music/ajax.php?action=delete_genre.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-42791&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H']8.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-42791']CVE-2024-42791[/URL]
[URL='https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/CSRF%20-%20Delete%20Genre.pdf'][email protected][/URL]
[URL='https://www.kashipara.com/project/php/12978/music-management-system-in-php-php-project-source-code'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-41996&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H']7.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-41996']CVE-2024-41996[/URL]
[URL='https://dheatattack.gitlab.io/details/'][email protected][/URL]
[URL='https://dheatattack.gitlab.io/faq/'][email protected][/URL]
[URL='https://gist.github.com/c0r0n3r/abccc14d4d96c0442f3a77fa5ca255d1'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]A reflected cross-site scripting (XSS) vulnerability in the tag parameter in the index page of vTiger CRM 7.4.0 allows attackers to execute arbitrary code in the context of a user's browser via injecting a crafted payload.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-44777&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N']7.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44777']CVE-2024-44777[/URL]
[URL='http://vtiger.com'][email protected][/URL]
[URL='https://packetstormsecurity.com/files/180462/vTiger-CRM-7.4.0-Cross-Site-Scripting.html'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]A reflected cross-site scripting (XSS) vulnerability in the parent parameter in the index page of vTiger CRM 7.4.0 allows attackers to execute arbitrary code in the context of a user's browser via injecting a crafted payload.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-44778&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N']7.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44778']CVE-2024-44778[/URL]
[URL='http://vtiger.com'][email protected][/URL]
[URL='https://packetstormsecurity.com/files/180462/vTiger-CRM-7.4.0-Cross-Site-Scripting.html'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]A reflected cross-site scripting (XSS) vulnerability in the viewname parameter in the index page of vTiger CRM 7.4.0 allows attackers to execute arbitrary code in the context of a user's browser via injecting a crafted payload.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-44779&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N']7.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44779']CVE-2024-44779[/URL]
[URL='http://vtiger.com'][email protected][/URL]
[URL='https://packetstormsecurity.com/files/180462/vTiger-CRM-7.4.0-Cross-Site-Scripting.html'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]Vulnerability in admin_ip.php in Seacms v13.1, when action=set, allows attackers to control IP parameters that are written to the data/admin/ip.php file and could result in arbitrary command execution.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-44916&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H']7.2[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44916']CVE-2024-44916[/URL]
[URL='http://seacms.com'][email protected][/URL]
[URL='https://github.com/nn0nkey/nn0nkey/blob/main/CVE-2024-44916.md'][email protected][/URL]
[URL='https://github.com/seacms-net'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]A traversal vulnerability in GeneralDocs.aspx in CentralSquare CryWolf (False Alarm Management) through 2024-08-09 allows unauthenticated attackers to read files outside of the working web directory via the rpt parameter, leading to the disclosure of sensitive information.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-45241&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N']7.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-45241']CVE-2024-45241[/URL]
[URL='https://daly.wtf/cve-2024-45241-path-traversal-in-centralsquare-crywolf/'][email protected][/URL]
[URL='https://github.com/d4lyw/CVE-2024-45241/'][email protected][/URL]
[URL='https://www.centralsquare.com/solutions/public-safety-software/public-safety-agency-operations/crywolf-false-alarm-management-solution'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX).[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-45491&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L']7.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-45491']CVE-2024-45491[/URL]
[URL='https://github.com/libexpat/libexpat/issues/888'][email protected][/URL]
[URL='https://github.com/libexpat/libexpat/pull/891'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX).[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-45492&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L']7.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-45492']CVE-2024-45492[/URL]
[URL='https://github.com/libexpat/libexpat/issues/889'][email protected][/URL]
[URL='https://github.com/libexpat/libexpat/pull/892'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]NixOS--hydra
[/TD]
[TD]Hydra is a Continuous Integration service for Nix based projects. It is possible to trigger evaluations in Hydra without any authentication. Depending on the size of evaluations, this can impact the availability of systems. The problem can be fixed by applying https://github.com/NixOS/hydra/commit/f73043378907c2c7e44f633ad764c8bdd1c947d5 to any Hydra package. Users are advised to upgrade. Users unable to upgrade should deny the [ICODE]/api/push[/ICODE] route in a reverse proxy. This also breaks the "Evaluate jobset" button in the frontend.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-45049&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H']7.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-45049']CVE-2024-45049[/URL]
[URL='https://github.com/NixOS/hydra/commit/f73043378907c2c7e44f633ad764c8bdd1c947d5'][email protected][/URL]
[URL='https://github.com/NixOS/hydra/security/advisories/GHSA-xv29-v93r-2f5v'][email protected][/URL]
[URL='https://github.com/NixOS/nixpkgs/pull/337766'][email protected][/URL]
[URL='https://mastodon.delroth.net/@delroth/113029832631860419'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]ollama -- ollama
[/TD]
[TD]extractFromZipFile in model.go in Ollama before 0.1.47 can extract members of a ZIP archive outside of the parent directory.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-45436&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N']7.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-45436']CVE-2024-45436[/URL]
[URL='https://github.com/ollama/ollama/compare/v0.1.46...v0.1.47'][email protected][/URL]
[URL='https://github.com/ollama/ollama/pull/5314'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]OpenText--NetIQ Access Manager
[/TD]
[TD]Improper Input Validation vulnerability in OpenText NetIQ Access Manager leads to Cross-Site Scripting (XSS) attack. This issue affects NetIQ Access Manager before 5.0.4.1 and 5.1.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-4554&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N']7.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-4554']CVE-2024-4554[/URL]
[URL='https://www.microfocus.com/documentation/access-manager/5.0/accessmanager504-p1-release-notes/accessmanager504-p1-release-notes.html'][email protected][/URL]
[URL='https://www.microfocus.com/documentation/access-manager/5.1/accessmanager51-release-notes/accessmanager51-release-notes.html'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]OpenText--NetIQ Access Manager
[/TD]
[TD]Improper Privilege Management vulnerability in OpenText NetIQ Access Manager allows user account impersonation in specific scenario. This issue affects NetIQ Access Manager before 5.0.4.1 and before 5.1[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-4555&vector=CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N']7.7[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-4555']CVE-2024-4555[/URL]
[URL='https://www.microfocus.com/documentation/access-manager/5.0/accessmanager504-p1-release-notes/accessmanager504-p1-release-notes.html'][email protected][/URL]
[URL='https://www.microfocus.com/documentation/access-manager/5.1/accessmanager51-release-notes/accessmanager51-release-notes.html'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]OpenText--NetIQ Advance Authentication
[/TD]
[TD]A vulnerability identified in storing and reusing information in Advance Authentication. This issue can lead to leakage of sensitive data to unauthorized user. The issue affects NetIQ Advance Authentication before 6.3.5.1[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2021-22509&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L']8.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-22509']CVE-2021-22509[/URL]
[URL='https://www.netiq.com/documentation/advanced-authentication-63/advanced-authentication-releasenotes-6351/data/advanced-authentication-releasenotes-6351.html'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]OpenText--NetIQ Advance Authentication
[/TD]
[TD]A vulnerability identified in NetIQ Advance Authentication that doesn't enforce account lockout when brute force attack is performed on API based login. This issue may lead to user account compromise if successful or may impact server performance. This issue impacts all NetIQ Advance Authentication before 6.3.5.1[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2021-22530&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L']8.2[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-22530']CVE-2021-22530[/URL]
[URL='https://www.netiq.com/documentation/advanced-authentication-63/advanced-authentication-releasenotes-6351/data/advanced-authentication-releasenotes-6351.html'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]OpenText--NetIQ Advance Authentication
[/TD]
[TD]Insufficient or weak TLS protocol version identified in Advance authentication client server communication when specific service is accessed between devices. This issue affects NetIQ Advance Authentication versions before 6.3.5.1[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2021-38121&vector=CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L']8.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-38121']CVE-2021-38121[/URL]
[URL='https://www.netiq.com/documentation/advanced-authentication-63/advanced-authentication-releasenotes-6351/data/advanced-authentication-releasenotes-6351.html'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]oretnom23 -- music_gallery_site
[/TD]
[TD]A vulnerability was found in SourceCodester Music Gallery Site 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/categories/manage_category.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8221&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8221']CVE-2024-8221[/URL]
[URL='https://github.com/LiuHaoBin6/cve/blob/main/sql.md'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.275930'][email protected][/URL]
[URL='https://vuldb.com/?id.275930'][email protected][/URL]
[URL='https://vuldb.com/?submit.398707'][email protected][/URL]
[URL='https://www.sourcecodester.com/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]oretnom23 -- music_gallery_site
[/TD]
[TD]A vulnerability classified as critical has been found in SourceCodester Music Gallery Site 1.0. This affects an unknown part of the file /admin/?page=musics/manage_music. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8222&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8222']CVE-2024-8222[/URL]
[URL='https://github.com/LiuHaoBin6/cve/blob/main/sql3.md'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.275931'][email protected][/URL]
[URL='https://vuldb.com/?id.275931'][email protected][/URL]
[URL='https://vuldb.com/?submit.398719'][email protected][/URL]
[URL='https://www.sourcecodester.com/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]oretnom23 -- music_gallery_site
[/TD]
[TD]A vulnerability classified as critical was found in SourceCodester Music Gallery Site 1.0. This vulnerability affects unknown code of the file /classes/Master.php?f=delete_category. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8223&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8223']CVE-2024-8223[/URL]
[URL='https://github.com/LiuHaoBin6/cve/blob/main/sql4.md'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.275932'][email protected][/URL]
[URL='https://vuldb.com/?id.275932'][email protected][/URL]
[URL='https://vuldb.com/?submit.398722'][email protected][/URL]
[URL='https://www.sourcecodester.com/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]OTRS AG--OTRS
[/TD]
[TD]Passwords of agents and customers are displayed in plain text in the OTRS admin log module if certain configurations regarding the authentication sources match and debugging for the authentication backend has been enabled. This issue affects: * OTRS from 7.0.X through 7.0.50 * OTRS 8.0.X * OTRS 2023.X * OTRS from 2024.X through 2024.5.X * ((OTRS)) Community Edition: 6.0.x Products based on the ((OTRS)) Community Edition also very likely to be affected[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43444&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N']8.2[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43444']CVE-2024-43444[/URL]
[URL='https://otrs.com/release-notes/otrs-security-advisory-2024-12/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Philip Hazel--xfpt
[/TD]
[TD]xfpt versions prior to 1.01 fails to handle appropriately some parameters inside the input data, resulting in a stack-based buffer overflow vulnerability. When a user of the affected product is tricked to process a specially crafted file, arbitrary code may be executed on the user's environment.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43700&vector=CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H']7[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43700']CVE-2024-43700[/URL]
[URL='https://github.com/PhilipHazel/xfpt'][email protected][/URL]
[URL='https://github.com/PhilipHazel/xfpt/commit/a690304bbd3fd19e9dfdad50dcc87ad829f744e4'][email protected][/URL]
[URL='https://jvn.jp/en/vu/JVNVU96498690/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]PHPOffice--PhpSpreadsheet
[/TD]
[TD]PHPSpreadsheet is a pure PHP library for reading and writing spreadsheet files. Affected versions are subject to a bypassing of a filter which allows for an XXE-attack. This in turn allows attacker to obtain contents of local files, even if error reporting is muted. This vulnerability has been addressed in release version 2.2.1. All users are advised to upgrade. There are no known workarounds for this vulnerability.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-45048&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H']8.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-45048']CVE-2024-45048[/URL]
[URL='https://github.com/PHPOffice/PhpSpreadsheet/commit/bea2d4b30f24bcc8a7712e208d1359e603b45dda'][email protected][/URL]
[URL='https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-ghg6-32f9-2jp7'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]PriceListo--Best Restaurant Menu by PriceListo
[/TD]
[TD]Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in PriceListo Best Restaurant Menu by PriceListo allows SQL Injection.This issue affects Best Restaurant Menu by PriceListo: from n/a through 1.4.1.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-38793&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L']8.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-38793']CVE-2024-38793[/URL]
[URL='https://patchstack.com/database/vulnerability/best-restaurant-menu-by-pricelisto/wordpress-best-restaurant-menu-by-pricelisto-plugin-1-4-1-sql-injection-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Progress Software Corporation--WhatsUp Gold
[/TD]
[TD]In WhatsUp Gold versions released before 2024.0.0, a SQL Injection vulnerability allows an unauthenticated attacker to retrieve the users encrypted password.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-6670&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-6670']CVE-2024-6670[/URL]
[URL='https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-August-2024'][email protected][/URL]
[URL='https://www.progress.com/network-monitoring'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Progress Software Corporation--WhatsUp Gold
[/TD]
[TD]In WhatsUp Gold versions released before 2024.0.0, if the application is configured with only a single user, a SQL Injection vulnerability allows an unauthenticated attacker to retrieve the users encrypted password.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-6671&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-6671']CVE-2024-6671[/URL]
[URL='https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-August-2024'][email protected][/URL]
[URL='https://www.progress.com/network-monitoring'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Progress Software Corporation--WhatsUp Gold
[/TD]
[TD]In WhatsUp Gold versions released before 2024.0.0, a SQL Injection vulnerability allows an authenticated low-privileged attacker to achieve privilege escalation by modifying a privileged user's password.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-6672&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']8.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-6672']CVE-2024-6672[/URL]
[URL='https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-August-2024'][email protected][/URL]
[URL='https://www.progress.com/network-monitoring'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Propovoice--Propovoice Pro
[/TD]
[TD]Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Propovoice Propovoice Pro allows SQL Injection.This issue affects Propovoice Pro: from n/a through 1.7.0.3.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43941&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L']9.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43941']CVE-2024-43941[/URL]
[URL='https://patchstack.com/database/vulnerability/propovoice-pro/wordpress-propovoice-pro-plugin-1-7-0-3-unauthenticated-sql-injection-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Red Hat--streams for Apache Kafka
[/TD]
[TD]A flaw was found in Kroxylicious. When establishing the connection with the upstream Kafka server using a TLS secured connection, Kroxylicious fails to properly verify the server's hostname, resulting in an insecure connection. For a successful attack to be performed, the attacker needs to perform a Man-in-the-Middle attack or compromise any external systems, such as DNS or network routing configuration. This issue is considered a high complexity attack, with additional high privileges required, as the attack would need access to the Kroxylicious configuration or a peer system. The result of a successful attack impacts both data integrity and confidentiality.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8285&vector=CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N']7.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8285']CVE-2024-8285[/URL]
[URL='https://access.redhat.com/security/cve/CVE-2024-8285'][email protected][/URL]
[URL='https://bugzilla.redhat.com/show_bug.cgi?id=2308606'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]rems -- zipped_folder_manager_app
[/TD]
[TD]A vulnerability classified as problematic has been found in SourceCodester Zipped Folder Manager App 1.0. This affects an unknown part of the file /endpoint/add-folder.php. The manipulation of the argument folder leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8170&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8170']CVE-2024-8170[/URL]
[URL='https://github.com/jadu101/CVE/blob/main/SourceCodester_Zipped_Folder_Manager_App_File_Upload.md'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.275769'][email protected][/URL]
[URL='https://vuldb.com/?id.275769'][email protected][/URL]
[URL='https://vuldb.com/?submit.397719'][email protected][/URL]
[URL='https://www.sourcecodester.com/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Rockwell Automation--ThinManager ThinServer
[/TD]
[TD]A remote code execution vulnerability exists in the Rockwell Automation ThinManager® ThinServer™ that allows a threat actor to execute arbitrary code with System privileges. This vulnerability exists due to the lack of proper data input validation, which allows files to be overwritten.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-7988&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-7988']CVE-2024-7988[/URL]
[URL='https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1692.html'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Roundup WP--Registrations for the Events Calendar
[/TD]
[TD]Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Roundup WP Registrations for the Events Calendar allows SQL Injection.This issue affects Registrations for the Events Calendar: from n/a through 2.12.2.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-39638&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L']8.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-39638']CVE-2024-39638[/URL]
[URL='https://patchstack.com/database/vulnerability/registrations-for-the-events-calendar/wordpress-registrations-for-the-events-calendar-plugin-2-12-2-sql-injection-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]roxy-wi--roxy-wi
[/TD]
[TD]Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. An OS Command Injection vulnerability allows any authenticated user on the application to execute arbitrary code on the web application server via port scanning functionality. User-supplied input is used without validation when constructing and executing an OS command. User supplied JSON POST data is parsed and if "id" JSON key does not exist, JSON value supplied via "ip" JSON key is assigned to the "ip" variable. Later on, "ip" variable which can be controlled by the attacker is used when constructing the cmd and cmd1 strings without any extra validation. Then, server_mod.subprocess_execute function is called on both cmd1 and cmd2. When the definition of the server_mod.subprocess_execute() function is analyzed, it can be seen that subprocess.Popen() is called on the input parameter with shell=True which results in OS Command Injection. This issue has not yet been patched. Users are advised to contact the Roxy-WI to coordinate a fix.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43804&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']8.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43804']CVE-2024-43804[/URL]
[URL='https://github.com/roxy-wi/roxy-wi/security/advisories/GHSA-qc52-vwwj-5585'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]rubrik -- cloud_data_management
[/TD]
[TD]An incorrect access control vulnerability in Rubrik CDM versions prior to 9.1.2-p1, 9.0.3-p6 and 8.1.3-p12, allows an attacker with network access to execute arbitrary code.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-36068&vector=CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']8.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-36068']CVE-2024-36068[/URL]
[URL='https://www.rubrik.com/advisories/rbk-20240619-v0044'][email protected][/URL]
[URL='https://www.rubrik.com/products/cloud-data-management'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Salon Booking System--Salon booking system
[/TD]
[TD]Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Salon Booking System Salon booking system allows SQL Injection.This issue affects Salon booking system: from n/a through 10.7.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-39658&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L']7.6[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-39658']CVE-2024-39658[/URL]
[URL='https://patchstack.com/database/vulnerability/salon-booking-system/wordpress-salon-booking-system-plugin-10-7-authenticated-sql-injection-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]shafayat-alam--Attire
[/TD]
[TD]The Attire theme for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.0.6 via deserialization of untrusted input. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.[/TD]
[TD]2024-08-31[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-7435&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']8.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-7435']CVE-2024-7435[/URL]
[URL='https://themes.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=240321%40attire%2F2.0.7&old=231937%40attire%2F2.0.6'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/f21cbe18-77e1-4a9a-96a0-74edaef0db3e?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]skyss -- arfa-cms
[/TD]
[TD]A cross-site request forgery (CSRF) vulnerability in the admin panel in SkySystem Arfa-CMS before 5.1.3124 allows remote attackers to add a new administrator, leading to escalation of privileges.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-45264&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H']8.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-45264']CVE-2024-45264[/URL]
[URL='https://github.com/TheHermione/CVE-2024-45264'][email protected][/URL]
[URL='https://skyss.ru'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Smackcoders--SendGrid for WordPress
[/TD]
[TD]Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Smackcoders SendGrid for WordPress allows SQL Injection.This issue affects SendGrid for WordPress: from n/a through 1.4.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43965&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:L']8.2[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43965']CVE-2024-43965[/URL]
[URL='https://patchstack.com/database/vulnerability/wp-sendgrid-mailer/wordpress-sendgrid-for-wordpress-plugin-1-4-sql-injection-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]sonaar--MP3 Audio Player Music Player, Podcast Player & Radio by Sonaar
[/TD]
[TD]The MP3 Audio Player - Music Player, Podcast Player & Radio by Sonaar plugin for WordPress is vulnerable to unauthorized arbitrary file deletion due to a missing capability check on the removeTempFiles() function and insufficient path validation on the 'file' parameter in all versions up to, and including, 5.7.0.1. This makes it possible for authenticated attackers, with subscriber-level access and above, to delete arbitrary files which can make remote code execution possible when wp-config.php is deleted.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-7856&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H']9.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-7856']CVE-2024-7856[/URL]
[URL='https://plugins.trac.wordpress.org/browser/mp3-music-player-by-sonaar/tags/5.7.0.1/includes/class-sonaar-music.php#L739'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/browser/mp3-music-player-by-sonaar/tags/5.7.0.1/includes/class-sonaar-music.php#L755'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/changeset/3142445/mp3-music-player-by-sonaar/trunk/includes/class-sonaar-music.php'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/43adc9dd-1780-440f-90c2-ff05a22eb084?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]SourceCodester--Electric Billing Management System
[/TD]
[TD]A vulnerability classified as critical has been found in SourceCodester Electric Billing Management System 1.0. This affects an unknown part of the file /Actions.php?a=login. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8340&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L']7.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8340']CVE-2024-8340[/URL]
[URL='https://github.com/enjoyworld/webray.com.cn/blob/main/cves/Electric%20Billing%20Management%20System/Electric%20Billing%20Managemen%20SQL-inject%20System%20Action.php%20SQL-inject.md'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.276219'][email protected][/URL]
[URL='https://vuldb.com/?id.276219'][email protected][/URL]
[URL='https://vuldb.com/?submit.399548'][email protected][/URL]
[URL='https://www.sourcecodester.com/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]SourceCodester--Sentiment Based Movie Rating System
[/TD]
[TD]A vulnerability, which was classified as critical, was found in SourceCodester Sentiment Based Movie Rating System 1.0. Affected is an unknown function of the file /classes/Users.php?f=save_client of the component User Registration Handler. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8343&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L']7.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8343']CVE-2024-8343[/URL]
[URL='https://github.com/gurudattch/CVEs/blob/main/Sourcecodester-SQLi-Sentiment-Based-Moive-Rating.md'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.276222'][email protected][/URL]
[URL='https://vuldb.com/?id.276222'][email protected][/URL]
[URL='https://vuldb.com/?submit.399711'][email protected][/URL]
[URL='https://www.sourcecodester.com/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]sportsnet -- sportsnet
[/TD]
[TD]SQL injection vulnerabilities in SportsNET affecting version 4.0.1. These vulnerabilities could allow an attacker to retrieve, update and delete all information in the database by sending a specially crafted SQL query: https://XXXXXXX.saludydesafio.com/conexiones/ax/openTracExt/, parameter categoria;.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-29723&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-29723']CVE-2024-29723[/URL]
[URL='https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sportsnet'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]sportsnet -- sportsnet
[/TD]
[TD]SQL injection vulnerabilities in SportsNET affecting version 4.0.1. These vulnerabilities could allow an attacker to retrieve, update and delete all information in the database by sending a specially crafted SQL query: https://XXXXXXX.saludydesafio.com/ax/registerSp/, parameter idDesafio.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-29724&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-29724']CVE-2024-29724[/URL]
[URL='https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sportsnet'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]sportsnet -- sportsnet
[/TD]
[TD]SQL injection vulnerabilities in SportsNET affecting version 4.0.1. These vulnerabilities could allow an attacker to retrieve, update and delete all information in the database by sending a specially crafted SQL query: https://XXXXXXX.saludydesafio.com/app/ax/sort_bloques/, parameter list.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-29725&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-29725']CVE-2024-29725[/URL]
[URL='https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sportsnet'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]sportsnet -- sportsnet
[/TD]
[TD]SQL injection vulnerabilities in SportsNET affecting version 4.0.1. These vulnerabilities could allow an attacker to retrieve, update and delete all information in the database by sending a specially crafted SQL query: https://XXXXXXX.saludydesafio.com/app/ax/setAsRead/, parameter id.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-29726&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-29726']CVE-2024-29726[/URL]
[URL='https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sportsnet'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]sportsnet -- sportsnet
[/TD]
[TD]SQL injection vulnerabilities in SportsNET affecting version 4.0.1. These vulnerabilities could allow an attacker to retrieve, update and delete all information in the database by sending a specially crafted SQL query: https://XXXXXXX.saludydesafio.com/app/ax/sendParticipationRemember/ , parameter send.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-29727&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-29727']CVE-2024-29727[/URL]
[URL='https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sportsnet'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]sportsnet -- sportsnet
[/TD]
[TD]SQL injection vulnerabilities in SportsNET affecting version 4.0.1. These vulnerabilities could allow an attacker to retrieve, update and delete all information in the database by sending a specially crafted SQL query: https://XXXXXXX.saludydesafio.com/app/ax/inscribeUsuario/ , parameter idDesafio.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-29728&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-29728']CVE-2024-29728[/URL]
[URL='https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sportsnet'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]sportsnet -- sportsnet
[/TD]
[TD]SQL injection vulnerabilities in SportsNET affecting version 4.0.1. These vulnerabilities could allow an attacker to retrieve, update and delete all information in the database by sending a specially crafted SQL query: https://XXXXXXX.saludydesafio.com/app/ax/generateShortURL/, parameter url.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-29729&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-29729']CVE-2024-29729[/URL]
[URL='https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sportsnet'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]sportsnet -- sportsnet
[/TD]
[TD]SQL injection vulnerabilities in SportsNET affecting version 4.0.1. These vulnerabilities could allow an attacker to retrieve, update and delete all information in the database by sending a specially crafted SQL query:Â https://XXXXXXX.saludydesafio.com/app/ax/consejoRandom/ , parameter idCat;.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-29730&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-29730']CVE-2024-29730[/URL]
[URL='https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sportsnet'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]sportsnet -- sportsnet
[/TD]
[TD]SQL injection vulnerabilities in SportsNET affecting version 4.0.1. These vulnerabilities could allow an attacker to retrieve, update and delete all information in the database by sending a specially crafted SQL query:Â https://XXXXXXX.saludydesafio.com/app/ax/checkBlindFields/ , parameters idChallenge and idEmpresa.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-29731&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-29731']CVE-2024-29731[/URL]
[URL='https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sportsnet'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Stark Digital--WP Testimonial Widget
[/TD]
[TD]Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Stark Digital WP Testimonial Widget.This issue affects WP Testimonial Widget: from n/a through 3.1.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43966&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L']7.6[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43966']CVE-2024-43966[/URL]
[URL='https://patchstack.com/database/vulnerability/wp-testimonial-widget/wordpress-wp-testimonial-widget-plugin-3-1-sql-injection-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Stormhill Media--MyBookTable Bookstore
[/TD]
[TD]Cross-Site Request Forgery (CSRF) vulnerability in Stormhill Media MyBookTable Bookstore allows Cross-Site Scripting (XSS).This issue affects MyBookTable Bookstore: from n/a through 3.3.9.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43255&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L']7.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43255']CVE-2024-43255[/URL]
[URL='https://patchstack.com/database/vulnerability/mybooktable/wordpress-mybooktable-bookstore-by-stormhill-media-plugin-3-3-9-csrf-to-xss-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]StylemixThemes--Cost Calculator Builder
[/TD]
[TD]Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in StylemixThemes Cost Calculator Builder allows SQL Injection.This issue affects Cost Calculator Builder: from n/a through 3.2.15.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43144&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L']9.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43144']CVE-2024-43144[/URL]
[URL='https://patchstack.com/database/vulnerability/cost-calculator-builder/wordpress-cost-calculator-builder-plugin-3-2-15-sql-injection-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]sunmochina -- enterprise_management_system
[/TD]
[TD]Incorrect access control in the component /servlet/SnoopServlet of Shenzhou News Union Enterprise Management System v5.0 through v18.8 allows attackers to access sensitive information regarding the server.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-44760&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N']7.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44760']CVE-2024-44760[/URL]
[URL='https://github.com/WarmBrew/web_vul/blob/main/SunmoEMS/SunmoEMS-info.md'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]TemplateInvaders--TI WooCommerce Wishlist
[/TD]
[TD]Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in TemplateInvaders TI WooCommerce Wishlist allows SQL Injection.This issue affects TI WooCommerce Wishlist: from n/a through 2.8.2.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43917&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L']9.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43917']CVE-2024-43917[/URL]
[URL='https://patchstack.com/database/vulnerability/ti-woocommerce-wishlist/wordpress-ti-woocommerce-wishlist-plugin-2-8-2-sql-injection-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]tenda -- ax1806_firmware
[/TD]
[TD]Tenda AX1806 v1.0.0.1 contains a stack overflow via the iptv.stb.port parameter in the function formGetIptv.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-44549&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44549']CVE-2024-44549[/URL]
[URL='https://detailed-stetson-767.notion.site/Tenda-AX1806-Buffer-Overflow-in-formGetIptv-74cd0418924247729bae905996ae8902?pvs=4'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]tenda -- ax1806_firmware
[/TD]
[TD]Tenda AX1806 v1.0.0.1 contains a stack overflow via the adv.iptv.stbpvid parameter in the function formGetIptv.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-44550&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44550']CVE-2024-44550[/URL]
[URL='https://detailed-stetson-767.notion.site/Tenda-AX1806-Buffer-Overflow-in-formGetIptv-74cd0418924247729bae905996ae8902?pvs=4'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]tenda -- ax1806_firmware
[/TD]
[TD]Tenda AX1806 v1.0.0.1 contains a stack overflow via the iptv.city.vlan parameter in the function formGetIptv.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-44551&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44551']CVE-2024-44551[/URL]
[URL='https://detailed-stetson-767.notion.site/Tenda-AX1806-Buffer-Overflow-in-formGetIptv-74cd0418924247729bae905996ae8902?pvs=4'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]tenda -- ax1806_firmware
[/TD]
[TD]Tenda AX1806 v1.0.0.1 contains a stack overflow via the adv.iptv.stballvlans parameter in the function formGetIptv.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-44552&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44552']CVE-2024-44552[/URL]
[URL='https://detailed-stetson-767.notion.site/Tenda-AX1806-Buffer-Overflow-in-formGetIptv-74cd0418924247729bae905996ae8902?pvs=4'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]tenda -- ax1806_firmware
[/TD]
[TD]Tenda AX1806 v1.0.0.1 contains a stack overflow via the iptv.stb.mode parameter in the function formGetIptv.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-44553&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44553']CVE-2024-44553[/URL]
[URL='https://detailed-stetson-767.notion.site/Tenda-AX1806-Buffer-Overflow-in-formGetIptv-74cd0418924247729bae905996ae8902?pvs=4'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]tenda -- ax1806_firmware
[/TD]
[TD]Tenda AX1806 v1.0.0.1 contains a stack overflow via the iptv.city.vlan parameter in the function setIptvInfo.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-44555&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44555']CVE-2024-44555[/URL]
[URL='https://detailed-stetson-767.notion.site/Tenda-AX1806-Buffer-Overflow-in-setIptvInfo-5aee8fa8b7754d319ee35027d3628f2e?pvs=4'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]tenda -- ax1806_firmware
[/TD]
[TD]Tenda AX1806 v1.0.0.1 contains a stack overflow via the adv.iptv.stballvlans parameter in the function setIptvInfo.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-44556&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44556']CVE-2024-44556[/URL]
[URL='https://detailed-stetson-767.notion.site/Tenda-AX1806-Buffer-Overflow-in-setIptvInfo-5aee8fa8b7754d319ee35027d3628f2e?pvs=4'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]tenda -- ax1806_firmware
[/TD]
[TD]Tenda AX1806 v1.0.0.1 contains a stack overflow via the iptv.stb.mode parameter in the function setIptvInfo.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-44557&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44557']CVE-2024-44557[/URL]
[URL='https://detailed-stetson-767.notion.site/Tenda-AX1806-Buffer-Overflow-in-setIptvInfo-5aee8fa8b7754d319ee35027d3628f2e?pvs=4'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]tenda -- ax1806_firmware
[/TD]
[TD]Tenda AX1806 v1.0.0.1 contains a stack overflow via the adv.iptv.stbpvid parameter in the function setIptvInfo.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-44558&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44558']CVE-2024-44558[/URL]
[URL='https://detailed-stetson-767.notion.site/Tenda-AX1806-Buffer-Overflow-in-setIptvInfo-5aee8fa8b7754d319ee35027d3628f2e?pvs=4'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]tenda -- ax1806_firmware
[/TD]
[TD]Tenda AX1806 v1.0.0.1 contains a stack overflow via the iptv.stb.port parameter in the function setIptvInfo.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-44563&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44563']CVE-2024-44563[/URL]
[URL='https://detailed-stetson-767.notion.site/Tenda-AX1806-Buffer-Overflow-in-getIptvInfo-d15d44b770e24213a8dcb13a4812e3f4?pvs=4'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]tenda -- ax1806_firmware
[/TD]
[TD]Tenda AX1806 v1.0.0.1 contains a stack overflow via the serverName parameter in the function form_fast_setting_internet_set.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-44565&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44565']CVE-2024-44565[/URL]
[URL='https://detailed-stetson-767.notion.site/Tenda-AX1806-Buffer-Overflow-in-form_fast_setting_internet_set-fe072267132d42be935ea4d7a53f7369?pvs=4'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]tenda -- g3_firmware
[/TD]
[TD]A vulnerability, which was classified as critical, has been found in Tenda G3 15.11.0.20. This issue affects the function formSetDebugCfg of the file /goform/setDebugCfg. The manipulation of the argument enable/level/module leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8224&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8224']CVE-2024-8224[/URL]
[URL='https://github.com/abcdefg-png/AHU-IoT-vulnerable/blob/main/Tenda/G3V3.0/formSetDebugCfg.md'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.275933'][email protected][/URL]
[URL='https://vuldb.com/?id.275933'][email protected][/URL]
[URL='https://vuldb.com/?submit.393999'][email protected][/URL]
[URL='https://www.tenda.com.cn/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]tenda -- g3_firmware
[/TD]
[TD]A vulnerability, which was classified as critical, was found in Tenda G3 15.11.0.20. Affected is the function formSetSysTime of the file /goform/SetSysTimeCfg. The manipulation of the argument sysTimePolicy leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8225&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8225']CVE-2024-8225[/URL]
[URL='https://github.com/abcdefg-png/AHU-IoT-vulnerable/blob/main/Tenda/G3V3.0/formSetSysTime.md'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.275934'][email protected][/URL]
[URL='https://vuldb.com/?id.275934'][email protected][/URL]
[URL='https://vuldb.com/?submit.394000'][email protected][/URL]
[URL='https://www.tenda.com.cn/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]tenda -- o1_firmware
[/TD]
[TD]A vulnerability has been found in Tenda O1 1.0.0.7(10648) and classified as critical. Affected by this vulnerability is the function formSetCfm of the file /goform/setcfm. The manipulation of the argument funcpara1 leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8226&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8226']CVE-2024-8226[/URL]
[URL='https://github.com/abcdefg-png/AHU-IoT-vulnerable/blob/main/Tenda/web-bridge/O1V1.1/formSetCfm.md'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.275935'][email protected][/URL]
[URL='https://vuldb.com/?id.275935'][email protected][/URL]
[URL='https://vuldb.com/?submit.394009'][email protected][/URL]
[URL='https://www.tenda.com.cn/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]tenda -- o1_firmware
[/TD]
[TD]A vulnerability was found in Tenda O1 1.0.0.7(10648) and classified as critical. Affected by this issue is the function fromDhcpSetSer of the file /goform/DhcpSetSer. The manipulation of the argument dhcpStartIp/dhcpEndIp/dhcpGw/dhcpMask/dhcpLeaseTime/dhcpDns1/dhcpDns2 leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8227&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8227']CVE-2024-8227[/URL]
[URL='https://github.com/abcdefg-png/AHU-IoT-vulnerable/blob/main/Tenda/web-bridge/O1V1.1/fromDhcpSetSer.md'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.275936'][email protected][/URL]
[URL='https://vuldb.com/?id.275936'][email protected][/URL]
[URL='https://vuldb.com/?submit.394022'][email protected][/URL]
[URL='https://www.tenda.com.cn/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]tenda -- o5_firmware
[/TD]
[TD]A vulnerability was found in Tenda O5 1.0.0.8(5017). It has been classified as critical. This affects the function fromSafeSetMacFilter of the file /goform/setMacFilterList. The manipulation of the argument remark/type/time leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8228&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8228']CVE-2024-8228[/URL]
[URL='https://github.com/abcdefg-png/AHU-IoT-vulnerable/blob/main/Tenda/web-bridge/O5V1.0/fromSafeSetMacFilter.md'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.275937'][email protected][/URL]
[URL='https://vuldb.com/?id.275937'][email protected][/URL]
[URL='https://vuldb.com/?submit.394029'][email protected][/URL]
[URL='https://www.tenda.com.cn/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]tenda -- o6_firmware
[/TD]
[TD]A vulnerability was found in Tenda O6 1.0.0.7(2054). It has been declared as critical. This vulnerability affects the function frommacFilterModify of the file /goform/operateMacFilter. The manipulation of the argument mac leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8229&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8229']CVE-2024-8229[/URL]
[URL='https://github.com/abcdefg-png/AHU-IoT-vulnerable/blob/main/Tenda/web-bridge/O6V3.0/fromMacFilterModify.md'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.275938'][email protected][/URL]
[URL='https://vuldb.com/?id.275938'][email protected][/URL]
[URL='https://vuldb.com/?submit.394030'][email protected][/URL]
[URL='https://www.tenda.com.cn/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]tenda -- o6_firmware
[/TD]
[TD]A vulnerability was found in Tenda O6 1.0.0.7(2054). It has been rated as critical. This issue affects the function fromSafeSetMacFilter of the file /goform/setMacFilterList. The manipulation of the argument remark/type/time leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8230&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8230']CVE-2024-8230[/URL]
[URL='https://github.com/abcdefg-png/AHU-IoT-vulnerable/blob/main/Tenda/web-bridge/O6V3.0/fromSafeSetMacFilter.md'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.275939'][email protected][/URL]
[URL='https://vuldb.com/?id.275939'][email protected][/URL]
[URL='https://vuldb.com/?submit.394031'][email protected][/URL]
[URL='https://www.tenda.com.cn/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Tenda--O6
[/TD]
[TD]A vulnerability classified as critical has been found in Tenda O6 1.0.0.7(2054). Affected is the function fromVirtualSet of the file /goform/setPortForward. The manipulation of the argument ip/localPort/publicPort/app leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8231&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']8.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8231']CVE-2024-8231[/URL]
[URL='https://github.com/abcdefg-png/AHU-IoT-vulnerable/blob/main/Tenda/web-bridge/O6V3.0/fromVirtualSet.md'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.275940'][email protected][/URL]
[URL='https://vuldb.com/?id.275940'][email protected][/URL]
[URL='https://vuldb.com/?submit.394032'][email protected][/URL]
[URL='https://www.tenda.com.cn/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]The Beaver Builder Team--Beaver Builder
[/TD]
[TD]Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in The Beaver Builder Team Beaver Builder allows Reflected XSS.This issue affects Beaver Builder: from n/a through 2.8.3.2.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43926&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L']7.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43926']CVE-2024-43926[/URL]
[URL='https://patchstack.com/database/vulnerability/beaver-builder-lite-version/wordpress-beaver-builder-plugin-2-8-3-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]theeventscalendar--The Events Calendar Pro
[/TD]
[TD]The Events Calendar Pro plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 7.0.2 via deserialization of untrusted input from the 'filters' parameter in widgets. This makes it possible for authenticated attackers, with administrator-level access and above, to inject a PHP Object. The additional presence of a POP chain allows attackers to execute code remotely. In certain configurations, this can be exploitable by lower level users. We confirmed that this plugin installed with Elementor makes it possible for users with contributor-level access and above to exploit this issue.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8016&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H']9.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8016']CVE-2024-8016[/URL]
[URL='https://theeventscalendar.com/blog/news/important-security-update-for-the-events-calendar-pro/'][email protected][/URL]
[URL='https://theeventscalendar.com/release-notes/events-calendar-pro/events-calendar-pro-7-0-2-1/'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/34f0e5a6-0bd3-4734-b7e0-27dc825d193f?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]themeum -- droip
[/TD]
[TD]Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Themeum Droip allows File Manipulation.This issue affects Droip: from n/a through 1.1.1.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43955&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H']7.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43955']CVE-2024-43955[/URL]
[URL='https://patchstack.com/database/vulnerability/droip/wordpress-droip-plugin-1-1-1-unauthenticated-arbitrary-file-download-deletion-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]themium--Tutor LMS Pro
[/TD]
[TD]The Tutor LMS Pro plugin for WordPress is vulnerable to unauthorized administrative actions execution due to a missing capability checks on multiple functions like treport_quiz_atttempt_delete and tutor_gc_class_action in all versions up to, and including, 2.7.2. This makes it possible for authenticated attackers, with the subscriber-level access and above, to preform an administrative actions on the site, like comments, posts or users deletion, viewing notifications, etc.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-5784&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N']7.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-5784']CVE-2024-5784[/URL]
[URL='https://tutorlms.com/releases/id/299/'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/aa5c23ed-7239-40e1-a795-1ae8d4c2d6c8?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]thimpress--WP Events Manager
[/TD]
[TD]The WP Events Manager plugin for WordPress is vulnerable to time-based SQL Injection via the 'order' parameter in all versions up to, and including, 2.1.11 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.[/TD]
[TD]2024-08-31[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-7717&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']8.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-7717']CVE-2024-7717[/URL]
[URL='https://plugins.trac.wordpress.org/browser/wp-events-manager/tags/2.2.0/inc/class-wpems-post-types.php?rev=3144021'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/browser/wp-events-manager/trunk/inc/class-wpems-post-types.php#L461'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/88dc08ff-3966-4606-855c-57c25552599e?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]totolink -- a3002r_firmware
[/TD]
[TD]TOTOLINK AC1200 Wireless Router A3002R Firmware V1.1.1-B20200824 is vulnerable to Buffer Overflow. In the boa server program's CGI handling function formWlEncrypt, there is a lack of length restriction on the wlan_ssid field. This oversight leads to potential buffer overflow under specific circumstances. For instance, by invoking the formWlanRedirect function with specific parameters to alter wlan_idx's value and subsequently invoking the formWlEncrypt function, an attacker can trigger buffer overflow, enabling arbitrary command execution or denial of service attacks.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-34195&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-34195']CVE-2024-34195[/URL]
[URL='https://gist.github.com/Swind1er/84161b607d06d060fba5adcdd92bceb4'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]totolink -- t10_firmware
[/TD]
[TD]A vulnerability classified as critical has been found in TOTOLINK T10 AC1200 4.1.8cu.5207. Affected is an unknown function of the file /squashfs-root/web_cste/cgi-bin/product.ini of the component Telnet Service. The manipulation leads to hard-coded credentials. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8162&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8162']CVE-2024-8162[/URL]
[URL='https://github.com/rohitburke/TOTOLINK'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.275760'][email protected][/URL]
[URL='https://vuldb.com/?id.275760'][email protected][/URL]
[URL='https://vuldb.com/?submit.392015'][email protected][/URL]
[URL='https://www.totolink.net/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Unknown--Web Directory Free
[/TD]
[TD]The Web Directory Free WordPress plugin before 1.7.3 does not validate a parameter before using it in an include(), which could lead to Local File Inclusion issues.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-3673&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H']9.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-3673']CVE-2024-3673[/URL]
[URL='https://wpscan.com/vulnerability/0e8930cb-e176-4406-a43f-a6032471debf/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]WBW--WBW Product Table PRO
[/TD]
[TD]Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WBW WBW Product Table PRO allows SQL Injection.This issue affects WBW Product Table PRO: from n/a through 1.9.4.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43918&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H']10[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43918']CVE-2024-43918[/URL]
[URL='https://patchstack.com/database/vulnerability/woo-producttables-pro/wordpress-wbw-product-table-pro-plugin-1-9-4-unauthenticated-arbitrary-sql-query-execution-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]weDevs--WP User Frontend
[/TD]
[TD]Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in weDevs WP User Frontend allows SQL Injection.This issue affects WP User Frontend: from n/a through 4.0.7.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-38693&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L']7.6[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-38693']CVE-2024-38693[/URL]
[URL='https://patchstack.com/database/vulnerability/wp-user-frontend/wordpress-wp-user-frontend-plugin-4-0-7-sql-injection-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Wpsoul--Greenshift Query and Meta Addon
[/TD]
[TD]Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Wpsoul Greenshift Query and Meta Addon allows SQL Injection.This issue affects Greenshift Query and Meta Addon: from n/a before 3.9.2.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43942&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L']8.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43942']CVE-2024-43942[/URL]
[URL='https://patchstack.com/database/vulnerability/greenshiftquery/wordpress-greenshift-query-and-meta-addon-plugin-3-9-2-subscriber-sql-injection-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Wpsoul--Greenshift Woocommerce Addon
[/TD]
[TD]Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Wpsoul Greenshift Woocommerce Addon allows SQL Injection.This issue affects Greenshift Woocommerce Addon: from n/a before 1.9.8.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43943&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L']8.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43943']CVE-2024-43943[/URL]
[URL='https://patchstack.com/database/vulnerability/greenshiftwoo/wordpress-greenshift-woocommerce-addon-plugin-1-9-8-subscriber-sql-injection-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]WPWeb Elite--Docket (WooCommerce Collections / Wishlist / Watchlist)
[/TD]
[TD]Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WPWeb Elite Docket (WooCommerce Collections / Wishlist / Watchlist) allows SQL Injection.This issue affects Docket (WooCommerce Collections / Wishlist / Watchlist): from n/a before 1.7.0.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43132&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L']9.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43132']CVE-2024-43132[/URL]
[URL='https://patchstack.com/database/vulnerability/woocommerce-collections/wordpress-docket-woocommerce-collections-wishlist-watchlist-plugin-1-6-6-unauthenticated-sql-injection-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Xiaomi--App Market
[/TD]
[TD]A code execution vulnerability exists in the Xiaomi App market product. The vulnerability is caused by unsafe configuration and can be exploited by attackers to execute arbitrary code.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-26323&vector=CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:L']7.6[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-26323']CVE-2023-26323[/URL]
[URL='https://trust.mi.com/misrc/bulletins/advisory?cveId=543'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Xiaomi--GetApps application
[/TD]
[TD]A code execution vulnerability exists in the XiaomiGetApps application product. This vulnerability is caused by the verification logic being bypassed, and an attacker can exploit this vulnerability to execute malicious code.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-26322&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H']8.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-26322']CVE-2023-26322[/URL]
[URL='https://trust.mi.com/misrc/bulletins/advisory?cveId=542'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Xiaomi--GetApps application
[/TD]
[TD]A code execution vulnerability exists in the XiaomiGetApps application product. This vulnerability is caused by the verification logic being bypassed, and an attacker can exploit this vulnerability to execute malicious code.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-26324&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H']8.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-26324']CVE-2023-26324[/URL]
[URL='https://https://trust.mi.com/misrc/bulletins/advisory?cveId=544'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Xiaomi--GetApps application
[/TD]
[TD]A code execution vulnerability exists in the XiaomiGetApps application product. This vulnerability is caused by the verification logic being bypassed, and an attacker can exploit this vulnerability to execute malicious code.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-45346&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H']8.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-45346']CVE-2024-45346[/URL]
[URL='https://trust.mi.com/misrc/bulletins/advisory?cveId=545'][email protected][/URL]
[/TD]
[/TR]
[/TABLE][/CENTER]

[URL='https://www.cisa.gov/uscert/ncas/#top']Back to top[/URL]

[HEADING=1]Medium Vulnerabilities[/HEADING]
[CENTER][TABLE]
[TR]
[TH]Primary
Vendor -- Product[/TH]
[TH]Description[/TH]
[TH]Published[/TH]
[TH]CVSS Score[/TH]
[TH]Source & Patch Info[/TH]
[/TR]
[TR]
[TD]10up--Simple Local Avatars
[/TD]
[TD]Cross-Site Request Forgery (CSRF) vulnerability in 10up Simple Local Avatars.This issue affects Simple Local Avatars: from n/a through 2.7.10.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43116&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N']4.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43116']CVE-2024-43116[/URL]
[URL='https://patchstack.com/database/vulnerability/simple-local-avatars/wordpress-simple-local-avatars-plugin-2-7-10-cross-site-request-forgery-csrf-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]advancedformintegration -- advanced_form_integration
[/TD]
[TD]Cross-Site Request Forgery (CSRF) vulnerability in Nasirahmed Advanced Form Integration.This issue affects Advanced Form Integration: from n/a through 1.89.4.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43340&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N']4.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43340']CVE-2024-43340[/URL]
[URL='https://patchstack.com/database/vulnerability/advanced-form-integration/wordpress-afi-the-easiest-integration-plugin-plugin-1-89-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Analytify--Analytify
[/TD]
[TD]Cross-Site Request Forgery (CSRF) vulnerability in Analytify.This issue affects Analytify: from n/a through 5.3.1.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43265&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N']4.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43265']CVE-2024-43265[/URL]
[URL='https://patchstack.com/database/vulnerability/wp-analytify/wordpress-analytify-plugin-5-3-1-csrf-leading-to-optout-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]apache -- portable_runtime
[/TD]
[TD]Lax permissions set by the Apache Portable Runtime library on Unix platforms would allow local users read access to named shared memory segments, potentially revealing sensitive application data. This issue does not affect non-Unix platforms, or builds with APR_USE_SHMEM_SHMGET=1 (apr.h) Users are recommended to upgrade to APR version 1.7.5, which fixes this issue.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-49582&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N']5.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-49582']CVE-2023-49582[/URL]
[URL='https://lists.apache.org/thread/sntjc04t1rvjhdzz2tzmtz2zdnmv7dc4'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Automattic--GHActivity
[/TD]
[TD]Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Automattic GHActivity allows Stored XSS.This issue affects GHActivity: from n/a through 2.0.0-alpha.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43949&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L']6.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43949']CVE-2024-43949[/URL]
[URL='https://patchstack.com/database/vulnerability/ghactivity/wordpress-ghactivity-plugin-2-0-0-alpha-cross-site-scripting-xss-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]averta--Premium Portfolio Features for Phlox theme
[/TD]
[TD]The Premium Portfolio Features for Phlox theme plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'aux_recent_portfolios_grid' shortcode in all versions up to, and including, 2.3.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-1384&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N']6.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-1384']CVE-2024-1384[/URL]
[URL='https://plugins.trac.wordpress.org/browser/auxin-portfolio/trunk/includes/elements/recent-portfolios.php'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/4475cbd4-07cf-499a-a11a-b63eb9184568?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]aws--aws-cdk
[/TD]
[TD]The AWS Cloud Development Kit (CDK) is an open-source framework for defining cloud infrastructure using code. Customers use it to create their own applications which are converted to AWS CloudFormation templates during deployment to a customer's AWS account. CDK contains pre-built components called "constructs" that are higher-level abstractions providing defaults and best practices. This approach enables developers to use familiar programming languages to define complex cloud infrastructure more efficiently than writing raw CloudFormation templates. We identified an issue in AWS Cloud Development Kit (CDK) which, under certain conditions, can result in granting authenticated Amazon Cognito users broader than intended access. Specifically, if a CDK application uses the "RestApi" construct with "CognitoUserPoolAuthorizer" as the authorizer and uses authorization scopes to limit access. This issue does not affect the availability of the specific API resources. Authenticated Cognito users may gain unintended access to protected API resources or methods, leading to potential data disclosure, and modification issues. Impacted versions: >=2.142.0;<=2.148.0. A patch is included in CDK versions >=2.148.1. Users are advised to upgrade their AWS CDK version to 2.148.1 or newer and re-deploy their application(s) to address this issue.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-45037&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N']6.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-45037']CVE-2024-45037[/URL]
[URL='https://docs.aws.amazon.com/cdk/v2/guide/home.html'][email protected][/URL]
[URL='https://github.com/aws/aws-cdk/commit/4bee768f07e73ab5fe466f9ad3d1845456a0513b'][email protected][/URL]
[URL='https://github.com/aws/aws-cdk/releases/tag/v2.148.1'][email protected][/URL]
[URL='https://github.com/aws/aws-cdk/security/advisories/GHSA-qj85-69xf-2vxq'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]azurecurve--azurecurve Toggle Show/Hide
[/TD]
[TD]Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in azurecurve azurecurve Toggle Show/Hide allows Stored XSS.This issue affects azurecurve Toggle Show/Hide: from n/a through 2.1.3.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43961&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L']6.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43961']CVE-2024-43961[/URL]
[URL='https://patchstack.com/database/vulnerability/azurecurve-toggle-showhide/wordpress-azurecurve-toggle-show-hide-plugin-2-1-3-cross-site-scripting-xss-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Beckhoff--IPC Diagnostics package
[/TD]
[TD]The IPC-Diagnostics package included in TwinCAT/BSD is vulnerable to a local denial-of-service attack by a low privileged attacker.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-41175&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H']5.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-41175']CVE-2024-41175[/URL]
[URL='https://cert.vde.com/en/advisories/VDE-2024-049/'][email protected][/URL]
[URL='https://infosys.beckhoff.com/content/1033/twincat_bsd/11780818443.html?id=4222392218353411614'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Beckhoff--MDP package
[/TD]
[TD]The MPD package included in TwinCAT/BSDÂ allows an authenticated, low-privileged local attacker to induce a Denial-of-Service (DoS) condition on the daemon and execute code in the context of user "root" via a crafted HTTP request.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-41176&vector=CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L']6.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-41176']CVE-2024-41176[/URL]
[URL='https://cert.vde.com/en/advisories/VDE-2024-050'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Bit Apps--Bit Form Pro
[/TD]
[TD]Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Bit Apps Bit Form Pro.This issue affects Bit Form Pro: from n/a through 2.6.4.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43251&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N']6.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43251']CVE-2024-43251[/URL]
[URL='https://patchstack.com/database/vulnerability/bitformpro/wordpress-bit-form-pro-plugin-2-6-4-authenticated-sensitive-data-exposure-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]blood_bank_system_project -- blood_bank_system
[/TD]
[TD]A vulnerability has been found in code-projects Blood Bank System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /login.php of the component Login Page. The manipulation of the argument user leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8174&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8174']CVE-2024-8174[/URL]
[URL='https://code-projects.org/'][email protected][/URL]
[URL='https://github.com/prankfulin/cve/blob/main/xss.md'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.275773'][email protected][/URL]
[URL='https://vuldb.com/?id.275773'][email protected][/URL]
[URL='https://vuldb.com/?submit.397883'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]bobbingwide -- oik
[/TD]
[TD]Cross-Site Request Forgery (CSRF) vulnerability in bobbingwide.This issue affects oik: from n/a through 4.12.0.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43356&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N']4.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43356']CVE-2024-43356[/URL]
[URL='https://patchstack.com/database/vulnerability/oik/wordpress-oik-plugin-4-12-0-arbitrary-file-deletion-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]bPlugins LLC--Flash & HTML5 Video
[/TD]
[TD]Exposure of Sensitive Information to an Unauthorized Actor vulnerability in bPlugins LLC Flash & HTML5 Video.This issue affects Flash & HTML5 Video: from n/a through 2.5.31.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43319&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N']4.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43319']CVE-2024-43319[/URL]
[URL='https://patchstack.com/database/vulnerability/html5-video-player/wordpress-html5-video-player-plugin-2-5-31-sensitive-data-exposure-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Brevo--Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue
[/TD]
[TD]Cross-Site Request Forgery (CSRF) vulnerability in Brevo Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue.This issue affects Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue: from n/a through 3.1.82.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43287&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N']4.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43287']CVE-2024-43287[/URL]
[URL='https://patchstack.com/database/vulnerability/mailin/wordpress-brevo-plugin-3-1-82-cross-site-request-forgery-csrf-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]bytecodealliance--rustix
[/TD]
[TD]Rustix is a set of safe Rust bindings to POSIX-ish APIs. When using [ICODE]rustix::fs::Dir[/ICODE] using the [ICODE]linux_raw[/ICODE] backend, it's possible for the iterator to "get stuck" when an IO error is encountered. Combined with a memory over-allocation issue in [ICODE]rustix::fs::Dir::read_more[/ICODE], this can cause quick and unbounded memory explosion (gigabytes in a few seconds if used on a hot path) and eventually lead to an OOM crash of the application. The symptoms were initially discovered in https://github.com/imsnif/bandwhich/issues/284. That post has lots of details of our investigation. Full details can be read on the GHSA-c827-hfw6-qwvm repo advisory. If a program tries to access a directory with its file descriptor after the file has been unlinked (or any other action that leaves the [ICODE]Dir[/ICODE] iterator in the stuck state), and the implementation does not break after seeing an error, it can cause a memory explosion. As an example, Linux's various virtual file systems (e.g. [ICODE]/proc[/ICODE], [ICODE]/sys[/ICODE]) can contain directories that spontaneously pop in and out of existence. Attempting to iterate over them using [ICODE]rustix::fs::Dir[/ICODE] directly or indirectly (e.g. with the [ICODE]procfs[/ICODE] crate) can trigger this fault condition if the implementation decides to continue on errors. An attacker knowledgeable about the implementation details of a vulnerable target can therefore try to trigger this fault condition via any one or a combination of several available APIs. If successful, the application host will quickly run out of memory, after which the application will likely be terminated by an OOM killer, leading to denial of service. This issue has been addressed in release versions 0.35.15, 0.36.16, 0.37.25, and 0.38.19. Users are advised to upgrade. There are no known workarounds for this issue.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43806&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H']6.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43806']CVE-2024-43806[/URL]
[URL='https://github.com/bytecodealliance/rustix/security/advisories/GHSA-c827-hfw6-qwvm'][email protected][/URL]
[URL='https://github.com/imsnif/bandwhich/issues/284'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]calinvingan--Premium SEO Pack WP SEO Plugin
[/TD]
[TD]The Premium SEO Pack - WP SEO Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.6.001. This makes it possible for unauthenticated attackers to view limited information from password protected posts through the social meta data.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-3679&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N']5.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-3679']CVE-2024-3679[/URL]
[URL='https://wordpress.org/plugins/premium-seo-pack/'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/ccb65de5-bfb5-47db-87c9-ad46e65924b8?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Campcodes--Supplier Management System
[/TD]
[TD]A vulnerability has been found in Campcodes Supplier Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/edit_area.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8344&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L']6.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8344']CVE-2024-8344[/URL]
[URL='https://github.com/yooo0oo0/cve_report/blob/main/supplier-management-system/SQLi-2.md'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.276223'][email protected][/URL]
[URL='https://vuldb.com/?id.276223'][email protected][/URL]
[URL='https://vuldb.com/?submit.400185'][email protected][/URL]
[URL='https://www.campcodes.com/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Checkout Plugins--Stripe Payments For WooCommerce by Checkout
[/TD]
[TD]Cross-Site Request Forgery (CSRF) vulnerability in Checkout Plugins Stripe Payments For WooCommerce by Checkout.This issue affects Stripe Payments For WooCommerce by Checkout: from n/a through 1.9.1.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43316&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L']4.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43316']CVE-2024-43316[/URL]
[URL='https://patchstack.com/database/vulnerability/checkout-plugins-stripe-woo/wordpress-stripe-payments-for-woocommerce-plugin-1-9-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Chengdu Everbrite Network Technology--BeikeShop
[/TD]
[TD]A vulnerability, which was classified as critical, has been found in Chengdu Everbrite Network Technology BeikeShop up to 1.5.5. Affected by this issue is the function rename of the file /Admin/Http/Controllers/FileManagerController.php. The manipulation of the argument new_name leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8164&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L']6.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8164']CVE-2024-8164[/URL]
[URL='https://github.com/DeepMountains/zzz/blob/main/CVE4-2.md'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.275762'][email protected][/URL]
[URL='https://vuldb.com/?id.275762'][email protected][/URL]
[URL='https://vuldb.com/?submit.393375'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Chengdu Everbrite Network Technology--BeikeShop
[/TD]
[TD]A vulnerability classified as critical was found in Chengdu Everbrite Network Technology BeikeShop up to 1.5.5. Affected by this vulnerability is the function destroyFiles of the file /admin/file_manager/files. The manipulation of the argument files leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8163&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L']5.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8163']CVE-2024-8163[/URL]
[URL='https://github.com/DeepMountains/zzz/blob/main/CVE4-1.md'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.275761'][email protected][/URL]
[URL='https://vuldb.com/?id.275761'][email protected][/URL]
[URL='https://vuldb.com/?submit.393374'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Chengdu Everbrite Network Technology--BeikeShop
[/TD]
[TD]A vulnerability, which was classified as problematic, was found in Chengdu Everbrite Network Technology BeikeShop up to 1.5.5. This affects the function exportZip of the file /admin/file_manager/export. The manipulation of the argument path leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8165&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N']4.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8165']CVE-2024-8165[/URL]
[URL='https://github.com/DeepMountains/Mirage/blob/main/CVE18-1.md'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.275763'][email protected][/URL]
[URL='https://vuldb.com/?id.275763'][email protected][/URL]
[URL='https://vuldb.com/?submit.393376'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Cisco--Cisco Application Policy Infrastructure Controller (APIC)
[/TD]
[TD]A vulnerability in the software upgrade component of Cisco Application Policy Infrastructure Controller (APIC) and Cisco&nbsp;Cloud Network Controller, formerly Cisco Cloud APIC, could allow an authenticated, remote attacker with Administrator-level privileges to install a modified software image, leading to arbitrary code injection on an affected system. This vulnerability is due to insufficient signature validation of software images. An attacker could exploit this vulnerability by installing a modified software image. A successful exploit could allow the attacker to execute arbitrary code on the affected system and elevate their privileges to root. Note: Administrators should always validate the hash of any upgrade image before uploading it to Cisco APIC and Cisco Cloud Network Controller.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-20478&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N']6.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-20478']CVE-2024-20478[/URL]
[URL='https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-priv-esc-uYQJjnuU'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Cisco--Cisco Application Policy Infrastructure Controller (APIC)
[/TD]
[TD]A vulnerability in the restricted security domain implementation of Cisco Application Policy Infrastructure Controller (APIC) could allow an authenticated, remote attacker to modify the behavior of default system policies, such as quality of service (QoS) policies, on an affected system.&nbsp;This vulnerability is due to improper access control when restricted security domains are used to implement multi-tenancy. An attacker with a valid user account associated with a restricted security domain could exploit this vulnerability. A successful exploit could allow the attacker to read, modify, or delete child policies created under default system policies, which are implicitly used by all tenants in the fabric, resulting in disruption of network traffic. Exploitation is not possible for policies under tenants that an attacker has no authorization to access.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-20279&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N']4.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-20279']CVE-2024-20279[/URL]
[URL='https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-cousmo-uBpBYGbq'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Cisco--Cisco NX-OS Software
[/TD]
[TD]A vulnerability in Cisco NX-OS Software could allow an authenticated, local attacker with privileges to access the Bash shell to&nbsp;execute arbitrary code as root on an affected device. This vulnerability is due to insufficient security restrictions when executing commands from the Bash shell. An attacker with privileges to access the Bash shell could exploit this vulnerability by executing a specific crafted command on the underlying operating system. A successful exploit could allow the attacker to execute arbitrary code with the privileges of root.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-20411&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H']6.7[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-20411']CVE-2024-20411[/URL]
[URL='https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-bshacepe-bApeHSx7'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Cisco--Cisco NX-OS Software
[/TD]
[TD]A vulnerability in Cisco NX-OS Software could allow an authenticated, local attacker with privileges to access the Bash shell to elevate privileges to network-admin on an affected device. This vulnerability is due to insufficient security restrictions when executing application arguments from the Bash shell. An attacker with privileges to access the Bash shell could exploit this vulnerability by executing crafted commands on the underlying operating system. A successful exploit could allow the attacker to create new users with the privileges of network-admin.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-20413&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H']6.7[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-20413']CVE-2024-20413[/URL]
[URL='https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-bshacepe-bApeHSx7'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Cisco--Cisco NX-OS Software
[/TD]
[TD]A vulnerability in the Python interpreter of Cisco NX-OS Software could allow an authenticated, low-privileged, local attacker to escape the Python sandbox and gain unauthorized access to the underlying operating system of the device. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by manipulating specific functions within the Python interpreter. A successful exploit could allow an attacker to escape the Python sandbox and execute arbitrary commands on the underlying operating system with the privileges of the authenticated user.&nbsp; Note: An attacker must be authenticated with Python execution privileges to exploit these vulnerabilities. For more information regarding Python execution privileges, see product-specific documentation, such as the section of the Cisco Nexus 9000 Series NX-OS Programmability Guide.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-20284&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L']5.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-20284']CVE-2024-20284[/URL]
[URL='https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-psbe-ce-YvbTn5du'][email protected][/URL]
[URL='https://www.cisco.com/c/en/us/td/docs/dcn/nx-os/nexus9000/105x/programmability/cisco-nexus-9000-series-nx-os-programmability-guide-105x/m-n9k-python-api-101x.html?bookSearch=true#concept_A2CFF094ADCB414C983EA06AD8E9A410'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Cisco--Cisco NX-OS Software
[/TD]
[TD]A vulnerability in the Python interpreter of Cisco NX-OS Software could allow an authenticated, low-privileged, local attacker to escape the Python sandbox and gain unauthorized access to the underlying operating system of the device. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by manipulating specific functions within the Python interpreter. A successful exploit could allow an attacker to escape the Python sandbox and execute arbitrary commands on the underlying operating system with the privileges of the authenticated user.&nbsp; Note: An attacker must be authenticated with Python execution privileges to exploit these vulnerabilities. For more information regarding Python execution privileges, see product-specific documentation, such as the section of the Cisco Nexus 9000 Series NX-OS Programmability Guide.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-20285&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L']5.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-20285']CVE-2024-20285[/URL]
[URL='https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-psbe-ce-YvbTn5du'][email protected][/URL]
[URL='https://www.cisco.com/c/en/us/td/docs/dcn/nx-os/nexus9000/105x/programmability/cisco-nexus-9000-series-nx-os-programmability-guide-105x/m-n9k-python-api-101x.html?bookSearch=true#concept_A2CFF094ADCB414C983EA06AD8E9A410'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Cisco--Cisco NX-OS Software
[/TD]
[TD]A vulnerability in the Python interpreter of Cisco NX-OS Software could allow an authenticated, low-privileged, local attacker to escape the Python sandbox and gain unauthorized access to the underlying operating system of the device. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by manipulating specific functions within the Python interpreter. A successful exploit could allow an attacker to escape the Python sandbox and execute arbitrary commands on the underlying operating system with the privileges of the authenticated user.&nbsp; Note: An attacker must be authenticated with Python execution privileges to exploit these vulnerabilities. For more information regarding Python execution privileges, see product-specific documentation, such as the section of the Cisco Nexus 9000 Series NX-OS Programmability Guide.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-20286&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L']5.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-20286']CVE-2024-20286[/URL]
[URL='https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-psbe-ce-YvbTn5du'][email protected][/URL]
[URL='https://www.cisco.com/c/en/us/td/docs/dcn/nx-os/nexus9000/105x/programmability/cisco-nexus-9000-series-nx-os-programmability-guide-105x/m-n9k-python-api-101x.html?bookSearch=true#concept_A2CFF094ADCB414C983EA06AD8E9A410'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Cisco--Cisco NX-OS Software
[/TD]
[TD]A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, low-privileged, local attacker to execute arbitrary commands on the underlying operating system of an affected device.&nbsp; This vulnerability is due to insufficient validation of arguments for a specific CLI command. An attacker could exploit this vulnerability by including crafted input as the argument of the affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of the currently logged-in user.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-20289&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N']4.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-20289']CVE-2024-20289[/URL]
[URL='https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cmdinj-Lq6jsZhH'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]code-projects--Pharmacy Management System
[/TD]
[TD]A vulnerability was found in code-projects Pharmacy Management System 1.0. It has been classified as problematic. This affects an unknown part of the file /index.php?id=userProfileEdit of the component Update My Profile Page. The manipulation of the argument fname/lname/email with the input <script>alert(1)</script> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.[/TD]
[TD]2024-08-31[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8366&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N']4.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8366']CVE-2024-8366[/URL]
[URL='https://code-projects.org/'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.276261'][email protected][/URL]
[URL='https://vuldb.com/?id.276261'][email protected][/URL]
[URL='https://vuldb.com/?submit.398777'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]CollaboraOnline--online
[/TD]
[TD]Collabora Online is a collaborative online office suite based on LibreOffice technology. In the mobile (Android/iOS) device variants of Collabora Online it was possible to inject JavaScript via url encoded values in links contained in documents. Since the Android JavaScript interface allows access to internal functions, the likelihood that the app could be compromised via this vulnerability is considered high. Non-mobile variants are not affected. Mobile variants should update to the latest version provided by the platform appstore. There are no known workarounds for this vulnerability.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-45045&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L']6.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-45045']CVE-2024-45045[/URL]
[URL='https://github.com/CollaboraOnline/online/security/advisories/GHSA-78cg-rg4q-26qv'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Contest Gallery--Contest Gallery
[/TD]
[TD]Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Contest Gallery.This issue affects Contest Gallery: from n/a through 23.1.2.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43283&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N']5.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43283']CVE-2024-43283[/URL]
[URL='https://patchstack.com/database/vulnerability/contest-gallery/wordpress-contest-gallery-plugin-23-1-2-unauthenticated-comment-userid-and-ip-address-disclosure-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]cryoutcreations -- esotera
[/TD]
[TD]Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CryoutCreations Esotera allows Stored XSS.This issue affects Esotera: from n/a through 1.2.5.1.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43952&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']5.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43952']CVE-2024-43952[/URL]
[URL='https://patchstack.com/database/vulnerability/esotera/wordpress-esotera-theme-1-2-5-1-cross-site-scripting-xss-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]cryoutcreations -- tempera
[/TD]
[TD]Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CryoutCreations Tempera allows Stored XSS.This issue affects Tempera: from n/a through 1.8.2.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43951&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']5.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43951']CVE-2024-43951[/URL]
[URL='https://patchstack.com/database/vulnerability/tempera/wordpress-tempera-theme-1-8-2-cross-site-scripting-xss-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]cyberlord92--Web Application Firewall website security
[/TD]
[TD]The Web Application Firewall plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 2.1.2. This is due to insufficient restrictions on where the IP Address information is being retrieved for request logging and login restrictions. Attackers can supply the X-Forwarded-For header with with a different IP Address that will be logged and can be used to bypass settings that may have blocked out an IP address or country from logging in.[/TD]
[TD]2024-08-31[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4539&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N']5.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4539']CVE-2022-4539[/URL]
[URL='https://plugins.trac.wordpress.org/changeset/3055548/web-application-firewall/trunk/helper/utility.php'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/0e99531c-8742-4f91-8525-65bb3cb06644?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Dell--Dell Client Platform, Dell Dock Firmware
[/TD]
[TD]Dell Dock Firmware and Dell Client Platform contain an Improper Link Resolution vulnerability during installation resulting in arbitrary folder deletion, which could lead to Privilege Escalation or Denial of Service.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43078&vector=CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H']6.7[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43078']CVE-2023-43078[/URL]
[URL='https://www.dell.com/support/kbdoc/en-us/000217981/dsa-2023-362-security-update-for-dell-dock-firmware-and-dell-client-platform-for-an-improper-link-resolution-vulnerability'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Dell--PowerEdge Platform
[/TD]
[TD]Dell PowerEdge Platform, 14G Intel BIOS version(s) prior to 2.22.x, contains an Improper Input Validation vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Information disclosure.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-38303&vector=CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N']5.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-38303']CVE-2024-38303[/URL]
[URL='https://www.dell.com/support/kbdoc/en-us/000228135/dsa-2024-309-security-update-for-dell-poweredge-server-for-improper-input-validation-vulnerability'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Dell--PowerScale OneFS
[/TD]
[TD]Dell PowerScale OneFS versions 8.2.2.x through 9.8.0.1 contains a UNIX symbolic link (symlink) following vulnerability. A local high privileged attacker could potentially exploit this vulnerability, leading to denial of service, information tampering.[/TD]
[TD]2024-08-31[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-39578&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H']6.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-39578']CVE-2024-39578[/URL]
[URL='https://www.dell.com/support/kbdoc/en-us/000228207/dsa-2024-346-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Dell--PowerScale OneFS
[/TD]
[TD]Dell PowerScale OneFS versions 8.2.2.x through 9.8.0.0 contains an incorrect privilege assignment vulnerability. A local high privileged attacker could potentially exploit this vulnerability to gain root-level access.[/TD]
[TD]2024-08-31[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-39579&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H']6.7[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-39579']CVE-2024-39579[/URL]
[URL='https://www.dell.com/support/kbdoc/en-us/000228207/dsa-2024-346-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]delower186--WP To Do
[/TD]
[TD]The WP To Do plugin for WordPress is vulnerable to Stored Cross-Site Scripting via Comment in all versions up to, and including, 1.3.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-3944&vector=CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N']4.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-3944']CVE-2024-3944[/URL]
[URL='https://plugins.trac.wordpress.org/browser/wp-todo/trunk/inc/Base/Model.php#L225'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/b36b9b8a-41b0-4b57-92c7-5acebe2b0bae?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Dinesh Karki--WP Armour Extended
[/TD]
[TD]Cross-Site Request Forgery (CSRF) vulnerability in Dinesh Karki WP Armour Extended.This issue affects WP Armour Extended: from n/a through 1.26.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43947&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L']5.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43947']CVE-2024-43947[/URL]
[URL='https://patchstack.com/database/vulnerability/wp-armour-extended/wordpress-wp-armour-extended-plugin-1-26-cross-site-request-forgery-csrf-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]dingfanzu--CMS
[/TD]
[TD]A vulnerability was found in dingfanzu CMS up to 29d67d9044f6f93378e6eb6ff92272217ff7225c. It has been rated as critical. Affected by this issue is some unknown functionality of the file /ajax/chpwd.php. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8302&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L']6.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8302']CVE-2024-8302[/URL]
[URL='https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/dingfanzu-CMS/dingfanzu-CMS%20chpwd.php%20username%20SQL-inject.md'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.276074'][email protected][/URL]
[URL='https://vuldb.com/?id.276074'][email protected][/URL]
[URL='https://vuldb.com/?submit.396297'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]dingfanzu--CMS
[/TD]
[TD]A vulnerability classified as critical has been found in dingfanzu CMS up to 29d67d9044f6f93378e6eb6ff92272217ff7225c. This affects an unknown part of the file /ajax/getBasicInfo.php. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8303&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L']6.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8303']CVE-2024-8303[/URL]
[URL='https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/dingfanzu-CMS/dingfanzu-CMS%20getBasicInfo.php%20username%20SQL-inject.md'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.276075'][email protected][/URL]
[URL='https://vuldb.com/?id.276075'][email protected][/URL]
[URL='https://vuldb.com/?submit.396298'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]discourse--discourse-calendar
[/TD]
[TD]discourse-calendar is a discourse plugin which adds the ability to create a dynamic calendar in the first post of a topic. The limit on region value length is too generous. This allows a malicious actor to cause a Discourse instance to use excessive bandwidth and disk space. This issue has been patched in main the main branch. There are no workarounds for this vulnerability. Please upgrade as soon as possible.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-21658&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L']4.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-21658']CVE-2024-21658[/URL]
[URL='https://github.com/discourse/discourse-calendar/security/advisories/GHSA-65f2-9ghp-x8h8'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Dylan James--Zephyr Project Manager
[/TD]
[TD]Authorization Bypass Through User-Controlled Key vulnerability in Dylan James Zephyr Project Manager.This issue affects Zephyr Project Manager: from n/a through 3.3.102.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43916&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N']4.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43916']CVE-2024-43916[/URL]
[URL='https://patchstack.com/database/vulnerability/zephyr-project-manager/wordpress-zephyr-project-manager-plugin-3-3-102-insecure-direct-object-references-idor-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]etoilewebdesign -- front_end_users
[/TD]
[TD]The Front End Users plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'user-search' shortcode in all versions up to, and including, 3.2.28 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-7606&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']5.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-7606']CVE-2024-7606[/URL]
[URL='https://plugins.trac.wordpress.org/browser/front-end-only-users/trunk/Shortcodes/Insert_User_Search.php#L106'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/browser/front-end-only-users/trunk/Shortcodes/Insert_User_Search.php#L80'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/changeset/3142978/'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/048ea84c-0d53-434b-ae49-d804ec1de8c4?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]freakingwildchild--Visual Sound
[/TD]
[TD]The Visual Sound plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.03. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attackers to update the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8197&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N']4.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8197']CVE-2024-8197[/URL]
[URL='https://wpscan.com/vulnerability/88cacd47-d900-478c-b833-c6c55fd4b082/'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/48d6d4c1-cc87-4c2c-9fbb-90af62f576aa?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]funnelforms--Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor Funnelforms Free
[/TD]
[TD]The Funnelforms Free plugin for WordPress is vulnerable to arbitrary file deletion in all versions up to, and including, 3.7.3.2 via the 'af2DeleteFontFile' function. This is due to the plugin not properly validating a file or its path prior to deleting it. This makes it possible for unauthenticated attackers to delete arbitrary files, including the wp-config.php file, which can make site takeover and remote code execution possible.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-6312&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H']6.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-6312']CVE-2024-6312[/URL]
[URL='https://plugins.trac.wordpress.org/browser/funnelforms-free/tags/3.7.3.2/admin/menu_ajax_functions/formularbuilder_fonts.php#L59'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/browser/funnelforms-free/tags/3.7.4.1/admin/menu_ajax_functions/formularbuilder_fonts.php?rev=3141470#L17'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/3e815531-f966-44a1-a037-8077a40c83b0?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]funnelforms--Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor Funnelforms Free
[/TD]
[TD]The Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor - Funnelforms Free plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the af2_handel_file_remove AJAX action in all versions up to, and including, 3.7.3.2. This makes it possible for unauthenticated attackers to delete arbitrary media files.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-5857&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L']5.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-5857']CVE-2024-5857[/URL]
[URL='https://plugins.trac.wordpress.org/changeset/3141470/funnelforms-free/trunk/frontend/frontend.php'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/5cd0e015-abf2-4905-8b42-46b685be2c74?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]funnelforms--Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor Funnelforms Free
[/TD]
[TD]The Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor - Funnelforms Free plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'fnsf_af2_handel_file_upload' function in all versions up to, and including, 3.7.3.2. This makes it possible for unauthenticated attackers to upload arbitrary media to the site, even if no forms exist.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-7447&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N']5.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-7447']CVE-2024-7447[/URL]
[URL='https://plugins.trac.wordpress.org/browser/funnelforms-free/trunk/frontend/frontend.php#L2577'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/changeset/3141470/'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/9871f683-136e-45b5-90fb-a373a771014b?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]FunnelKit--FunnelKit Funnel Builder Pro
[/TD]
[TD]The FunnelKit Funnel Builder Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'allow_iframe_tag_in_post' function which uses the 'wp_kses_allowed_html' filter to globally allow script and iframe tags in posts in all versions up to, and including, 3.4.5. This makes it possible for authenticated attackers, with contributor access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-1056&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N']6.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-1056']CVE-2024-1056[/URL]
[URL='https://myaccount.funnelkit.com/changelog/changelog-funnel-builder-pro/?v=7516fd43adaa'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/2fbacaf2-0b3e-4d1e-adc3-c501a6c4c816?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]getbrave -- brave
[/TD]
[TD]Cross-Site Request Forgery (CSRF) vulnerability in Brave Brave Popup Builder.This issue affects Brave Popup Builder: from n/a through 0.7.0.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43337&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N']4.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43337']CVE-2024-43337[/URL]
[URL='https://patchstack.com/database/vulnerability/brave-popup-builder/wordpress-brave-plugin-0-7-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]gianniporto -- intothedark
[/TD]
[TD]Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Gianni Porto IntoTheDark allows Reflected XSS.This issue affects IntoTheDark: from n/a through 1.0.5.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43958&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43958']CVE-2024-43958[/URL]
[URL='https://patchstack.com/database/vulnerability/intothedark/wordpress-into-the-dark-theme-1-0-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]gioni--WP Cerber Security, Anti-spam & Malware Scan
[/TD]
[TD]The WP Cerber Security plugin for WordPress is vulnerable to IP Protection bypass in versions up to, and including 9.4 due to the plugin improperly checking for a visitor's IP address. This makes it possible for an attacker whose IP address has been blocked to bypass this control by setting the X-Forwarded-For: HTTP header to an IP Address that hasn't been blocked.[/TD]
[TD]2024-08-31[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4100&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N']5.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4100']CVE-2022-4100[/URL]
[URL='https://plugins.trac.wordpress.org/changeset/2865322/wp-cerber/trunk/cerber-common.php'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/03ccd474-42f4-4cbb-823e-93fe4db1bf80?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]HFO4--shudong-share
[/TD]
[TD]A vulnerability was found in HFO4 shudong-share 2.4.7. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /includes/fileReceive.php of the component File Extension Handler. The manipulation of the argument file leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8338&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L']6.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8338']CVE-2024-8338[/URL]
[URL='https://github.com/enjoyworld/webray.com.cn/blob/main/cves/shudong-share%20Any%20File%20Upload.md'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.276217'][email protected][/URL]
[URL='https://vuldb.com/?id.276217'][email protected][/URL]
[URL='https://vuldb.com/?submit.399538'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]hitachienergy -- microscada_x_sys600
[/TD]
[TD]An HTTP parameter may contain a URL value and could cause the web application to redirect the request to the specified URL. By modifying the URL value to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-7941&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-7941']CVE-2024-7941[/URL]
[URL='https://publisher.hitachienergy.com/preview?DocumentID=8DBD000160&LanguageCode=en&DocumentPartId=&Action=Launch'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]hubspotdev--HubSpot CRM, Email Marketing, Live Chat, Forms & Analytics
[/TD]
[TD]The HubSpot - CRM, Email Marketing, Live Chat, Forms & Analytics plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'url' attribute of the HubSpot Meeting Widget in all versions up to, and including, 11.1.22 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-5879&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N']6.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-5879']CVE-2024-5879[/URL]
[URL='https://plugins.trac.wordpress.org/browser/leadin/tags/11.1.13/public/admin/widgets/class-elementormeeting.php#L108'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/changeset/3123662/leadin/trunk/public/admin/widgets/class-elementormeeting.php'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/ac004fb0-e178-4e9b-9aa3-b14eab43f22d?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]HWA JIUH DIGITAL TECHNOLOGY--Easy test Online Learning and Testing Platform
[/TD]
[TD]Easy test Online Learning and Testing Platform from HWA JIUH DIGITAL TECHNOLOGY does not properly validate a specific page parameter, allowing remote attackers with regular privilege to inject arbitrary JavaScript code and perform Reflected Cross-site scripting attacks.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8328&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']5.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8328']CVE-2024-8328[/URL]
[URL='https://www.twcert.org.tw/en/cp-139-8033-0a98f-2.html'][email protected][/URL]
[URL='https://www.twcert.org.tw/tw/cp-132-8028-360e1-1.html'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]IBM--MaaS360
[/TD]
[TD]IBM MaaS360 for Android 6.31 through 8.60 is using hard coded credentials that can be obtained by a user with physical access to the device.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-35118&vector=CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N']4.6[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-35118']CVE-2024-35118[/URL]
[URL='https://exchange.xforce.ibmcloud.com/vulnerabilities/290341'][email protected][/URL]
[URL='https://www.ibm.com/support/pages/node/7166750'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]IBM--Security Verify Access
[/TD]
[TD]IBM Security Verify Access 10.0.0 through 10.0.8 OIDC Provider could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-35133&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N']6.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-35133']CVE-2024-35133[/URL]
[URL='https://exchange.xforce.ibmcloud.com/vulnerabilities/291026'][email protected][/URL]
[URL='https://www.ibm.com/support/pages/node/7166712'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]in2code -- powermail
[/TD]
[TD]An issue was discovered in powermail extension through 12.3.5 for TYPO3. It fails to validate the mail parameter of the confirmationAction, resulting in Insecure Direct Object Reference (IDOR). An unauthenticated attacker can use this to display the user-submitted data of all forms persisted by the extension. This can only be exploited when the extension is configured to save submitted form data to the database (plugin.tx_powermail.settings.db.enable=1), which however is the default setting of the extension. The fixed versions are 7.5.0, 8.5.0, 10.9.0, and 12.4.0[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-45232&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N']5.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-45232']CVE-2024-45232[/URL]
[URL='https://typo3.org/security/advisory/typo3-ext-sa-2024-006'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]insurance_management_system_project -- insurance_management_system
[/TD]
[TD]A vulnerability has been found in nafisulbari/itsourcecode Insurance Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file editClient.php. The manipulation of the argument AGENT ID leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8208&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8208']CVE-2024-8208[/URL]
[URL='https://vuldb.com/?ctiid.275917'][email protected][/URL]
[URL='https://vuldb.com/?id.275917'][email protected][/URL]
[URL='https://vuldb.com/?submit.393511'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]insurance_management_system_project -- insurance_management_system
[/TD]
[TD]A vulnerability was found in nafisulbari/itsourcecode Insurance Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file addClient.php. The manipulation of the argument CLIENT ID leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8209&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8209']CVE-2024-8209[/URL]
[URL='https://vuldb.com/?ctiid.275918'][email protected][/URL]
[URL='https://vuldb.com/?id.275918'][email protected][/URL]
[URL='https://vuldb.com/?submit.393512'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]insurance_management_system_project -- insurance_management_system
[/TD]
[TD]A vulnerability, which was classified as critical, has been found in nafisulbari/itsourcecode Insurance Management System 1.0. Affected by this issue is some unknown functionality of the file editPayment.php of the component Payment Handler. The manipulation of the argument recipt_no leads to improper access controls. The attack may be launched remotely. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8216&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L']5.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8216']CVE-2024-8216[/URL]
[URL='https://vuldb.com/?ctiid.275924'][email protected][/URL]
[URL='https://vuldb.com/?id.275924'][email protected][/URL]
[URL='https://vuldb.com/?submit.393532'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]irfanview -- irfanview
[/TD]
[TD]An issue in the component EXR!ReadEXR+0x40ef1 of Irfanview v4.67.1.0 allows attackers to cause an access violation via a crafted EXR file. This vulnerability can lead to a Denial of Service (DoS).[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-44913&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H']5.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44913']CVE-2024-44913[/URL]
[URL='https://github.com/yuhano/irfanview_Poc'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]irfanview -- irfanview
[/TD]
[TD]An issue in the component EXR!ReadEXR+0x3df50 of Irfanview v4.67.1.0 allows attackers to cause an access violation via a crafted EXR file. This vulnerability can lead to a Denial of Service (DoS).[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-44914&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H']5.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44914']CVE-2024-44914[/URL]
[URL='https://github.com/yuhano/irfanview_Poc'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]irfanview -- irfanview
[/TD]
[TD]An issue in the component EXR!ReadEXR+0x4eef0 of Irfanview v4.67.1.0 allows attackers to cause an access violation via a crafted EXR file. This vulnerability can lead to a Denial of Service (DoS).[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-44915&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H']5.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44915']CVE-2024-44915[/URL]
[URL='https://github.com/yuhano/irfanview_Poc'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Jegstudio--Gutenverse
[/TD]
[TD]Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Jegstudio Gutenverse allows Stored XSS.This issue affects Gutenverse: from n/a through 1.9.4.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43920&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L']6.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43920']CVE-2024-43920[/URL]
[URL='https://patchstack.com/database/vulnerability/gutenverse/wordpress-gutenverse-gutenberg-blocks-page-builder-for-site-editor-plugin-1-9-4-cross-site-scripting-xss-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]jegtheme--Jeg Elementor Kit
[/TD]
[TD]The Jeg Elementor Kit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.6.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-6804&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N']6.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-6804']CVE-2024-6804[/URL]
[URL='https://plugins.trac.wordpress.org/browser/jeg-elementor-kit/tags/2.6.7/lib/jeg-framework/customizer/class-customizer.php#L595'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/changeset/3139386/'][email protected][/URL]
[URL='https://wordpress.org/plugins/jeg-elementor-kit/#developers'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/5491ff65-9060-4b0b-a31d-7b95ea581310?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]JEM Plugins--Order Export for WooCommerce
[/TD]
[TD]Exposure of Sensitive Information to an Unauthorized Actor vulnerability in JEM Plugins Order Export for WooCommerce.This issue affects Order Export for WooCommerce: from n/a through 3.23.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43259&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N']5.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43259']CVE-2024-43259[/URL]
[URL='https://patchstack.com/database/vulnerability/order-export-and-more-for-woocommerce/wordpress-order-export-for-woocommerce-plugin-3-23-sensitive-data-exposure-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]jupyter -- jupyterlab
[/TD]
[TD]jupyterlab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook Architecture. This vulnerability depends on user interaction by opening a malicious notebook with Markdown cells, or Markdown file using JupyterLab preview feature. A malicious user can access any data that the attacked user has access to as well as perform arbitrary requests acting as the attacked user. JupyterLab v3.6.8, v4.2.5 and Jupyter Notebook v7.2.2 have been patched to resolve this issue. Users are advised to upgrade. There is no workaround for the underlying DOM Clobbering susceptibility. However, select plugins can be disabled on deployments which cannot update in a timely fashion to minimise the risk. These are: 1. [ICODE]@jupyterlab/mathjax-extension:plugin[/ICODE] - users will loose ability to preview mathematical equations. 2. [ICODE]@jupyterlab/markdownviewer-extension:plugin[/ICODE] - users will loose ability to open Markdown previews. 3. [ICODE]@jupyterlab/mathjax2-extension:plugin[/ICODE] (if installed with optional [ICODE]jupyterlab-mathjax2[/ICODE] package) - an older version of the mathjax plugin for JupyterLab 4.x. To disable these extensions run: [ICODE]jupyter labextension disable @jupyterlab/markdownviewer-extension:plugin && jupyter labextension disable @jupyterlab/mathjax-extension:plugin && jupyter labextension disable @jupyterlab/mathjax2-extension:plugin [/ICODE] in bash.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43805&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43805']CVE-2024-43805[/URL]
[URL='https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-9q39-rmj3-p4r2'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]justinbusa--Beaver Builder WordPress Page Builder
[/TD]
[TD]The Beaver Builder - WordPress Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'type' parameter in all versions up to, and including, 2.8.3.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-7895&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N']6.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-7895']CVE-2024-7895[/URL]
[URL='https://plugins.trac.wordpress.org/browser/beaver-builder-lite-version/trunk/modules/button-group/button-group.php#L195'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/browser/beaver-builder-lite-version/trunk/modules/button-group/includes/frontend.php#L2'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3143080%40beaver-builder-lite-version&new=3143080%40beaver-builder-lite-version&sfp_email=&sfph_mail='][email protected][/URL]
[URL='https://wordpress.org/plugins/beaver-builder-lite-version/#developers'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/f83db067-843f-4dd8-b5d1-83e95c6c88cc?source=cve'][email protected][/URL]
[URL='https://www.wpbeaverbuilder.com/change-logs/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Kriesi--Enfold - Responsive Multi-Purpose Theme
[/TD]
[TD]The Enfold - Responsive Multi-Purpose Theme theme for WordPress is vulnerable to Stored Cross-Site Scripting via the 'wrapper_class' and 'class' parameters in all versions up to, and including, 6.0.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-5061&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N']6.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-5061']CVE-2024-5061[/URL]
[URL='https://themeforest.net/item/enfold-responsive-multipurpose-theme/4519990'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/25462492-59d2-44b7-81c3-93ac04a08bcc?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]linux -- linux_kernel
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Add error handling to pair_device() hci_conn_params_add() never checks for a NULL value and could lead to a NULL pointer dereference causing a crash. Fixed by adding error handling in the function.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43884&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H']5.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43884']CVE-2024-43884[/URL]
[URL='https://git.kernel.org/stable/c/064dd929c76532359d2905d90a7c12348043cfd4']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/538fd3921afac97158d4177139a0ad39f056dbb2']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/5da2884292329bc9be32a7778e0e119f06abe503']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/ee0799103b1ae4bcfd80dc11a15df085f6ee1b61']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]linux -- linux_kernel
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: btrfs: fix double inode unlock for direct IO sync writes If we do a direct IO sync write, at btrfs_sync_file(), and we need to skip inode logging or we get an error starting a transaction or an error when flushing delalloc, we end up unlocking the inode when we shouldn't under the 'out_release_extents' label, and then unlock it again at btrfs_direct_write(). Fix that by checking if we have to skip inode unlocking under that label.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43885&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H']5.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43885']CVE-2024-43885[/URL]
[URL='https://git.kernel.org/stable/c/1a607d22dea4f60438747705495ec4d0af2ec451']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/7ba27f14161fc20c4fc0051658a22ddd832eb0aa']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/8bd4c9220416111500c275546c69c63d42185793']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/d924a0be2f218501588cf463d70f1c71afea06d9']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/e0391e92f9ab4fb3dbdeb139c967dcfa7ac4b115']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]linux -- linux_kernel
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Add null check in resource_log_pipe_topology_update [WHY] When switching from "Extend" to "Second Display Only" we sometimes call resource_get_otg_master_for_stream on a stream for the eDP, which is disconnected. This leads to a null pointer dereference. [HOW] Added a null check in dc_resource.c/resource_log_pipe_topology_update.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43886&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H']5.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43886']CVE-2024-43886[/URL]
[URL='https://git.kernel.org/stable/c/899d92fd26fe780aad711322aa671f68058207a6']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/c36e922a36bdf69765c340a0857ca74092003bee']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]linux -- linux_kernel
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: padata: Fix possible divide-by-0 panic in padata_mt_helper() We are hit with a not easily reproducible divide-by-0 panic in padata.c at bootup time. [ 10.017908] Oops: divide error: 0000 1 PREEMPT SMP NOPTI [ 10.017908] CPU: 26 PID: 2627 Comm: kworker/u1666:1 Not tainted 6.10.0-15.el10.x86_64 #1 [ 10.017908] Hardware name: Lenovo ThinkSystem SR950 [7X12CTO1WW]/[7X12CTO1WW], BIOS [PSE140J-2.30] 07/20/2021 [ 10.017908] Workqueue: events_unbound padata_mt_helper [ 10.017908] RIP: 0010:padata_mt_helper+0x39/0xb0 : [ 10.017963] Call Trace: [ 10.017968] <TASK> [ 10.018004] ? padata_mt_helper+0x39/0xb0 [ 10.018084] process_one_work+0x174/0x330 [ 10.018093] worker_thread+0x266/0x3a0 [ 10.018111] kthread+0xcf/0x100 [ 10.018124] ret_from_fork+0x31/0x50 [ 10.018138] ret_from_fork_asm+0x1a/0x30 [ 10.018147] </TASK> Looking at the padata_mt_helper() function, the only way a divide-by-0 panic can happen is when ps->chunk_size is 0. The way that chunk_size is initialized in padata_do_multithreaded(), chunk_size can be 0 when the min_chunk in the passed-in padata_mt_job structure is 0. Fix this divide-by-0 panic by making sure that chunk_size will be at least 1 no matter what the input parameters are.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43889&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H']5.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43889']CVE-2024-43889[/URL]
[URL='https://git.kernel.org/stable/c/6d45e1c948a8b7ed6ceddb14319af69424db730c']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/8f5ffd2af7274853ff91d6cd62541191d9fbd10d']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/924f788c906dccaca30acab86c7124371e1d6f2c']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/a29cfcb848c31f22b4de6a531c3e1d68c9bfe09f']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/ab8b397d5997d8c37610252528edc54bebf9f6d3']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/da0ffe84fcc1627a7dff82c80b823b94236af905']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]linux -- linux_kernel
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix null pointer deref in dcn20_resource.c Fixes a hang thats triggered when MPV is run on a DCN401 dGPU: mpv --hwdec=vaapi --vo=gpu --hwdec-codecs=all and then enabling fullscreen playback (double click on the video) The following calltrace will be seen: [ 181.843989] BUG: kernel NULL pointer dereference, address: 0000000000000000 [ 181.843997] #PF: supervisor instruction fetch in kernel mode [ 181.844003] #PF: error_code(0x0010) - not-present page [ 181.844009] PGD 0 P4D 0 [ 181.844020] Oops: 0010 [#1] PREEMPT SMP NOPTI [ 181.844028] CPU: 6 PID: 1892 Comm: gnome-shell Tainted: G W OE 6.5.0-41-generic #41~22.04.2-Ubuntu [ 181.844038] Hardware name: System manufacturer System Product Name/CROSSHAIR VI HERO, BIOS 6302 10/23/2018 [ 181.844044] RIP: 0010:0x0 [ 181.844079] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [ 181.844084] RSP: 0018:ffffb593c2b8f7b0 EFLAGS: 00010246 [ 181.844093] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000004 [ 181.844099] RDX: ffffb593c2b8f804 RSI: ffffb593c2b8f7e0 RDI: ffff9e3c8e758400 [ 181.844105] RBP: ffffb593c2b8f7b8 R08: ffffb593c2b8f9c8 R09: ffffb593c2b8f96c [ 181.844110] R10: 0000000000000000 R11: 0000000000000000 R12: ffffb593c2b8f9c8 [ 181.844115] R13: 0000000000000001 R14: ffff9e3c88000000 R15: 0000000000000005 [ 181.844121] FS: 00007c6e323bb5c0(0000) GS:ffff9e3f85f80000(0000) knlGS:0000000000000000 [ 181.844128] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 181.844134] CR2: ffffffffffffffd6 CR3: 0000000140fbe000 CR4: 00000000003506e0 [ 181.844141] Call Trace: [ 181.844146] <TASK> [ 181.844153] ? show_regs+0x6d/0x80 [ 181.844167] ? __die+0x24/0x80 [ 181.844179] ? page_fault_oops+0x99/0x1b0 [ 181.844192] ? do_user_addr_fault+0x31d/0x6b0 [ 181.844204] ? exc_page_fault+0x83/0x1b0 [ 181.844216] ? asm_exc_page_fault+0x27/0x30 [ 181.844237] dcn20_get_dcc_compression_cap+0x23/0x30 [amdgpu] [ 181.845115] amdgpu_dm_plane_validate_dcc.constprop.0+0xe5/0x180 [amdgpu] [ 181.845985] amdgpu_dm_plane_fill_plane_buffer_attributes+0x300/0x580 [amdgpu] [ 181.846848] fill_dc_plane_info_and_addr+0x258/0x350 [amdgpu] [ 181.847734] fill_dc_plane_attributes+0x162/0x350 [amdgpu] [ 181.848748] dm_update_plane_state.constprop.0+0x4e3/0x6b0 [amdgpu] [ 181.849791] ? dm_update_plane_state.constprop.0+0x4e3/0x6b0 [amdgpu] [ 181.850840] amdgpu_dm_atomic_check+0xdfe/0x1760 [amdgpu][/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43899&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H']5.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43899']CVE-2024-43899[/URL]
[URL='https://git.kernel.org/stable/c/974fccd61758599a9716c4b909d9226749efe37e']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/ecbf60782662f0a388493685b85a645a0ba1613c']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]linux -- linux_kernel
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix NULL pointer dereference for DTN log in DCN401 When users run the command: cat /sys/kernel/debug/dri/0/amdgpu_dm_dtn_log The following NULL pointer dereference happens: [ +0.000003] BUG: kernel NULL pointer dereference, address: NULL [ +0.000005] #PF: supervisor instruction fetch in kernel mode [ +0.000002] #PF: error_code(0x0010) - not-present page [ +0.000002] PGD 0 P4D 0 [ +0.000004] Oops: 0010 [#1] PREEMPT SMP NOPTI [ +0.000003] RIP: 0010:0x0 [ +0.000008] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [...] [ +0.000002] PKRU: 55555554 [ +0.000002] Call Trace: [ +0.000002] <TASK> [ +0.000003] ? show_regs+0x65/0x70 [ +0.000006] ? __die+0x24/0x70 [ +0.000004] ? page_fault_oops+0x160/0x470 [ +0.000006] ? do_user_addr_fault+0x2b5/0x690 [ +0.000003] ? prb_read_valid+0x1c/0x30 [ +0.000005] ? exc_page_fault+0x8c/0x1a0 [ +0.000005] ? asm_exc_page_fault+0x27/0x30 [ +0.000012] dcn10_log_color_state+0xf9/0x510 [amdgpu] [ +0.000306] ? srso_alias_return_thunk+0x5/0xfbef5 [ +0.000003] ? vsnprintf+0x2fb/0x600 [ +0.000009] dcn10_log_hw_state+0xfd0/0xfe0 [amdgpu] [ +0.000218] ? __mod_memcg_lruvec_state+0xe8/0x170 [ +0.000008] ? srso_alias_return_thunk+0x5/0xfbef5 [ +0.000002] ? debug_smp_processor_id+0x17/0x20 [ +0.000003] ? srso_alias_return_thunk+0x5/0xfbef5 [ +0.000002] ? srso_alias_return_thunk+0x5/0xfbef5 [ +0.000002] ? set_ptes.isra.0+0x2b/0x90 [ +0.000004] ? srso_alias_return_thunk+0x5/0xfbef5 [ +0.000002] ? _raw_spin_unlock+0x19/0x40 [ +0.000004] ? srso_alias_return_thunk+0x5/0xfbef5 [ +0.000002] ? do_anonymous_page+0x337/0x700 [ +0.000004] dtn_log_read+0x82/0x120 [amdgpu] [ +0.000207] full_proxy_read+0x66/0x90 [ +0.000007] vfs_read+0xb0/0x340 [ +0.000005] ? __count_memcg_events+0x79/0xe0 [ +0.000002] ? srso_alias_return_thunk+0x5/0xfbef5 [ +0.000003] ? count_memcg_events.constprop.0+0x1e/0x40 [ +0.000003] ? handle_mm_fault+0xb2/0x370 [ +0.000003] ksys_read+0x6b/0xf0 [ +0.000004] __x64_sys_read+0x19/0x20 [ +0.000003] do_syscall_64+0x60/0x130 [ +0.000004] entry_SYSCALL_64_after_hwframe+0x6e/0x76 [ +0.000003] RIP: 0033:0x7fdf32f147e2 [...] This error happens when the color log tries to read the gamut remap information from DCN401 which is not initialized in the dcn401_dpp_funcs which leads to a null pointer dereference. This commit addresses this issue by adding a proper guard to access the gamut_remap callback in case the specific ASIC did not implement this function.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43901&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H']5.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43901']CVE-2024-43901[/URL]
[URL='https://git.kernel.org/stable/c/1e68b7ce6bc6073579fe8713ec6b85aa9cd2e351']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/5af757124792817f8eb1bd0c80ad60fab519586b']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]linux -- linux_kernel
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Add null checker before passing variables Checks null pointer before passing variables to functions. This fixes 3 NULL_RETURNS issues reported by Coverity.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43902&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H']5.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43902']CVE-2024-43902[/URL]
[URL='https://git.kernel.org/stable/c/1686675405d07f35eae7ff3d13a530034b899df2']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/4cc2a94d96caeb3c975acdae7351c2f997c32175']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/8092aa3ab8f7b737a34b71f91492c676a843043a']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/83c7f509ef087041604e9572938f82e18b724c9d']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/d0b8b23b9c2ebec693a36fea518d8f13493ad655']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]linux -- linux_kernel
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Add NULL check for 'afb' before dereferencing in amdgpu_dm_plane_handle_cursor_update This commit adds a null check for the 'afb' variable in the amdgpu_dm_plane_handle_cursor_update function. Previously, 'afb' was assumed to be null, but was used later in the code without a null check. This could potentially lead to a null pointer dereference. Fixes the below: drivers/gpu/drm/amd/amdgpu/../display/amdgpu_dm/amdgpu_dm_plane.c:1298 amdgpu_dm_plane_handle_cursor_update() error: we previously assumed 'afb' could be null (see line 1252)[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43903&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H']5.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43903']CVE-2024-43903[/URL]
[URL='https://git.kernel.org/stable/c/31a679a880102dee6e10985a7b1789af8dc328cc']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/38e6f715b02b572f74677eb2f29d3b4bc6f1ddff']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/94220b35aeba2b68da81deeefbb784d94eeb5c04']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/ce5d090af683137cb779ed7e3683839f9c778b35']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]linux -- linux_kernel
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Add null checks for 'stream' and 'plane' before dereferencing This commit adds null checks for the 'stream' and 'plane' variables in the dcn30_apply_idle_power_optimizations function. These variables were previously assumed to be null at line 922, but they were used later in the code without checking if they were null. This could potentially lead to a null pointer dereference, which would cause a crash. The null checks ensure that 'stream' and 'plane' are not null before they are used, preventing potential crashes. Fixes the below static smatch checker: drivers/gpu/drm/amd/amdgpu/../display/dc/hwss/dcn30/dcn30_hwseq.c:938 dcn30_apply_idle_power_optimizations() error: we previously assumed 'stream' could be null (see line 922) drivers/gpu/drm/amd/amdgpu/../display/dc/hwss/dcn30/dcn30_hwseq.c:940 dcn30_apply_idle_power_optimizations() error: we previously assumed 'plane' could be null (see line 922)[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43904&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H']5.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43904']CVE-2024-43904[/URL]
[URL='https://git.kernel.org/stable/c/15c2990e0f0108b9c3752d7072a97d45d4283aea']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/16a8a2a839d19c4cf7253642b493ffb8eee1d857']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]linux -- linux_kernel
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: Fix the null pointer dereference for vega10_hwmgr Check return value and conduct null pointer handling to avoid null pointer dereference.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43905&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H']5.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43905']CVE-2024-43905[/URL]
[URL='https://git.kernel.org/stable/c/2e538944996d0dd497faf8ee81f8bfcd3aca7d80']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/50151b7f1c79a09117837eb95b76c2de76841dab']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/69a441473fec2fc2aa2cf56122d6c42c4266a239']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/c2629daf218a325f4d69754452cd42fe8451c15b']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]linux -- linux_kernel
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: drm/admgpu: fix dereferencing null pointer context When user space sets an invalid ta type, the pointer context will be empty. So it need to check the pointer context before using it[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43906&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H']5.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43906']CVE-2024-43906[/URL]
[URL='https://git.kernel.org/stable/c/030ffd4d43b433bc6671d9ec34fc12c59220b95d']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/4fd52f7c2c11d330571c6bde06e5ea508ec25c9d']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/641dac64178ccdb9e45c92b67120316896294d05']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]linux -- linux_kernel
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/pm: Fix the null pointer dereference in apply_state_adjust_rules Check the pointer value to fix potential null pointer dereference[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43907&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H']5.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43907']CVE-2024-43907[/URL]
[URL='https://git.kernel.org/stable/c/0c065e50445aea2e0a1815f12e97ee49e02cbaac']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/13937a40aae4efe64592ba48c057ac3c72f7fe82']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/3a01bf2ca9f860fdc88c358567b8fa3033efcf30']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/c1749313f35b98e2e655479f037db37f19756622']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/d19fb10085a49b77578314f69fff21562f7cd054']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/e04d18c29954441aa1054af649f957ffad90a201']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]linux -- linux_kernel
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix the null pointer dereference to ras_manager Check ras_manager before using it[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43908&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H']5.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43908']CVE-2024-43908[/URL]
[URL='https://git.kernel.org/stable/c/033187a70ba9743c73a810a006816e5553d1e7d4']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/48cada0ac79e4775236d642e9ec5998a7c7fb7a4']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/4c11d30c95576937c6c35e6f29884761f2dddb43']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/56e848034ccabe44e8f22ffcf49db771c17b0d0a']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/b89616333979114bb0da5fa40fb6e4a2f5294ca2']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/d81c1eeb333d84b3012a91c0500189dc1d71e46c']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/ff5c4eb71ee8951c789b079f6e948f86708b04ed']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]linux -- linux_kernel
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/pm: Fix the null pointer dereference for smu7 optimize the code to avoid pass a null pointer (hwmgr->backend) to function smu7_update_edc_leakage_table.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43909&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H']5.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43909']CVE-2024-43909[/URL]
[URL='https://git.kernel.org/stable/c/09544cd95c688d3041328a4253bd7514972399bb']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/1b8aa82b80bd947b68a8ab051d960a0c7935e22d']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/37b9df457cbcf095963d18f17d6cb7dfa0a03fce']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/7f56f050f02c27ed89cce1ea0c04b34abce32751']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/c02c1960c93eede587576625a1221205a68a904f']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]linux -- linux_kernel
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix NULL dereference at band check in starting tx ba session In MLD connection, link_data/link_conf are dynamically allocated. They don't point to vif->bss_conf. So, there will be no chanreq assigned to vif->bss_conf and then the chan will be NULL. Tweak the code to check ht_supported/vht_supported/has_he/has_eht on sta deflink. Crash log (with rtw89 version under MLO development): [ 9890.526087] BUG: kernel NULL pointer dereference, address: 0000000000000000 [ 9890.526102] #PF: supervisor read access in kernel mode [ 9890.526105] #PF: error_code(0x0000) - not-present page [ 9890.526109] PGD 0 P4D 0 [ 9890.526114] Oops: 0000 [#1] PREEMPT SMP PTI [ 9890.526119] CPU: 2 PID: 6367 Comm: kworker/u16:2 Kdump: loaded Tainted: G OE 6.9.0 #1 [ 9890.526123] Hardware name: LENOVO 2356AD1/2356AD1, BIOS G7ETB3WW (2.73 ) 11/28/2018 [ 9890.526126] Workqueue: phy2 rtw89_core_ba_work [rtw89_core] [ 9890.526203] RIP: 0010:ieee80211_start_tx_ba_session (net/mac80211/agg-tx.c:618 (discriminator 1)) mac80211 [ 9890.526279] Code: f7 e8 d5 93 3e ea 48 83 c4 28 89 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc 49 8b 84 24 e0 f1 ff ff 48 8b 80 90 1b 00 00 <83> 38 03 0f 84 37 fe ff ff bb ea ff ff ff eb cc 49 8b 84 24 10 f3 All code ======== 0: f7 e8 imul %eax 2: d5 (bad) 3: 93 xchg %eax,%ebx 4: 3e ea ds (bad) 6: 48 83 c4 28 add $0x28,%rsp a: 89 d8 mov %ebx,%eax c: 5b pop %rbx d: 41 5c pop %r12 f: 41 5d pop %r13 11: 41 5e pop %r14 13: 41 5f pop %r15 15: 5d pop %rbp 16: c3 retq 17: cc int3 18: cc int3 19: cc int3 1a: cc int3 1b: 49 8b 84 24 e0 f1 ff mov -0xe20(%r12),%rax 22: ff 23: 48 8b 80 90 1b 00 00 mov 0x1b90(%rax),%rax 2a:* 83 38 03 cmpl $0x3,(%rax) <-- trapping instruction 2d: 0f 84 37 fe ff ff je 0xfffffffffffffe6a 33: bb ea ff ff ff mov $0xffffffea,%ebx 38: eb cc jmp 0x6 3a: 49 rex.WB 3b: 8b .byte 0x8b 3c: 84 24 10 test %ah,(%rax,%rdx,1) 3f: f3 repz Code starting with the faulting instruction =========================================== 0: 83 38 03 cmpl $0x3,(%rax) 3: 0f 84 37 fe ff ff je 0xfffffffffffffe40 9: bb ea ff ff ff mov $0xffffffea,%ebx e: eb cc jmp 0xffffffffffffffdc 10: 49 rex.WB 11: 8b .byte 0x8b 12: 84 24 10 test %ah,(%rax,%rdx,1) 15: f3 repz [ 9890.526285] RSP: 0018:ffffb8db09013d68 EFLAGS: 00010246 [ 9890.526291] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff9308e0d656c8 [ 9890.526295] RDX: 0000000000000000 RSI: ffffffffab99460b RDI: ffffffffab9a7685 [ 9890.526300] RBP: ffffb8db09013db8 R08: 0000000000000000 R09: 0000000000000873 [ 9890.526304] R10: ffff9308e0d64800 R11: 0000000000000002 R12: ffff9308e5ff6e70 [ 9890.526308] R13: ffff930952500e20 R14: ffff9309192a8c00 R15: 0000000000000000 [ 9890.526313] FS: 0000000000000000(0000) GS:ffff930b4e700000(0000) knlGS:0000000000000000 [ 9890.526316] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 9890.526318] CR2: 0000000000000000 CR3: 0000000391c58005 CR4: 00000000001706f0 [ 9890.526321] Call Trace: [ 9890.526324] <TASK> [ 9890.526327] ? show_regs (arch/x86/kernel/dumpstack.c:479) [ 9890.526335] ? __die (arch/x86/kernel/dumpstack.c:421 arch/x86/kernel/dumpstack.c:434) [ 9890.526340] ? page_fault_oops (arch/x86/mm/fault.c:713) [ 9890.526347] ? search_module_extables (kernel/module/main.c:3256 (discriminator ---truncated---[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43911&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H']5.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43911']CVE-2024-43911[/URL]
[URL='https://git.kernel.org/stable/c/021d53a3d87eeb9dbba524ac515651242a2a7e3b']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/a5594c1e03b0df3908b1e1202a1ba34422eed0f6']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]linux -- linux_kernel
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: bnxt_en : Fix memory out-of-bounds in bnxt_fill_hw_rss_tbl() A recent commit has modified the code in __bnxt_reserve_rings() to set the default RSS indirection table to default only when the number of RX rings is changing. While this works for newer firmware that requires RX ring reservations, it causes the regression on older firmware not requiring RX ring resrvations (BNXT_NEW_RM() returns false). With older firmware, RX ring reservations are not required and so hw_resc->resv_rx_rings is not always set to the proper value. The comparison: if (old_rx_rings != bp->hw_resc.resv_rx_rings) in __bnxt_reserve_rings() may be false even when the RX rings are changing. This will cause __bnxt_reserve_rings() to skip setting the default RSS indirection table to default to match the current number of RX rings. This may later cause bnxt_fill_hw_rss_tbl() to use an out-of-range index. We already have bnxt_check_rss_tbl_no_rmgr() to handle exactly this scenario. We just need to move it up in bnxt_need_reserve_rings() to be called unconditionally when using older firmware. Without the fix, if the TX rings are changing, we'll skip the bnxt_check_rss_tbl_no_rmgr() call and __bnxt_reserve_rings() may also skip the bnxt_set_dflt_rss_indir_tbl() call for the reason explained in the last paragraph. Without setting the default RSS indirection table to default, it causes the regression: BUG: KASAN: slab-out-of-bounds in __bnxt_hwrm_vnic_set_rss+0xb79/0xe40 Read of size 2 at addr ffff8881c5809618 by task ethtool/31525 Call Trace: __bnxt_hwrm_vnic_set_rss+0xb79/0xe40 bnxt_hwrm_vnic_rss_cfg_p5+0xf7/0x460 __bnxt_setup_vnic_p5+0x12e/0x270 __bnxt_open_nic+0x2262/0x2f30 bnxt_open_nic+0x5d/0xf0 ethnl_set_channels+0x5d4/0xb30 ethnl_default_set_doit+0x2f1/0x620[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-44933&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H']5.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44933']CVE-2024-44933[/URL]
[URL='https://git.kernel.org/stable/c/abd573e9ad2ba64eaa6418a5f4eec819de28f205']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/da03f5d1b2c319a2b74fe76edeadcd8fa5f44376']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]linux -- linux_kernel
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: sctp: Fix null-ptr-deref in reuseport_add_sock(). syzbot reported a null-ptr-deref while accessing sk2->sk_reuseport_cb in reuseport_add_sock(). [0] The repro first creates a listener with SO_REUSEPORT. Then, it creates another listener on the same port and concurrently closes the first listener. The second listen() calls reuseport_add_sock() with the first listener as sk2, where sk2->sk_reuseport_cb is not expected to be cleared concurrently, but the close() does clear it by reuseport_detach_sock(). The problem is SCTP does not properly synchronise reuseport_alloc(), reuseport_add_sock(), and reuseport_detach_sock(). The caller of reuseport_alloc() and reuseport_{add,detach}_sock() must provide synchronisation for sockets that are classified into the same reuseport group. Otherwise, such sockets form multiple identical reuseport groups, and all groups except one would be silently dead. 1. Two sockets call listen() concurrently 2. No socket in the same group found in sctp_ep_hashtable[] 3. Two sockets call reuseport_alloc() and form two reuseport groups 4. Only one group hit first in __sctp_rcv_lookup_endpoint() receives incoming packets Also, the reported null-ptr-deref could occur. TCP/UDP guarantees that would not happen by holding the hash bucket lock. Let's apply the locking strategy to __sctp_hash_endpoint() and __sctp_unhash_endpoint(). [0]: Oops: general protection fault, probably for non-canonical address 0xdffffc0000000002: 0000 [#1] PREEMPT SMP KASAN PTI KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017] CPU: 1 UID: 0 PID: 10230 Comm: syz-executor119 Not tainted 6.10.0-syzkaller-12585-g301927d2d2eb #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 RIP: 0010:reuseport_add_sock+0x27e/0x5e0 net/core/sock_reuseport.c:350 Code: 00 0f b7 5d 00 bf 01 00 00 00 89 de e8 1b a4 ff f7 83 fb 01 0f 85 a3 01 00 00 e8 6d a0 ff f7 49 8d 7e 12 48 89 f8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 0f 85 4b 02 00 00 41 0f b7 5e 12 49 8d 7e 14 RSP: 0018:ffffc9000b947c98 EFLAGS: 00010202 RAX: 0000000000000002 RBX: ffff8880252ddf98 RCX: ffff888079478000 RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000012 RBP: 0000000000000001 R08: ffffffff8993e18d R09: 1ffffffff1fef385 R10: dffffc0000000000 R11: fffffbfff1fef386 R12: ffff8880252ddac0 R13: dffffc0000000000 R14: 0000000000000000 R15: 0000000000000000 FS: 00007f24e45b96c0(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffcced5f7b8 CR3: 00000000241be000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <TASK> __sctp_hash_endpoint net/sctp/input.c:762 [inline] sctp_hash_endpoint+0x52a/0x600 net/sctp/input.c:790 sctp_listen_start net/sctp/socket.c:8570 [inline] sctp_inet_listen+0x767/0xa20 net/sctp/socket.c:8625 __sys_listen_socket net/socket.c:1883 [inline] __sys_listen+0x1b7/0x230 net/socket.c:1894 __do_sys_listen net/socket.c:1902 [inline] __se_sys_listen net/socket.c:1900 [inline] __x64_sys_listen+0x5a/0x70 net/socket.c:1900 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f24e46039b9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 91 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f24e45b9228 EFLAGS: 00000246 ORIG_RAX: 0000000000000032 RAX: ffffffffffffffda RBX: 00007f24e468e428 RCX: 00007f24e46039b9 RDX: 00007f24e46039b9 RSI: 0000000000000003 RDI: 0000000000000004 RBP: 00007f24e468e420 R08: 00007f24e45b96c0 R09: 00007f24e45b96c0 R10: 00007f24e45b96c0 R11: 0000000000000246 R12: 00007f24e468e42c R13: ---truncated---[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-44935&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H']5.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44935']CVE-2024-44935[/URL]
[URL='https://git.kernel.org/stable/c/05e4a0fa248240efd99a539853e844f0f0a9e6a5']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/1407be30fc17eff918a98e0a990c0e988f11dc84']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/52319d9d2f522ed939af31af70f8c3a0f0f67e6c']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/54b303d8f9702b8ab618c5032fae886b16356928']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/9ab0faa7f9ffe31296dbb9bbe6f76c72c14eea18']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/c9b3fc4f157867e858734e31022ebee8a24f0de7']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/e809a84c802377ef61525a298a1ec1728759b913']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]linux -- linux_kernel
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: platform/x86: intel-vbtn: Protect ACPI notify handler against recursion Since commit e2ffcda16290 ("ACPI: OSL: Allow Notify () handlers to run on all CPUs") ACPI notify handlers like the intel-vbtn notify_handler() may run on multiple CPU cores racing with themselves. This race gets hit on Dell Venue 7140 tablets when undocking from the keyboard, causing the handler to try and register priv->switches_dev twice, as can be seen from the dev_info() message getting logged twice: [ 83.861800] intel-vbtn INT33D6:00: Registering Intel Virtual Switches input-dev after receiving a switch event [ 83.861858] input: Intel Virtual Switches as /devices/pci0000:00/0000:00:1f.0/PNP0C09:00/INT33D6:00/input/input17 [ 83.861865] intel-vbtn INT33D6:00: Registering Intel Virtual Switches input-dev after receiving a switch event After which things go seriously wrong: [ 83.861872] sysfs: cannot create duplicate filename '/devices/pci0000:00/0000:00:1f.0/PNP0C09:00/INT33D6:00/input/input17' ... [ 83.861967] kobject: kobject_add_internal failed for input17 with -EEXIST, don't try to register things with the same name in the same directory. [ 83.877338] BUG: kernel NULL pointer dereference, address: 0000000000000018 ... Protect intel-vbtn notify_handler() from racing with itself with a mutex to fix this.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-44937&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H']5.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44937']CVE-2024-44937[/URL]
[URL='https://git.kernel.org/stable/c/5c9618a3b6ea94cf7bdff7702aca8bf2d777d97b']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/e075c3b13a0a142dcd3151b25d29a24f31b7b640']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]MagePeople Team--Taxi Booking Manager for WooCommerce
[/TD]
[TD]Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in MagePeople Team Taxi Booking Manager for WooCommerce allows Stored XSS.This issue affects Taxi Booking Manager for WooCommerce: through 1.0.9.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43986&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L']5.9[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43986']CVE-2024-43986[/URL]
[URL='https://patchstack.com/database/vulnerability/ecab-taxi-booking-manager/wordpress-e-cab-taxi-booking-manager-plugin-1-0-9-cross-site-scripting-xss-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]master-nan--Sweet-CMS
[/TD]
[TD]A vulnerability was found in master-nan Sweet-CMS up to 5f441e022b8876f07cde709c77b5be6d2f262e3f. It has been declared as critical. This vulnerability affects unknown code of the file /table/index. The manipulation leads to sql injection. The attack can be initiated remotely. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The name of the patch is 146359646a5a90cb09156dbd0013b7df77f2aa6c. It is recommended to apply a patch to fix this issue.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8332&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L']6.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8332']CVE-2024-8332[/URL]
[URL='https://github.com/master-nan/sweet-cms/commit/146359646a5a90cb09156dbd0013b7df77f2aa6c'][email protected][/URL]
[URL='https://github.com/master-nan/sweet-cms/issues/1'][email protected][/URL]
[URL='https://github.com/master-nan/sweet-cms/issues/2'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.276208'][email protected][/URL]
[URL='https://vuldb.com/?id.276208'][email protected][/URL]
[URL='https://vuldb.com/?submit.398803'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]master-nan--Sweet-CMS
[/TD]
[TD]A vulnerability was found in master-nan Sweet-CMS up to 5f441e022b8876f07cde709c77b5be6d2f262e3f. It has been rated as problematic. This issue affects the function LogHandler of the file middleware/log.go. The manipulation leads to improper output neutralization for logs. The attack may be initiated remotely. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The identifier of the patch is 2024c370e6c78b07b358c9d4257fa5d1be732c38. It is recommended to apply a patch to fix this issue.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8334&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N']4.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8334']CVE-2024-8334[/URL]
[URL='https://github.com/master-nan/sweet-cms/commit/2024c370e6c78b07b358c9d4257fa5d1be732c38'][email protected][/URL]
[URL='https://github.com/master-nan/sweet-cms/issues/3'][email protected][/URL]
[URL='https://github.com/master-nan/sweet-cms/issues/3#issuecomment-2314447003'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.276209'][email protected][/URL]
[URL='https://vuldb.com/?id.276209'][email protected][/URL]
[URL='https://vuldb.com/?submit.398805'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]matter-labs--era-compiler-solidity
[/TD]
[TD]zksolc is a Solidity compiler for ZKsync. All LLVM versions since 2015 fold [ICODE](xor (shl 1, x), -1)[/ICODE] to [ICODE](rotl ~1, x)[/ICODE] if run with optimizations enabled. Here [ICODE]~1[/ICODE] is generated as an unsigned 64 bits number ([ICODE]2^64-1[/ICODE]). This number is zero-extended to 256 bits on EraVM target while it should have been sign-extended. Thus instead of producing [ICODE]roti 2^256 - 1, x[/ICODE] the compiler produces [ICODE]rotl 2^64 - 1, x[/ICODE]. Analysis has shown that no contracts were affected by the date of publishing this advisory. This issue has been addressed in version 1.5.3. Users are advised to upgrade and redeploy all contracts. There are no known workarounds for this vulnerability.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-45056&vector=CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N']5.9[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-45056']CVE-2024-45056[/URL]
[URL='https://github.com/llvm/llvm-project/commit/e48237df95b49a36b8ffceb78c8a58f4be1b4344'][email protected][/URL]
[URL='https://github.com/matter-labs/era-compiler-solidity/security/advisories/GHSA-fpx7-8vc6-frjj'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]maxfoundry--Media Library Folders
[/TD]
[TD]The Media Library Folders plugin for WordPress is vulnerable to unauthorized access due to missing capability checks on several AJAX functions in the media-library-plus.php file in all versions up to, and including, 8.2.3. This makes it possible for authenticated attackers, with subscriber-level access and above, to perform several actions related to managing media files and folder along with controlling settings.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-7858&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L']6.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-7858']CVE-2024-7858[/URL]
[URL='https://plugins.trac.wordpress.org/browser/media-library-plus/trunk/media-library-plus.php'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3143036%40media-library-plus&new=3143036%40media-library-plus&sfp_email=&sfph_mail='][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/fcc0fc00-b7d6-429c-9ab3-f08971c48777?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]mbis--Permalink Manager Lite
[/TD]
[TD]The Permalink Manager Lite plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'debug_data', 'debug_query', and 'debug_redirect' functions in all versions up to, and including, 2.4.4. This makes it possible for unauthenticated attackers to extract sensitive data including password, title, and content of password-protected posts.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8195&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N']5.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8195']CVE-2024-8195[/URL]
[URL='https://plugins.trac.wordpress.org/browser/permalink-manager/tags/2.4.4/includes/core/permalink-manager-debug.php#L70'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/changeset/3142479/'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/aadf1d59-60ba-4da2-adbb-4e84d587a34d?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Mediavine--Create by Mediavine
[/TD]
[TD]Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Mediavine Create by Mediavine.This issue affects Create by Mediavine: from n/a through 1.9.8.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43264&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N']5.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43264']CVE-2024-43264[/URL]
[URL='https://patchstack.com/database/vulnerability/mediavine-create/wordpress-create-by-mediavine-plugin-1-9-7-sensitive-data-exposure-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]MemberPress--Memberpress
[/TD]
[TD]The Memberpress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'mepr_screenname' and 'mepr_key' parameter in all versions up to, and including, 1.11.29 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-5024&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-5024']CVE-2024-5024[/URL]
[URL='https://memberpress.com/change-log/#1.11.30'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/718d12fe-31e4-4fa1-ba9a-8626df8ddbfe?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Michael Leithold--DSGVO All in one for WP
[/TD]
[TD]Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Michael Leithold DSGVO All in one for WP allows Stored XSS.This issue affects DSGVO All in one for WP: from n/a through 4.5.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43964&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L']6.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43964']CVE-2024-43964[/URL]
[URL='https://patchstack.com/database/vulnerability/dsgvo-all-in-one-for-wp/wordpress-dsgvo-all-in-one-for-wp-plugin-4-5-cross-site-scripting-xss-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]mihail-barinov--Share This Image
[/TD]
[TD]The Share This Image plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'alignment' parameter in all versions up to, and including, 2.01 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.[/TD]
[TD]2024-08-31[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8108&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N']6.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8108']CVE-2024-8108[/URL]
[URL='https://plugins.trac.wordpress.org/browser/share-this-image/tags/2.01/includes/modules/gutenberg/class-sti-gutenberg-init.php#L127'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/browser/share-this-image/tags/2.01/includes/modules/gutenberg/sti-gutenberg-buttons.js#L146'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/browser/share-this-image/tags/2.01/includes/modules/gutenberg/sti-gutenberg-buttons.js#L42'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/changeset/3144334/'][email protected][/URL]
[URL='https://wordpress.org/plugins/share-this-image/#developers'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/5cb5368f-99b1-43e3-a2e4-67e90c8edfcf?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]mollieintegration--Mollie Payments for WooCommerce
[/TD]
[TD]The Mollie Payments for WooCommerce plugin for WordPress is vulnerable to information exposure in all versions up to, and including, 7.7.0. This is due to the error reporting being enabled by default in multiple plugin files. This makes it possible for unauthenticated attackers to obtain the full path to instances, which they may be able to use in combination with other vulnerabilities or to simplify reconnaissance work. On its own, this information is of very limited use.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-6448&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N']5.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-6448']CVE-2024-6448[/URL]
[URL='https://plugins.trac.wordpress.org/browser/mollie-payments-for-woocommerce/tags/7.5.5/vendor/mollie/mollie-api-php/examples/initialize.php#L5'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3142176%40mollie-payments-for-woocommerce&new=3142176%40mollie-payments-for-woocommerce&sfp_email=&sfph_mail='][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/0c98026c-28a9-4c69-9f34-4c3bd4f75d85?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]mongodb -- mongodb
[/TD]
[TD]In certain highly specific configurations of the host system and MongoDB server binary installation on Linux Operating Systems, it may be possible for a unintended actor with host-level access to cause the MongoDB Server binary to load unintended actor-controlled shared libraries when the server binary is started, potentially resulting in the unintended actor gaining full control over the MongoDB server process. This issue affects MongoDB Server v5.0 versions prior to 5.0.14 and MongoDB Server v6.0 versions prior to 6.0.3. Required Configuration: Only environments with Linux as the underlying operating system is affected by this issue[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8207&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H']6.7[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8207']CVE-2024-8207[/URL]
[URL='https://jira.mongodb.org/browse/SERVER-69507'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]msaari--Relevanssi Live Ajax Search
[/TD]
[TD]The Relevanssi Live Ajax Search plugin for WordPress is vulnerable to argument injection in all versions up to, and including, 2.4. This is due to insufficient validation of input supplied via POST data in the 'search' function. This makes it possible for unauthenticated attackers to inject arbitrary arguments into a WP_Query query and potentially expose sensitive information such as attachments or private posts.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-7573&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N']5.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-7573']CVE-2024-7573[/URL]
[URL='https://plugins.trac.wordpress.org/changeset/3135074/relevanssi-live-ajax-search'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/bbcb648a-4a3e-4645-bd62-4415b1cf6516?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]MuffinGroup--Betheme
[/TD]
[TD]The Betheme theme for WordPress is vulnerable to Stored Cross-Site Scripting via several of the plugin's shortcodes in all versions up to, and including, 27.5.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-3998&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N']6.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-3998']CVE-2024-3998[/URL]
[URL='https://themeforest.net/item/betheme-responsive-multipurpose-wordpress-theme/7758048'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/5b655b04-1f2f-4745-8237-7ef3f8e31ace?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]myCred--myCred
[/TD]
[TD]Missing Authorization vulnerability in myCred.This issue affects myCred: from n/a through 2.7.2.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43214&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N']5.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43214']CVE-2024-43214[/URL]
[URL='https://patchstack.com/database/vulnerability/mycred/wordpress-mycred-plugin-2-7-2-sensitive-data-exposure-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--jpress
[/TD]
[TD]A vulnerability has been found in jpress up to 5.1.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/template/edit of the component Template Module Handler. The manipulation leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8304&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L']4.7[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8304']CVE-2024-8304[/URL]
[URL='https://github.com/JPressProjects/jpress/issues/189'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.276079'][email protected][/URL]
[URL='https://vuldb.com/?id.276079'][email protected][/URL]
[URL='https://vuldb.com/?submit.396425'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]There is an Open Redirect vulnerability in Gnuboard v6.0.4 and below via the [ICODE]url[/ICODE] parameter in login path.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-39097&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-39097']CVE-2024-39097[/URL]
[URL='https://gist.github.com/Letm3through/1c7a422aa93b587fe63254e06b7f2977'][email protected][/URL]
[URL='https://github.com/gnuboard/g6/issues/582'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]openflights commit 5234b5b is vulnerable to Cross-Site Scripting (XSS) via php/trip.php[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-41345&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-41345']CVE-2024-41345[/URL]
[URL='https://github.com/jpatokal/openflights/issues/1480'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]openflights commit 5234b5b is vulnerable to Cross-Site Scripting (XSS) via php/submit.php[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-41346&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-41346']CVE-2024-41346[/URL]
[URL='https://github.com/jpatokal/openflights/issues/1479'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]openflights commit 5234b5b is vulnerable to Cross-Site Scripting (XSS) via php/settings.php[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-41347&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-41347']CVE-2024-41347[/URL]
[URL='https://github.com/jpatokal/openflights/issues/1477'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]openflights commit 5234b5b is vulnerable to Cross-Site Scripting (XSS) via php/alsearch.php[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-41348&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-41348']CVE-2024-41348[/URL]
[URL='https://github.com/jpatokal/openflights/issues/1478'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]bjyadmin commit a560fd5 is vulnerable to Cross Site Scripting (XSS) via Public/statics/umeditor1_2_3/php/imageUp.php[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-41350&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-41350']CVE-2024-41350[/URL]
[URL='https://github.com/baijunyao/thinkphp-bjyadmin'][email protected][/URL]
[URL='https://github.com/xjzzzxx/vulFound/blob/main/bjyadmin/xss2.md'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]bjyadmin commit a560fd5 is vulnerable to Cross Site Scripting (XSS) via Public/statics/umeditor1_2_3/php/getContent.php[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-41351&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-41351']CVE-2024-41351[/URL]
[URL='https://github.com/baijunyao/thinkphp-bjyadmin'][email protected][/URL]
[URL='https://github.com/xjzzzxx/vulFound/blob/main/bjyadmin/xss1.md'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]Organizr v1.90 is vulnerable to Cross Site Scripting (XSS) via api.php.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-41371&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-41371']CVE-2024-41371[/URL]
[URL='https://github.com/causefx/Organizr'][email protected][/URL]
[URL='https://github.com/causefx/Organizr/issues/1997'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]A Stored Cross Site Scripting (XSS) vulnerability was found in "/music/ajax.php?action=save_playlist" in Kashipara Music Management System v1.0. This vulnerability allows remote attackers to execute arbitrary code via "title" & "description" parameter fields.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-42787&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-42787']CVE-2024-42787[/URL]
[URL='https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Stored%20XSS%20-%20Add%20Playlist.pdf'][email protected][/URL]
[URL='https://www.kashipara.com/project/php/12978/music-management-system-in-php-php-project-source-code'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]A Stored Cross Site Scripting (XSS) vulnerability was found in "/music/ajax.php?action=save_music" in Kashipara Music Management System v1.0. This vulnerability allows remote attackers to execute arbitrary code via "title" & "artist" parameter fields.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-42788&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-42788']CVE-2024-42788[/URL]
[URL='https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Stored%20XSS%20-%20Add%20New%20Music%20List.pdf'][email protected][/URL]
[URL='https://www.kashipara.com/project/php/12978/music-management-system-in-php-php-project-source-code'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]A Reflected Cross Site Scripting (XSS) vulnerability was found in "/music/controller.php?page=test" in Kashipara Music Management System v1.0. This vulnerability allows remote attackers to execute arbitrary code via the "page" parameter.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-42789&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N']6.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-42789']CVE-2024-42789[/URL]
[URL='https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Reflected%20XSS%20-%20Controller.pdf'][email protected][/URL]
[URL='https://www.kashipara.com/project/php/12978/music-management-system-in-php-php-project-source-code'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]A Reflected Cross Site Scripting (XSS) vulnerability was found in "/music/index.php?page=test" in Kashipara Music Management System v1.0. This vulnerability allows remote attackers to execute arbitrary code via the "page" parameter.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-42790&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-42790']CVE-2024-42790[/URL]
[URL='https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Reflected%20XSS%20-%20index.pdf'][email protected][/URL]
[URL='https://www.kashipara.com/project/php/12978/music-management-system-in-php-php-project-source-code'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]A cross-site scripting (XSS) vulnerability in the Create Product function of fastapi-admin pro v0.1.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Product Name parameter.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-42816&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-42816']CVE-2024-42816[/URL]
[URL='https://fastapi-admin-pro.long2ice.io/admin/login'][email protected][/URL]
[URL='https://github.com/fastapi-admin/fastapi-admin/issues/172'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]A cross-site scripting (XSS) vulnerability in the Config-Create function of fastapi-admin pro v0.1.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Product Name parameter.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-42818&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-42818']CVE-2024-42818[/URL]
[URL='https://fastapi-admin-pro.long2ice.io/admin/login'][email protected][/URL]
[URL='https://github.com/fastapi-admin/fastapi-admin/issues/172'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]Ruoyi v4.7.9 and before was discovered to contain a cross-site scripting (XSS) vulnerability via the sql parameter of the createTable() function at /tool/gen/create.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-42900&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-42900']CVE-2024-42900[/URL]
[URL='https://g03m0n.github.io/posts/cve-2024-42900/'][email protected][/URL]
[URL='https://gitee.com/y_project/RuoYi'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]A cross-site scripting (XSS) vulnerability in the component /managers/multiple_freeleech.php of Gazelle commit 63b3370 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the torrents parameter.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-44793&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44793']CVE-2024-44793[/URL]
[URL='http://gazelle.com'][email protected][/URL]
[URL='https://github.com/WhatCD/Gazelle'][email protected][/URL]
[URL='https://github.com/WhatCD/Gazelle/issues/131'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]A cross-site scripting (XSS) vulnerability in the component /master/auth/OnedriveRedirect.php of PicUploader commit fcf82ea allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the error_description parameter.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-44794&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44794']CVE-2024-44794[/URL]
[URL='http://picuploader.com'][email protected][/URL]
[URL='https://github.com/xiebruce/PicUploader'][email protected][/URL]
[URL='https://github.com/xiebruce/PicUploader/issues/91'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]A cross-site scripting (XSS) vulnerability in the component /login/disabled.php of Gazelle commit 63b3370 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the username parameter.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-44795&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44795']CVE-2024-44795[/URL]
[URL='http://gazelle.com'][email protected][/URL]
[URL='https://github.com/WhatCD/Gazelle'][email protected][/URL]
[URL='https://github.com/WhatCD/Gazelle/issues/129'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]A cross-site scripting (XSS) vulnerability in the component /managers/enable_requests.php of Gazelle commit 63b3370 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the view parameter.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-44797&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']5.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44797']CVE-2024-44797[/URL]
[URL='http://gazelle.com'][email protected][/URL]
[URL='https://github.com/WhatCD/Gazelle'][email protected][/URL]
[URL='https://github.com/WhatCD/Gazelle/issues/130'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]A cross-site scripting (XSS) vulnerability in the component admin_ads.php of SeaCMS v12.9 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the ad description parameter.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-44919&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']5.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44919']CVE-2024-44919[/URL]
[URL='https://github.com/nn0nkey/nn0nkey/blob/main/CVE-2024-44919.md'][email protected][/URL]
[URL='https://github.com/nn0nkey/nn0nkey/blob/main/second.md'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]EMI v.1.1.10 and before, fixed in v.1.1.11, contains an Improper Validation of Specified Index, Position, or Offset in Input vulnerability. The specific issue is a failure to validate slot index and decrement stack count in EMI mod for Minecraft, which allows in-game item duplication.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-41564&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N']4.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-41564']CVE-2024-41564[/URL]
[URL='https://gist.github.com/apple502j/6d691b62c37fc37b03b0784917064df6'][email protected][/URL]
[URL='https://github.com/emilyploszaj/emi/blob/1.21/xplat/src/main/java/dev/emi/emi/network/FillRecipeC2SPacket.java'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]JustEnoughItems (JEI) 19.5.0.33 and before contains an Improper Validation of Specified Index, Position, or Offset in Input vulnerability. The specific issue is a failure to validate slot index in JEI for Minecraft, which allows in-game item duplication.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-41565&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N']4.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-41565']CVE-2024-41565[/URL]
[URL='https://gist.github.com/apple502j/05123abb1d1c89c31afde15a9b34e2ae'][email protected][/URL]
[URL='https://github.com/mezz/JustEnoughItems/commit/99ff43ba1009c44c6d935e2ab8a6c9292bb12873'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]Roughly Enough Items (REI) v.16.0.729 and before contains an Improper Validation of Specified Index, Position, or Offset in Input vulnerability. The specific issue is a failure to validate slot index and decrement stack count in the Roughly Enough Items (REI) mod for Minecraft, which allows in-game item duplication.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-42698&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N']4.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-42698']CVE-2024-42698[/URL]
[URL='https://gist.github.com/apple502j/7b1af0082449c9bfbf910e9a25ef3595'][email protected][/URL]
[URL='https://github.com/shedaniel/RoughlyEnoughItems/commit/e80ca84f1affb91d2388ddb298bfc6b141828cad'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]TestLink before v.1.9.20 is vulnerable to Cross Site Scripting (XSS) via the pop-up on upload file. When uploading a file, the XSS payload can be entered into the file name.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-42906&vector=CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L']4.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-42906']CVE-2024-42906[/URL]
[URL='https://github.com/Alkatraz97/CVEs/blob/main/CVE-2024-42906.md'][email protected][/URL]
[URL='https://testlink.org/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Naiche--Dark Mode for WP Dashboard
[/TD]
[TD]Cross-Site Request Forgery (CSRF) vulnerability in Naiche Dark Mode for WP Dashboard.This issue affects Dark Mode for WP Dashboard: from n/a through 1.2.3.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43325&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N']4.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43325']CVE-2024-43325[/URL]
[URL='https://patchstack.com/database/vulnerability/dark-mode-for-wp-dashboard/wordpress-dark-mode-for-wp-dashboard-plugin-1-2-3-cross-site-request-forgery-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]nextbricks -- bricksore
[/TD]
[TD]Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Nextbricks Brickscore allows Stored XSS.This issue affects Brickscore: from n/a through 1.4.2.5.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43950&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43950']CVE-2024-43950[/URL]
[URL='https://patchstack.com/database/vulnerability/brickscore/wordpress-brickscore-plugin-1-4-2-5-cross-site-scripting-xss-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]NitroPack Inc.--NitroPack
[/TD]
[TD]Improper Control of Generation of Code ('Code Injection') vulnerability in NitroPack Inc. NitroPack allows Code Injection.This issue affects NitroPack: from n/a through 1.16.7.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43922&vector=CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N']4.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43922']CVE-2024-43922[/URL]
[URL='https://patchstack.com/database/vulnerability/nitropack/wordpress-nitropack-plugin-1-16-7-unauthenticated-arbitrary-shortcode-execution-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Nouthemes--Leopard - WordPress offload media
[/TD]
[TD]Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Nouthemes Leopard - WordPress offload media.This issue affects Leopard - WordPress offload media: from n/a through 2.0.36.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43257&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N']6.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43257']CVE-2024-43257[/URL]
[URL='https://patchstack.com/database/vulnerability/leopard-wordpress-offload-media/wordpress-leopard-wordpress-offload-media-plugin-2-0-36-subscriber-sensitive-data-exposure-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]NVIDIA--CUDA Toolkit
[/TD]
[TD]NVIDIA CUDA Toolkit contains a vulnerability in command [ICODE]cuobjdump[/ICODE] where a user may cause an out-of-bound write by passing in a malformed ELF file. A successful exploit of this vulnerability may lead to code execution or denial of service.[/TD]
[TD]2024-08-31[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-0110&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N']4.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-0110']CVE-2024-0110[/URL]
[URL='https://nvidia.custhelp.com/app/answers/detail/a_id/5564'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]NVIDIA--CUDA Toolkit
[/TD]
[TD]NVIDIA CUDA Toolkit contains a vulnerability in command 'cuobjdump' where a user may cause a crash or produce incorrect output by passing a malformed ELF file. A successful exploit of this vulnerability may lead to a limited denial of service or data tampering.[/TD]
[TD]2024-08-31[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-0111&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L']4.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-0111']CVE-2024-0111[/URL]
[URL='https://nvidia.custhelp.com/app/answers/detail/a_id/5564'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]open-telemetry--opentelemetry-collector-contrib
[/TD]
[TD]The OpenTelemetry Collector module AWS firehose receiver is for ingesting AWS Kinesis Data Firehose delivery stream messages and parsing the records received based on the configured record type. [ICODE]awsfirehosereceiver[/ICODE] allows unauthenticated remote requests, even when configured to require a key. OpenTelemetry Collector can be configured to receive CloudWatch metrics via an AWS Firehose Stream. Firehose sets the header [ICODE]X-Amz-Firehose-Access-Key[/ICODE] with an arbitrary configured string. The OpenTelemetry Collector awsfirehosereceiver can optionally be configured to require this key on incoming requests. However, when this is configured it [B]still accepts incoming requests with no key[/B]. Only OpenTelemetry Collector users configured with the "alpha" [ICODE]awsfirehosereceiver[/ICODE] module are affected. This module was added in version v0.49.0 of the "Contrib" distribution (or may be included in custom builds). There is a risk of unauthorized users writing metrics. Carefully crafted metrics could hide other malicious activity. There is no risk of exfiltrating data. It's likely these endpoints will be exposed to the public internet, as Firehose does not support private HTTP endpoints. A fix was introduced in PR #34847 and released with v0.108.0. All users are advised to upgrade. There are no known workarounds for this vulnerability.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-45043&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N']5.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-45043']CVE-2024-45043[/URL]
[URL='https://docs.aws.amazon.com/firehose/latest/dev/controlling-access.html#using-iam-http'][email protected][/URL]
[URL='https://docs.aws.amazon.com/firehose/latest/dev/httpdeliveryrequestresponse.html'][email protected][/URL]
[URL='https://github.com/open-telemetry/opentelemetry-collector#alpha'][email protected][/URL]
[URL='https://github.com/open-telemetry/opentelemetry-collector-contrib/pull/34847'][email protected][/URL]
[URL='https://github.com/open-telemetry/opentelemetry-collector-contrib/security/advisories/GHSA-prf6-xjxh-p698'][email protected][/URL]
[URL='https://github.com/open-telemetry/opentelemetry-collector-contrib/tree/main/receiver/awsfirehosereceiver'][email protected][/URL]
[URL='https://github.com/open-telemetry/opentelemetry-collector-releases/pull/74'][email protected][/URL]
[URL='https://github.com/open-telemetry/opentelemetry-collector-releases/releases/tag/v0.108.0'][email protected][/URL]
[URL='https://github.com/open-telemetry/opentelemetry-collector-releases/tree/main/distributions/otelcol-contrib'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]OpenRapid--RapidCMS
[/TD]
[TD]A vulnerability was found in OpenRapid RapidCMS up to 1.3.1. It has been classified as critical. This affects an unknown part of the file /admin/user/user-move-run.php. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8331&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L']6.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8331']CVE-2024-8331[/URL]
[URL='https://gitee.com/A0kooo/cve_article/blob/master/RapidCMS/SQL%20injection1/rapidcms%20user-move-run.php%20SQL%20injection.md'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.276207'][email protected][/URL]
[URL='https://vuldb.com/?id.276207'][email protected][/URL]
[URL='https://vuldb.com/?submit.398769'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]OpenRapid--RapidCMS
[/TD]
[TD]A vulnerability classified as critical has been found in OpenRapid RapidCMS up to 1.3.1. Affected is an unknown function of the file /resource/runlogon.php. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8335&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L']6.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8335']CVE-2024-8335[/URL]
[URL='https://gitee.com/A0kooo/cve_article/blob/master/RapidCMS/SQL%20injection2/rapidcms%20runlogon.php%20SQL%20injection.md'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.276210'][email protected][/URL]
[URL='https://vuldb.com/?id.276210'][email protected][/URL]
[URL='https://vuldb.com/?submit.399005'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]OpenText--NetIQ Access Manager
[/TD]
[TD]Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in OpenText NetIQ Access Manager allows access the sensitive information. This issue affects NetIQ Access Manager before 5.0.4 and before 5.1.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-4556&vector=CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N']5.7[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-4556']CVE-2024-4556[/URL]
[URL='https://www.microfocus.com/documentation/access-manager/5.0/accessmanager504-p1-release-notes/accessmanager504-p1-release-notes.html'][email protected][/URL]
[URL='https://www.microfocus.com/documentation/access-manager/5.1/accessmanager51-release-notes/accessmanager51-release-notes.html'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]OpenText--NetIQ Advance Authentication
[/TD]
[TD]A vulnerability identified in NetIQ Advance Authentication that leaks sensitive server information. This issue affects NetIQ Advance Authentication version before 6.3.5.1[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2021-22529&vector=CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H']6.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-22529']CVE-2021-22529[/URL]
[URL='https://www.netiq.com/documentation/advanced-authentication-63/advanced-authentication-releasenotes-6351/data/advanced-authentication-releasenotes-6351.html'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]OpenText--NetIQ Advance Authentication
[/TD]
[TD]A Cross-Site Scripting vulnerable identified in NetIQ Advance Authentication that impacts the server functionality and disclose sensitive information. This issue affects NetIQ Advance Authentication before 6.3.5.1[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2021-38122&vector=CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:L/A:N']6.2[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-38122']CVE-2021-38122[/URL]
[URL='https://www.netiq.com/documentation/advanced-authentication-63/advanced-authentication-releasenotes-6351/data/advanced-authentication-releasenotes-6351.html'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]OpenText--NetIQ Advance Authentication
[/TD]
[TD]A vulnerability identified in Advance Authentication that allows bash command Injection in administrative controlled functionality of backup due to improper handling in provided command parameters. This issue affects NetIQ Advance Authentication version before 6.3.5.1.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2021-38120&vector=CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:L']5.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-38120']CVE-2021-38120[/URL]
[URL='https://www.netiq.com/documentation/advanced-authentication-63/advanced-authentication-releasenotes-6351/data/advanced-authentication-releasenotes-6351.html'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]OpenZeppelin--cairo-contracts
[/TD]
[TD]Cairo-Contracts are OpenZeppelin Contracts written in Cairo for Starknet, a decentralized ZK Rollup. This vulnerability can lead to unauthorized ownership transfer, contrary to the original owner's intention of leaving the contract without an owner. It introduces a security risk where an unintended party (pending owner) can gain control of the contract after the original owner has renounced ownership. This could also be used by a malicious owner to simulate leaving a contract without an owner, to later regain ownership by previously having proposed himself as a pending owner. This issue has been addressed in release version 0.16.0. All users are advised to upgrade. There are no known workarounds for this vulnerability.[/TD]
[TD]2024-08-31[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-45304&vector=CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N']5.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-45304']CVE-2024-45304[/URL]
[URL='https://github.com/OpenZeppelin/cairo-contracts/commit/ef87d7847980e0cf83f4b7f3ff23e6590fb643ec'][email protected][/URL]
[URL='https://github.com/OpenZeppelin/cairo-contracts/releases/tag/v0.16.0'][email protected][/URL]
[URL='https://github.com/OpenZeppelin/cairo-contracts/security/advisories/GHSA-w2px-25pm-2cf9'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]OTRS AG--OTRS
[/TD]
[TD]Improper Neutralization of Input done by an attacker with admin privileges ('Cross-site Scripting') in OTRS (System Configuration modules) and ((OTRS)) Community Edition allows Cross-Site Scripting (XSS) within the System Configuration targeting other admins. This issue affects: * OTRS from 7.0.X through 7.0.50 * OTRS 8.0.X * OTRS 2023.X * OTRS from 2024.X through 2024.5.X * ((OTRS)) Community Edition: 6.0.x Products based on the ((OTRS)) Community Edition also very likely to be affected[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43442&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N']4.9[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43442']CVE-2024-43442[/URL]
[URL='https://otrs.com/release-notes/otrs-security-advisory-2024-10/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]OTRS AG--OTRS
[/TD]
[TD]Improper Neutralization of Input done by an attacker with admin privileges ('Cross-site Scripting') in Process Management modules of OTRS and ((OTRS)) Community Edition allows Cross-Site Scripting (XSS) within the Process Management targeting other admins. This issue affects: * OTRS from 7.0.X through 7.0.50 * OTRS 8.0.X * OTRS 2023.X * OTRS from 2024.X through 2024.5.X * ((OTRS)) Community Edition: 6.0.x Products based on the ((OTRS)) Community Edition also very likely to be affected[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43443&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N']4.9[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43443']CVE-2024-43443[/URL]
[URL='https://otrs.com/release-notes/otrs-security-advisory-2024-11/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Oxygen Builder--Oxygen Builder
[/TD]
[TD]The Oxygen Builder plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the oxy_save_css_from_admin AJAX action in all versions up to, and including, 4.8.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update stylesheets.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-6688&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N']4.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-6688']CVE-2024-6688[/URL]
[URL='https://oxygenbuilder.com/oxygen-4-9-now-available/'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/78c88402-52ca-44ff-8767-1f843fcb66fd?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]pagebuilderaddons -- web_and_woocommerce_addons_for_wpbakery_builder
[/TD]
[TD]Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Page Builder Addons Web and WooCommerce Addons for WPBakery Builder allows Stored XSS.This issue affects Web and WooCommerce Addons for WPBakery Builder: from n/a through 1.4.6.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43960&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N']4.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43960']CVE-2024-43960[/URL]
[URL='https://patchstack.com/database/vulnerability/vc-addons-by-bit14/wordpress-web-and-woocommerce-addons-for-wpbakery-builder-plugin-1-4-6-cross-site-scripting-xss-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Passionate Programmers B.V.--WP Data Access
[/TD]
[TD]Cross-Site Request Forgery (CSRF) vulnerability in Passionate Programmers B.V. WP Data Access.This issue affects WP Data Access: from n/a through 5.5.7.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43295&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N']4.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43295']CVE-2024-43295[/URL]
[URL='https://patchstack.com/database/vulnerability/wp-data-access/wordpress-wp-data-access-plugin-5-5-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]PHPOffice--PhpSpreadsheet
[/TD]
[TD]PHPSpreadsheet is a pure PHP library for reading and writing spreadsheet files. In affected versions [ICODE]\PhpOffice\PhpSpreadsheet\Writer\Html[/ICODE] doesn't sanitize spreadsheet styling information such as font names, allowing an attacker to inject arbitrary JavaScript on the page. As a result an attacker may used a crafted spreadsheet to fully takeover a session of a user viewing spreadsheet files as HTML. This issue has been addressed in release version 2.1.0. All users are advised to upgrade. There are no known workarounds for this vulnerability.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-45046&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']5.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-45046']CVE-2024-45046[/URL]
[URL='https://github.com/PHPOffice/PhpSpreadsheet/commit/f7cf378faed2e11cf4825bf8bafea4922ae44667'][email protected][/URL]
[URL='https://github.com/PHPOffice/PhpSpreadsheet/pull/3957'][email protected][/URL]
[URL='https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-wgmf-q9vr-vww6'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]popupbuilder--Popup Builder Create highly converting, mobile friendly marketing popups.
[/TD]
[TD]The Popup Builder plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.3.3 via the Subscribers Import feature. This makes it possible for unauthenticated attackers to extract sensitive data after an administrator has imported subscribers via a CSV file. This data may include the first name, last name, e-mail address, and potentially other personally identifiable information of subscribers.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-2541&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N']5.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-2541']CVE-2024-2541[/URL]
[URL='https://plugins.trac.wordpress.org/browser/popup-builder/trunk/com/libs/Importer.php'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/086cd6a0-adb6-4e12-b34c-630297f036f3?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Progress Software Corporation--WS_FTP Server
[/TD]
[TD]In WS_FTP Server versions before 8.8.8 (2022.0.8), an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in the Web Transfer Module allows File Discovery, Probe System Files, User-Controlled Filename, Path Traversal. Â An authenticated file download flaw has been identified where a user can craft an API call that allows them to download a file from an arbitrary folder on the drive where that user host's root folder is located (by default this is C:)[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-7744&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N']6.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-7744']CVE-2024-7744[/URL]
[URL='https://community.progress.com/s/article/WS-FTP-Server-Service-Pack-August-2024'][email protected][/URL]
[URL='https://www.progress.com/ftp-server'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Progress Software Corporation--WS_FTP Server
[/TD]
[TD]In WS_FTP Server versions before 8.8.8 (2022.0.8), a Missing Critical Step in Multi-Factor Authentication of the Web Transfer Module allows users to skip the second-factor verification and log in with username and password only.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-7745&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N']6.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-7745']CVE-2024-7745[/URL]
[URL='https://community.progress.com/s/article/WS-FTP-Server-Service-Pack-August-2024'][email protected][/URL]
[URL='https://www.progress.com/ftp-server'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]ptc -- thingworx
[/TD]
[TD]An Insecure Direct Object Reference (IDOR) in PTC ThingWorx v9.5.0 allows attackers to view sensitive information, including PII, regardless of access level.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-40395&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N']6.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-40395']CVE-2024-40395[/URL]
[URL='https://pastebin.com/9dc4LYGA'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]rakuten -- ichiba
[/TD]
[TD]'Rakuten Ichiba App' for Android 12.4.0 and earlier and 'Rakuten Ichiba App' for iOS 11.7.0 and earlier are vulnerable to improper authorization in handler for custom URL scheme. An arbitrary site may be displayed on the WebView of the product via Intent from another application installed on the user's device. As a result, the user may be redirected to an unauthorized site, and the user may become a victim of a phishing attack.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-41918&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-41918']CVE-2024-41918[/URL]
[URL='https://apps.apple.com/jp/app/id419267350'][email protected][/URL]
[URL='https://jvn.jp/en/jp/JVN56648919/'][email protected][/URL]
[URL='https://play.google.com/store/apps/details?id=jp.co.rakuten.android&hl=en'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Red Hat--Red Hat Enterprise Linux 6
[/TD]
[TD]A flaw was found in libvirt. A refactor of the code fetching the list of interfaces for multiple APIs introduced a corner case on platforms where allocating 0 bytes of memory results in a NULL pointer. This corner case would lead to a NULL-pointer dereference and subsequent crash of virtinterfaced. This issue could allow clients connecting to the read-only socket to crash the virtinterfaced daemon.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8235&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H']6.2[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8235']CVE-2024-8235[/URL]
[URL='https://access.redhat.com/security/cve/CVE-2024-8235'][email protected][/URL]
[URL='https://bugzilla.redhat.com/show_bug.cgi?id=2308680'][email protected][/URL]
[URL='https://lists.libvirt.org/archives/list/[email protected]/thread/X6WOVCL6QF3FQRFIIXL736RFZVSUWLWJ/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]rems -- qr_code_attendance_system
[/TD]
[TD]A vulnerability, which was classified as problematic, has been found in SourceCodester QR Code Attendance System 1.0. This issue affects some unknown processing of the file /endpoint/delete-student.php. The manipulation of the argument student/attendance leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8172&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8172']CVE-2024-8172[/URL]
[URL='https://github.com/jadu101/CVE/blob/main/SourceCodester_QR_Code_Attendance_System_delete_attendance_XSS.md'][email protected][/URL]
[URL='https://github.com/jadu101/CVE/blob/main/SourceCodester_QR_Code_Attendance_System_delete_student_XSS.md'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.275771'][email protected][/URL]
[URL='https://vuldb.com/?id.275771'][email protected][/URL]
[URL='https://vuldb.com/?submit.397724'][email protected][/URL]
[URL='https://www.sourcecodester.com/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]restsharp--RestSharp
[/TD]
[TD]RestSharp is a Simple REST and HTTP API Client for .NET. The second argument to [ICODE]RestRequest.AddHeader[/ICODE] (the header value) is vulnerable to CRLF injection. The same applies to [ICODE]RestRequest.AddOrUpdateHeader[/ICODE] and [ICODE]RestClient.AddDefaultHeader[/ICODE]. The way HTTP headers are added to a request is via the [ICODE]HttpHeaders.TryAddWithoutValidation[/ICODE] method which does not check for CRLF characters in the header value. This means that any headers from a [ICODE]RestSharp.RequestHeaders[/ICODE] object are added to the request in such a way that they are vulnerable to CRLF-injection. In general, CRLF-injection into a HTTP header (when using HTTP/1.1) means that one can inject additional HTTP headers or smuggle whole HTTP requests. If an application using the RestSharp library passes a user-controllable value through to a header, then that application becomes vulnerable to CRLF-injection. This is not necessarily a security issue for a command line application like the one above, but if such code were present in a web application then it becomes vulnerable to request splitting (as shown in the PoC) and thus Server Side Request Forgery. Strictly speaking this is a potential vulnerability in applications using RestSharp, not in RestSharp itself, but I would argue that at the very least there needs to be a warning about this behaviour in the RestSharp documentation. RestSharp has addressed this issue in version 112.0.0. All users are advised to upgrade. There are no known workarounds for this vulnerability.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-45302&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H']6.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-45302']CVE-2024-45302[/URL]
[URL='https://github.com/restsharp/RestSharp/blob/777bf194ec2d14271e7807cc704e73ec18fcaf7e/src/RestSharp/Request/HttpRequestMessageExtensions.cs#L32'][email protected][/URL]
[URL='https://github.com/restsharp/RestSharp/commit/0fba5e727d241b1867bd71efc912594075c2934b'][email protected][/URL]
[URL='https://github.com/restsharp/RestSharp/security/advisories/GHSA-4rr6-2v9v-wcpc'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Robert Felty--Collapsing Archives
[/TD]
[TD]Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Robert Felty Collapsing Archives allows Stored XSS.This issue affects Collapsing Archives: from n/a through 3.0.5.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43934&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L']6.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43934']CVE-2024-43934[/URL]
[URL='https://patchstack.com/database/vulnerability/collapsing-archives/wordpress-collapsing-archives-plugin-3-0-5-cross-site-scripting-xss-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]ruijie -- eg2000k_firmware
[/TD]
[TD]A vulnerability has been found in Ruijie EG2000K 11.1(6)B2 and classified as critical. This vulnerability affects unknown code of the file /tool/index.php?c=download&a=save. The manipulation of the argument content leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8166&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H']4.9[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8166']CVE-2024-8166[/URL]
[URL='https://github.com/qiuhuihk/cve/blob/main/ruijie.md'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.275764'][email protected][/URL]
[URL='https://vuldb.com/?id.275764'][email protected][/URL]
[URL='https://vuldb.com/?submit.393750'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Saturday Drive--Ninja Forms
[/TD]
[TD]Cross-Site Request Forgery (CSRF) vulnerability in Saturday Drive Ninja Forms.This issue affects Ninja Forms: from n/a through 3.8.6.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-39628&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L']5.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-39628']CVE-2024-39628[/URL]
[URL='https://patchstack.com/database/vulnerability/ninja-forms/wordpress-ninja-forms-plugin-3-8-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Sender--Sender Newsletter, SMS and Email Marketing Automation for WooCommerce
[/TD]
[TD]Cross-Site Request Forgery (CSRF) vulnerability in Sender Sender - Newsletter, SMS and Email Marketing Automation for WooCommerce.This issue affects Sender - Newsletter, SMS and Email Marketing Automation for WooCommerce: from n/a through 2.6.18.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-39657&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N']4.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-39657']CVE-2024-39657[/URL]
[URL='https://patchstack.com/database/vulnerability/sender-net-automated-emails/wordpress-sender-newsletter-sms-and-email-marketing-automation-for-woocommerce-plugin-2-6-18-cross-site-request-forgery-csrf-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Shared Files File Upload Form--Shared Files
[/TD]
[TD]Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Shared Files - File Upload Form Shared Files.This issue affects Shared Files: from n/a through 1.7.28.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43230&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N']5.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43230']CVE-2024-43230[/URL]
[URL='https://patchstack.com/database/vulnerability/shared-files/wordpress-shared-files-premium-download-manager-secure-file-sharing-with-frontend-file-upload-plugin-1-7-28-sensitive-data-exposure-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Sk. Abul Hasan--Animated Number Counters
[/TD]
[TD]Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Sk. Abul Hasan Animated Number Counters allows PHP Local File Inclusion.This issue affects Animated Number Counters: from n/a through 1.9.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43957&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N']6.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43957']CVE-2024-43957[/URL]
[URL='https://patchstack.com/database/vulnerability/animated-number-counters/wordpress-animated-number-counters-plugin-1-9-editor-limited-local-file-inclusion-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]SKT Themes--SKT Blocks Gutenberg based Page Builder
[/TD]
[TD]Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in SKT Themes SKT Blocks - Gutenberg based Page Builder allows Stored XSS.This issue affects SKT Blocks - Gutenberg based Page Builder: from n/a through 1.5.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43946&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L']6.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43946']CVE-2024-43946[/URL]
[URL='https://patchstack.com/database/vulnerability/skt-blocks/wordpress-skt-blocks-plugin-1-5-cross-site-scripting-xss-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]smashballoon -- reviews_feed
[/TD]
[TD]The Reviews Feed - Add Testimonials and Customer Reviews From Google Reviews, Yelp, TripAdvisor, and More plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'update_api_key' function in all versions up to, and including, 1.1.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update API Key options.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8199&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N']4.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8199']CVE-2024-8199[/URL]
[URL='https://plugins.trac.wordpress.org/browser/reviews-feed/tags/1.1.2/class/Common/Builder/SBR_Feed_Saver_Manager.php#L699'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/changeset/3125315/'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/dc3e89e5-2e7e-497e-b340-b787ebdf3711?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]smashballoon -- reviews_feed
[/TD]
[TD]The Reviews Feed - Add Testimonials and Customer Reviews From Google Reviews, Yelp, TripAdvisor, and More plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.2. This is due to missing or incorrect nonce validation on the 'update_api_key' function. This makes it possible for unauthenticated attackers to update an API key via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8200&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N']4.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8200']CVE-2024-8200[/URL]
[URL='https://plugins.trac.wordpress.org/browser/reviews-feed/tags/1.1.2/class/Common/Builder/SBR_Feed_Saver_Manager.php#L699'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/changeset/3125315/'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/5d9e20f7-813c-4691-bce4-d0ff4774ae48?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Softaculous Team--SpeedyCache
[/TD]
[TD]Cross-Site Request Forgery (CSRF) vulnerability in Softaculous Team SpeedyCache.This issue affects SpeedyCache: from n/a through 1.1.8.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43299&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L']5.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43299']CVE-2024-43299[/URL]
[URL='https://patchstack.com/database/vulnerability/speedycache/wordpress-speedycache-plugin-1-1-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]SourceCodester--Computer Laboratory Management System
[/TD]
[TD]A vulnerability classified as critical has been found in SourceCodester Computer Laboratory Management System 1.0. Affected is the function update_settings_info of the file /classes/SystemSettings.php?f=update_settings. The manipulation of the argument name leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8346&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L']6.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8346']CVE-2024-8346[/URL]
[URL='https://github.com/gaorenyusi/gaorenyusi/blob/main/lms1.md'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.276228'][email protected][/URL]
[URL='https://vuldb.com/?id.276228'][email protected][/URL]
[URL='https://vuldb.com/?submit.400343'][email protected][/URL]
[URL='https://www.sourcecodester.com/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]SourceCodester--Computer Laboratory Management System
[/TD]
[TD]A vulnerability classified as critical was found in SourceCodester Computer Laboratory Management System 1.0. Affected by this vulnerability is the function delete_record of the file /classes/Master.php?f=delete_record. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8347&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L']6.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8347']CVE-2024-8347[/URL]
[URL='https://github.com/gaorenyusi/gaorenyusi/blob/main/lms2.md'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.276229'][email protected][/URL]
[URL='https://vuldb.com/?id.276229'][email protected][/URL]
[URL='https://vuldb.com/?submit.400373'][email protected][/URL]
[URL='https://www.sourcecodester.com/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]SourceCodester--Computer Laboratory Management System
[/TD]
[TD]A vulnerability, which was classified as critical, has been found in SourceCodester Computer Laboratory Management System 1.0. Affected by this issue is the function delete_category of the file /classes/Master.php?f=delete_category. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8348&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L']6.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8348']CVE-2024-8348[/URL]
[URL='https://github.com/gaorenyusi/gaorenyusi/blob/main/lms3.md'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.276230'][email protected][/URL]
[URL='https://vuldb.com/?id.276230'][email protected][/URL]
[URL='https://vuldb.com/?submit.400378'][email protected][/URL]
[URL='https://www.sourcecodester.com/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]SourceCodester--Electric Billing Management System
[/TD]
[TD]A vulnerability was found in SourceCodester Electric Billing Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /?page=tracks of the component Connection Code Handler. The manipulation of the argument code leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8339&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L']6.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8339']CVE-2024-8339[/URL]
[URL='https://github.com/enjoyworld/webray.com.cn/blob/main/cves/Electric%20Billing%20Management%20System/Electric%20Billing%20Managemen%20SQL-inject%20System%20tracks.php%20SQL-inject.md'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.276218'][email protected][/URL]
[URL='https://vuldb.com/?id.276218'][email protected][/URL]
[URL='https://vuldb.com/?submit.399540'][email protected][/URL]
[URL='https://www.sourcecodester.com/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]SourceCodester--Music Gallery Site
[/TD]
[TD]A vulnerability classified as critical was found in SourceCodester Music Gallery Site 1.0. Affected by this vulnerability is an unknown functionality of the file /php-music/classes/Master.php?f=delete_music. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8336&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L']6.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8336']CVE-2024-8336[/URL]
[URL='https://github.com/LiuHaoBin6/cve/blob/main/sql5.md'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.276211'][email protected][/URL]
[URL='https://vuldb.com/?id.276211'][email protected][/URL]
[URL='https://vuldb.com/?submit.399039'][email protected][/URL]
[URL='https://www.sourcecodester.com/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]SourceCodester--Music Gallery Site
[/TD]
[TD]A vulnerability was found in SourceCodester Music Gallery Site 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /classes/Users.php?f=delete. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8345&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L']6.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8345']CVE-2024-8345[/URL]
[URL='https://github.com/GAO-UNO/cve/blob/main/sql3.md'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.276224'][email protected][/URL]
[URL='https://vuldb.com/?id.276224'][email protected][/URL]
[URL='https://vuldb.com/?submit.400192'][email protected][/URL]
[URL='https://www.sourcecodester.com/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]SourceCodester--Petshop Management System
[/TD]
[TD]A vulnerability classified as critical was found in SourceCodester Petshop Management System 1.0. This vulnerability affects unknown code of the file /controllers/add_user.php. The manipulation of the argument avatar leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8341&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L']6.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8341']CVE-2024-8341[/URL]
[URL='https://github.com/enjoyworld/webray.com.cn/blob/main/cves/Petshop_Management_System/Petshop_Management_System%20add_user.php%20any%20file%20upload.md'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.276220'][email protected][/URL]
[URL='https://vuldb.com/?id.276220'][email protected][/URL]
[URL='https://vuldb.com/?submit.399661'][email protected][/URL]
[URL='https://www.sourcecodester.com/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]SourceCodester--Petshop Management System
[/TD]
[TD]A vulnerability, which was classified as critical, has been found in SourceCodester Petshop Management System 1.0. This issue affects some unknown processing of the file /controllers/add_client.php. The manipulation of the argument image_profile leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8342&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L']6.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8342']CVE-2024-8342[/URL]
[URL='https://github.com/enjoyworld/webray.com.cn/blob/main/cves/Petshop_Management_System/Petshop_Management_System%20add_client.php%20any%20file%20upload.md'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.276221'][email protected][/URL]
[URL='https://vuldb.com/?id.276221'][email protected][/URL]
[URL='https://vuldb.com/?submit.399662'][email protected][/URL]
[URL='https://www.sourcecodester.com/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Stark Digital--WP Testimonial Widget
[/TD]
[TD]Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Stark Digital WP Testimonial Widget allows Stored XSS.This issue affects WP Testimonial Widget: from n/a through 3.1.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43967&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L']5.9[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43967']CVE-2024-43967[/URL]
[URL='https://patchstack.com/database/vulnerability/wp-testimonial-widget/wordpress-wp-testimonial-widget-plugin-3-1-cross-site-scripting-xss-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Store Locator Plus--Store Locator Plus
[/TD]
[TD]Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Store Locator Plus.This issue affects Store Locator Plus: from n/a through 2311.17.01.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43258&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N']5.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43258']CVE-2024-43258[/URL]
[URL='https://patchstack.com/database/vulnerability/store-locator-le/wordpress-store-locator-plus-for-wordpress-plugin-2311-17-01-sensitive-data-exposure-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Styra--OPA
[/TD]
[TD]A SMB force-authentication vulnerability exists in all versions of OPA for Windows prior to v0.68.0. The vulnerability exists because of improper input validation, allowing a user to pass an arbitrary SMB share instead of a Rego file as an argument to OPA CLI or to one of the OPA Go library's functions.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8260&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L']6.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8260']CVE-2024-8260[/URL]
[URL='https://www.tenable.com/security/research/tra-2024-36'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]sveltejs--svelte
[/TD]
[TD]svelte performance oriented web framework. A potential mXSS vulnerability exists in Svelte for versions up to but not including 4.2.19. Svelte improperly escapes HTML on server-side rendering. The assumption is that attributes will always stay as such, but in some situation the final DOM tree rendered on browsers is different from what Svelte expects on server-side rendering. This may be leveraged to perform XSS attacks, and a type of the XSS is known as mXSS (mutation XSS). More specifically, this can occur when injecting malicious content into an attribute within a [ICODE]noscript[/ICODE] tag. This issue has been addressed in release version 4.2.19. Users are advised to upgrade. There are no known workarounds for this vulnerability.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-45047&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N']5.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-45047']CVE-2024-45047[/URL]
[URL='https://github.com/sveltejs/svelte/security/advisories/GHSA-8266-84wp-wv5c'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]tagDiv--tagDiv Composer
[/TD]
[TD]The tagDiv Composer plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'envato_code[]' parameter in all versions up to, and including, 5.0 due to insufficient input sanitization and output escaping within the on_ajax_check_envato_code function. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.[/TD]
[TD]2024-08-31[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-3886&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-3886']CVE-2024-3886[/URL]
[URL='https://tagdiv.com/newspaper/'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/ed9db9c1-c6b5-459e-9820-ec4ee47b244e?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]tagDiv--tagDiv Composer
[/TD]
[TD]The tagDiv Composer plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'envato_code[]' parameter in all versions up to, and including, 5.0 due to insufficient input sanitization and output escaping within the on_ajax_register_forum_user function. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.[/TD]
[TD]2024-08-31[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-5212&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-5212']CVE-2024-5212[/URL]
[URL='https://tagdiv.com/newspaper/'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/db95415a-5354-498b-8368-58c47d9948de?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]TeamViewer--Meeting
[/TD]
[TD]Improper access control in the clipboard synchronization feature in TeamViewer Full Client prior version 15.57 and TeamViewer Meeting prior version 15.55.3 can lead to unintentional sharing of the clipboard with the current presenter of a meeting.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-6053&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N']4.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-6053']CVE-2024-6053[/URL]
[URL='https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2024-1007/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]techjewel--Contact Form Plugin by Fluent Forms for Quiz, Survey, and Drag & Drop WP Form Builder
[/TD]
[TD]The Contact Form Plugin by Fluent Forms for Quiz, Survey, and Drag & Drop WP Form Builder plugin for WordPress is vulnerable to unauthorized Malichimp API key update due to an insufficient capability check on the verifyRequest function in all versions up to, and including, 5.1.18. This makes it possible for Form Managers with a Subscriber-level access and above to modify the Mailchimp API key used for integration. At the same time, missing Mailchimp API key validation allows the redirect of the integration requests to the attacker-controlled server.[/TD]
[TD]2024-09-01[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-5053&vector=CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N']4.2[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-5053']CVE-2024-5053[/URL]
[URL='https://plugins.trac.wordpress.org/browser/fluentform/trunk/app/Http/Policies/FormPolicy.php#L17'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/browser/fluentform/trunk/app/Http/Routes/api.php#L91'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/browser/fluentform/trunk/app/Services/Integrations/MailChimp/MailChimp.php#L40'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/8242e0f0-b9c5-46fe-b691-3275cd0f9a43?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]techjewel--Ninja Tables Easiest Data Table Builder
[/TD]
[TD]The Ninja Tables - Easiest Data Table Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 5.0.12 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-7304&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N']6.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-7304']CVE-2024-7304[/URL]
[URL='https://plugins.trac.wordpress.org/browser/ninja-tables/tags/5.0.12/app/Hooks/filters.php#L28'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/changeset/3140370/'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/changeset/3140370/#file408'][email protected][/URL]
[URL='https://wordpress.org/plugins/ninja-tables/#developers'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/b1eb6896-2de3-4d4d-9b5f-253aaffd193b?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]techlabpro1--The Post Grid Shortcode, Gutenberg Blocks and Elementor Addon for Post Grid
[/TD]
[TD]The The Post Grid - Shortcode, Gutenberg Blocks and Elementor Addon for Post Grid plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 7.7.11 via the post_query_guten and post_query functions. This makes it possible for authenticated attackers, with contributor-level access and above, to extract information from posts that are not public (i.e. draft, future, etc..).[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-7418&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N']4.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-7418']CVE-2024-7418[/URL]
[URL='https://plugins.trac.wordpress.org/changeset/3142599/the-post-grid/trunk/app/Controllers/Blocks/BlockBase.php'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/changeset/3142599/the-post-grid/trunk/app/Widgets/elementor/rtTPGElementorQuery.php'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3142599%40the-post-grid&new=3142599%40the-post-grid&sfp_email=&sfph_mail='][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/dddecb2e-9ad6-4e44-afce-5eba7da6322d?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]teldat -- rs123_firmware
[/TD]
[TD]Cross Site Scripting vulnerability in Teldats Router RS123, RS123w allows attacker to execute arbitrary code via the cmdcookie parameter to the upgrade/query.php page.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-39996&vector=CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']4.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-39996']CVE-2022-39996[/URL]
[URL='https://github.com/uyhacked/Teldat-s-Router/blob/main/Teldat'][email protected][/URL]
[URL='https://github.com/uyhacked/Teldat-s-Router/blob/main/Teldat%27s%20Router%20Vulnerability.md'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]The Tcpdump Group--libpcap
[/TD]
[TD]In affected libpcap versions during the setup of a remote packet capture the internal function sock_initaddress() calls getaddrinfo() and possibly freeaddrinfo(), but does not clearly indicate to the caller function whether freeaddrinfo() still remains to be called after the function returns. This makes it possible in some scenarios that both the function and its caller call freeaddrinfo() for the same allocated memory block. A similar problem was reported in Apple libpcap, to which Apple assigned CVE-2023-40400.[/TD]
[TD]2024-08-31[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-7256&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H']4.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-7256']CVE-2023-7256[/URL]
[URL='https://github.com/the-tcpdump-group/libpcap/commit/262e4f34979872d822ccedf9f318ed89c4d31c03'][email protected][/URL]
[URL='https://github.com/the-tcpdump-group/libpcap/commit/2aa69b04d8173b18a0e3492e0c8f2f7fabdf642d'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]The Tcpdump Group--libpcap
[/TD]
[TD]Remote packet capture support is disabled by default in libpcap. When a user builds libpcap with remote packet capture support enabled, one of the functions that become available is pcap_findalldevs_ex(). One of the function arguments can be a filesystem path, which normally means a directory with input data files. When the specified path cannot be used as a directory, the function receives NULL from opendir(), but does not check the return value and passes the NULL value to readdir(), which causes a NULL pointer derefence.[/TD]
[TD]2024-08-31[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8006&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H']4.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8006']CVE-2024-8006[/URL]
[URL='https://github.com/the-tcpdump-group/libpcap/commit/0f8a103469ce87d2b8d68c5130a46ddb7fb5eb29'][email protected][/URL]
[URL='https://github.com/the-tcpdump-group/libpcap/commit/8a633ee5b9ecd9d38a587ac9b204e2380713b0d6'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]themefic--Tourfic Ultimate Hotel Booking, Travel Booking & Apartment Booking WordPress Plugin | WooCommerce Booking
[/TD]
[TD]The Tourfic plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.11.20. This is due to missing or incorrect nonce validation on the tf_order_status_email_resend_function, tf_visitor_details_edit_function, tf_checkinout_details_edit_function, tf_order_status_edit_function, tf_order_bulk_action_edit_function, tf_remove_room_order_ids, and tf_delete_old_review_fields functions. This makes it possible for unauthenticated attackers to resend order status emails, update visitor/order details, edit check-in/out details, edit order status, perform bulk order status updates, remove room order IDs, and delete old review fields, respectively, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8319&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N']4.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8319']CVE-2024-8319[/URL]
[URL='https://plugins.trac.wordpress.org/changeset/3054266/tourfic'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/07fa7b1a-9137-4049-a20a-8eb6df7ca578?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]themeum -- droip
[/TD]
[TD]Incorrect Authorization vulnerability in Themeum Droip allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Droip: from n/a through 1.1.1.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43954&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L']6.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43954']CVE-2024-43954[/URL]
[URL='https://patchstack.com/database/vulnerability/droip/wordpress-droip-plugin-1-1-1-subscriber-settings-change-data-exposure-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Themeum--Tutor LMS
[/TD]
[TD]Cross-Site Request Forgery (CSRF) vulnerability in Themeum Tutor LMS.This issue affects Tutor LMS: from n/a through 2.7.2.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-39645&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L']5.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-39645']CVE-2024-39645[/URL]
[URL='https://patchstack.com/database/vulnerability/tutor/wordpress-tutor-lms-plugin-2-7-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]ThimPress--LearnPress
[/TD]
[TD]Cross-Site Request Forgery (CSRF) vulnerability in ThimPress LearnPress.This issue affects LearnPress: from n/a through 4.2.6.8.2.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-39641&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N']4.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-39641']CVE-2024-39641[/URL]
[URL='https://patchstack.com/database/vulnerability/learnpress/wordpress-learnpress-plugin-4-2-6-8-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Trellix--Trellix NX, EX, AX, FX, CMS and IVX
[/TD]
[TD]An authenticated user can access the restricted files from NX, EX, FX, AX, IVX and CMS using path traversal.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-7608&vector=CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H']5.9[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-7608']CVE-2024-7608[/URL]
[URL='https://thrive.trellix.com/s/article/000013844'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Unknown--Gutentor
[/TD]
[TD]The Gutentor WordPress plugin before 3.3.6 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-5417&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']5.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-5417']CVE-2024-5417[/URL]
[URL='https://wpscan.com/vulnerability/fb7d6839-9ccb-4a0f-9dca-d6841f666a1b/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Unknown--Page Builder Gutenberg Blocks
[/TD]
[TD]The Page Builder Gutenberg Blocks WordPress plugin before 3.1.13 does not escape the content of post embed via one of its block, which could allow users with the capability to publish posts (editor and admin by default) to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-7132&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N']4.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-7132']CVE-2024-7132[/URL]
[URL='https://wpscan.com/vulnerability/16deb743-6fe9-43a2-9586-d92cfe1daa17/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Unknown--Quiz and Survey Master (QSM)
[/TD]
[TD]The Quiz and Survey Master (QSM) WordPress plugin before 9.1.1 fails to validate and escape certain Quiz fields before displaying them on a page or post where the Quiz is embedded, which could allows contributor and above roles to perform Stored Cross-Site Scripting (XSS) attacks.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-6879&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N']4.7[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-6879']CVE-2024-6879[/URL]
[URL='https://wpscan.com/vulnerability/4da0b318-03e7-409d-9b02-f108e4232c87/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Unknown--Shield Security
[/TD]
[TD]The Shield Security WordPress plugin before 20.0.6 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-7313&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-7313']CVE-2024-7313[/URL]
[URL='https://wpscan.com/vulnerability/83a1bdc6-098e-43d5-89e5-f4202ecd78a1/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Unknown--Viral Signup
[/TD]
[TD]The Viral Signup WordPress plugin through 2.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-6927&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N']4.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-6927']CVE-2024-6927[/URL]
[URL='https://wpscan.com/vulnerability/05024ff5-4c7a-4941-8dae-c1a8d2d4e202/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]vim--vim
[/TD]
[TD]Vim is an improved version of the unix vi text editor. When flushing the typeahead buffer, Vim moves the current position in the typeahead buffer but does not check whether there is enough space left in the buffer to handle the next characters. So this may lead to the tb_off position within the typebuf variable to point outside of the valid buffer size, which can then later lead to a heap-buffer overflow in e.g. ins_typebuf(). Therefore, when flushing the typeahead buffer, check if there is enough space left before advancing the off position. If not, fall back to flush current typebuf contents. It's not quite clear yet, what can lead to this situation. It seems to happen when error messages occur (which will cause Vim to flush the typeahead buffer) in comnination with several long mappgins and so it may eventually move the off position out of a valid buffer size. Impact is low since it is not easily reproducible and requires to have several mappings active and run into some error condition. But when this happens, this will cause a crash. The issue has been fixed as of Vim patch v9.1.0697. Users are advised to upgrade. There are no known workarounds for this issue.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43802&vector=CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L']4.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43802']CVE-2024-43802[/URL]
[URL='https://github.com/vim/vim/commit/322ba9108612bead5eb'][email protected][/URL]
[URL='https://github.com/vim/vim/security/advisories/GHSA-4ghr-c62x-cqfh'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]vol4ikman--WP Accessibility Helper (WAH)
[/TD]
[TD]The WP Accessibility Helper (WAH) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'save_contrast_variations' and 'save_empty_contrast_variations' functions in all versions up to, and including, 0.6.2.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to edit or delete contrast settings. Please note these issues were patched in 0.6.2.8, though it broke functionality and the vendor has not responded to our follow-ups.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-5987&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L']5.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-5987']CVE-2024-5987[/URL]
[URL='https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3117664%40wp-accessibility-helper&new=3117664%40wp-accessibility-helper&sfp_email=&sfph_mail='][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/d3beee75-0480-4504-a177-45f8cd32cf36?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]waspthemes -- yellowpencil
[/TD]
[TD]Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WaspThemes YellowPencil Visual CSS Style Editor allows Reflected XSS.This issue affects YellowPencil Visual CSS Style Editor: from n/a through 7.6.1.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43963&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43963']CVE-2024-43963[/URL]
[URL='https://patchstack.com/database/vulnerability/yellow-pencil-visual-theme-customizer/wordpress-visual-css-style-editor-plugin-7-6-1-cross-site-scripting-xss-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]webdevmattcrom--GiveWP Donation Plugin and Fundraising Platform
[/TD]
[TD]The GiveWP - Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 3.15.1. This is due to the plugin utilizing Symfony and leaving display_errors on within test files. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-6551&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N']5.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-6551']CVE-2024-6551[/URL]
[URL='https://plugins.trac.wordpress.org/browser/give/tags/3.15.1/vendor/vendor-prefixed/symfony/http-foundation/Tests/Fixtures/response-functional/common.inc#L23'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/2a13ce09-b312-4186-b0e2-63065c47f15d?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]webinarpress -- webinarpress
[/TD]
[TD]Cross-Site Request Forgery (CSRF) vulnerability in WebinarPress allows Cross-Site Scripting (XSS).This issue affects WebinarPress: from n/a through 1.33.20.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43339&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43339']CVE-2024-43339[/URL]
[URL='https://patchstack.com/database/vulnerability/wp-webinarsystem/wordpress-wordpress-webinar-plugin-webinarpress-plugin-1-33-20-cross-site-request-forgery-csrf-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]webpack.js -- webpack
[/TD]
[TD]Webpack is a module bundler. Its main purpose is to bundle JavaScript files for usage in a browser, yet it is also capable of transforming, bundling, or packaging just about any resource or asset. The webpack developers have discovered a DOM Clobbering vulnerability in Webpack's [ICODE]AutoPublicPathRuntimeModule[/ICODE]. The DOM Clobbering gadget in the module can lead to cross-site scripting (XSS) in web pages where scriptless attacker-controlled HTML elements (e.g., an [ICODE]img[/ICODE] tag with an unsanitized [ICODE]name[/ICODE] attribute) are present. Real-world exploitation of this gadget has been observed in the Canvas LMS which allows a XSS attack to happen through a javascript code compiled by Webpack (the vulnerable part is from Webpack). DOM Clobbering is a type of code-reuse attack where the attacker first embeds a piece of non-script, seemingly benign HTML markups in the webpage (e.g. through a post or comment) and leverages the gadgets (pieces of js code) living in the existing javascript code to transform it into executable code. This vulnerability can lead to cross-site scripting (XSS) on websites that include Webpack-generated files and allow users to inject certain scriptless HTML tags with improperly sanitized name or id attributes. This issue has been addressed in release version 5.94.0. All users are advised to upgrade. There are no known workarounds for this issue.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43788&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43788']CVE-2024-43788[/URL]
[URL='https://github.com/webpack/webpack/commit/955e057abc6cc83cbc3fa1e1ef67a49758bf5a61'][email protected][/URL]
[URL='https://github.com/webpack/webpack/security/advisories/GHSA-4vvj-4cpr-p986'][email protected][/URL]
[URL='https://research.securitum.com/xss-in-amp4email-dom-clobbering'][email protected][/URL]
[URL='https://scnps.co/papers/sp23_domclob.pdf'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]webtechstreet--Elementor Addon Elements
[/TD]
[TD]The Elementor Addon Elements plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'id' and 'eae_slider_animation' parameters in all versions up to, and including, 1.13.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-4401&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N']6.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-4401']CVE-2024-4401[/URL]
[URL='https://plugins.trac.wordpress.org/browser/addon-elements-for-elementor-page-builder/trunk/modules/animated-text/widgets/animated-text.php#L358'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/browser/addon-elements-for-elementor-page-builder/trunk/modules/bg-slider/module.php#L284'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/changeset/3107074#file6'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/changeset/3107074#file7'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/ecfc1466-41d2-498b-8210-c67e8550f5b8?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]webtechstreet--Elementor Addon Elements
[/TD]
[TD]The Elementor Addon Elements plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple widgets in all versions up to, and including, 1.13.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-7122&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N']6.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-7122']CVE-2024-7122[/URL]
[URL='https://plugins.trac.wordpress.org/browser/addon-elements-for-elementor-page-builder/trunk/assets/js/eae.js#L568'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/browser/addon-elements-for-elementor-page-builder/trunk/modules/animated-gradient/module.php#L160'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/browser/addon-elements-for-elementor-page-builder/trunk/modules/dual-button/widgets/dual-button.php#L1045'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/browser/addon-elements-for-elementor-page-builder/trunk/modules/image-compare/widgets/image-compare.php#L537'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/browser/addon-elements-for-elementor-page-builder/trunk/modules/text-separator/widgets/text-separator.php#L570'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/changeset/3143440/'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/changeset/3143444/'][email protected][/URL]
[URL='https://wordpress.org/plugins/addon-elements-for-elementor-page-builder/#developers'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/668621b0-67ef-44fc-a126-e8c4e372666e?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]wireshark -- wireshark
[/TD]
[TD]NTLMSSP dissector crash in Wireshark 4.2.0 to 4.0.6 and 4.0.0 to 4.0.16 allows denial of service via packet injection or crafted capture file[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8250&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H']5.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8250']CVE-2024-8250[/URL]
[URL='https://gitlab.com/wireshark/wireshark/-/issues/19943'][email protected][/URL]
[URL='https://www.wireshark.org/security/wnpa-sec-2024-11.html'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]wolfSSL Inc.--wolfSSL
[/TD]
[TD]An issue was discovered in wolfSSL before 5.7.0. A safe-error attack via Rowhammer, namely FAULT+PROBE, leads to ECDSA key disclosure. When WOLFSSL_CHECK_SIG_FAULTS is used in signing operations with private ECC keys, such as in server-side TLS connections, the connection is halted if any fault occurs. The success rate in a certain amount of connection requests can be processed via an advanced technique for ECDSA key recovery.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-5288&vector=CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N']5.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-5288']CVE-2024-5288[/URL]
[URL='https://github.com/wolfSSL/wolfssl/releases/tag/v5.7.2-stable'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]WolfSSL--wolfCrypt
[/TD]
[TD]Fault Injection vulnerability in wc_ed25519_sign_msg function in wolfssl/wolfcrypt/src/ed25519.c in WolfSSL wolfssl5.6.6 on Linux/Windows allows remote attacker co-resides in the same system with a victim process to disclose information and escalate privileges via Rowhammer fault injection to the ed25519_key structure.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-2881&vector=CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L']6.7[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-2881']CVE-2024-2881[/URL]
[URL='https://github.com/wolfSSL/wolfssl/releases/tag/v5.7.0-stable'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]WolfSSL--wolfCrypt
[/TD]
[TD]Fault Injection vulnerability in RsaPrivateDecryption function in wolfssl/wolfcrypt/src/rsa.c in WolfSSL wolfssl5.6.6 on Linux/Windows allows remote attacker co-resides in the same system with a victim process to disclose information and escalate privileges via Rowhammer fault injection to the RsaKey structure.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-1545&vector=CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L']5.9[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-1545']CVE-2024-1545[/URL]
[URL='https://github.com/wolfSSL/wolfssl/releases/tag/v5.7.0-stable'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]wolfSSL--wolfSSL
[/TD]
[TD]The side-channel protected T-Table implementation in wolfSSL up to version 5.6.5 protects against a side-channel attacker with cache-line resolution. In a controlled environment such as Intel SGX, an attacker can gain a per instruction sub-cache-line resolution allowing them to break the cache-line-level protection. For details on the attack refer to: https://doi.org/10.46586/tches.v2024.i1.457-500[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-1543&vector=CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N']4.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-1543']CVE-2024-1543[/URL]
[URL='https://github.com/wolfSSL/wolfssl/blob/master/ChangeLog.md#wolfssl-release-566-dec-19-2023'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]wolfSSL--wolfSSL
[/TD]
[TD]Generating the ECDSA nonce k samples a random number r and then truncates this randomness with a modular reduction mod n where n is the order of the elliptic curve. Meaning k = r mod n. The division used during the reduction estimates a factor q_e by dividing the upper two digits (a digit having e.g. a size of 8 byte) of r by the upper digit of n and then decrements q_e in a loop until it has the correct size. Observing the number of times q_e is decremented through a control-flow revealing side-channel reveals a bias in the most significant bits of k. Depending on the curve this is either a negligible bias or a significant bias large enough to reconstruct k with lattice reduction methods. For SECP160R1, e.g., we find a bias of 15 bits.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-1544&vector=CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N']4.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-1544']CVE-2024-1544[/URL]
[URL='https://github.com/wolfSSL/wolfssl/releases/tag/v5.7.2-stable'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]WP Delicious--Delicious Recipes WordPress Recipe Plugin
[/TD]
[TD]Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WP Delicious Delicious Recipes - WordPress Recipe Plugin allows Stored XSS.This issue affects Delicious Recipes - WordPress Recipe Plugin: from n/a through 1.6.7.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43935&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L']6.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43935']CVE-2024-43935[/URL]
[URL='https://patchstack.com/database/vulnerability/delicious-recipes/wordpress-wp-delicious-recipe-plugin-for-food-bloggers-formerly-delicious-recipes-plugin-1-6-7-cross-site-scripting-xss-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]WPBackItUp--Backup and Restore WordPress
[/TD]
[TD]Cross-Site Request Forgery (CSRF) vulnerability in WPBackItUp Backup and Restore WordPress.This issue affects Backup and Restore WordPress: from n/a through 1.50.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43269&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N']4.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43269']CVE-2024-43269[/URL]
[URL='https://patchstack.com/database/vulnerability/wp-backitup/wordpress-backup-and-restore-wordpress-plugin-1-50-cross-site-request-forgery-csrf-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]wpbakery -- page_builder
[/TD]
[TD]Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Classic Addons Classic Addons - WPBakery Page Builder allows Stored XSS.This issue affects Classic Addons - WPBakery Page Builder: from n/a through 3.0.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43953&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']5.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43953']CVE-2024-43953[/URL]
[URL='https://patchstack.com/database/vulnerability/classic-addons-wpbakery-page-builder-addons/wordpress-classic-addons-wpbakery-page-builder-plugin-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]wpdevelop--WP Booking Calendar
[/TD]
[TD]The WP Booking Calendar plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via several parameters from 'timeline_obj' in all versions up to, and including, 10.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8274&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8274']CVE-2024-8274[/URL]
[URL='https://plugins.trac.wordpress.org/browser/booking/tags/10.4/core/timeline/v2/wpbc-class-timeline_v2.php#L520'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/changeset/3143364/booking/trunk/core/timeline/v2/wpbc-class-timeline_v2.php?old=3139443&old_path=booking%2Ftrunk%2Fcore%2Ftimeline%2Fv2%2Fwpbc-class-timeline_v2.php'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/83804c2a-2c4a-4f69-b833-dcd53ddab94d?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]WPDeveloper--EmbedPress
[/TD]
[TD]Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WPDeveloper EmbedPress allows Stored XSS.This issue affects EmbedPress: from n/a through 4.0.8.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43936&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L']6.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43936']CVE-2024-43936[/URL]
[URL='https://patchstack.com/database/vulnerability/embedpress/wordpress-embedpress-plugin-4-0-8-cross-site-scripting-xss-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]WPMU DEV--Hummingbird
[/TD]
[TD]Cross-Site Request Forgery (CSRF) vulnerability in WPMU DEV Hummingbird.This issue affects Hummingbird: from n/a through 3.9.1.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43117&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N']4.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43117']CVE-2024-43117[/URL]
[URL='https://patchstack.com/database/vulnerability/hummingbird-performance/wordpress-hummingbird-plugin-3-9-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]wpusermanager -- wp_user_manager
[/TD]
[TD]Cross-Site Request Forgery (CSRF) vulnerability in WP User Manager.This issue affects WP User Manager: from n/a through 2.9.10.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43336&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N']4.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43336']CVE-2024-43336[/URL]
[URL='https://patchstack.com/database/vulnerability/wp-user-manager/wordpress-wp-user-manager-user-profile-builder-membership-plugin-2-9-10-cross-site-request-forgery-csrf-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]wpwax--Logo Showcase Ultimate Logo Carousel, Logo Slider & Logo Grid
[/TD]
[TD]The Logo Showcase Ultimate - Logo Carousel, Logo Slider & Logo Grid plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.4.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8046&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N']6.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8046']CVE-2024-8046[/URL]
[URL='https://plugins.trac.wordpress.org/browser/logo-showcase-ultimate/tags/1.4.1/lcg_adl_main.php#L236'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/changeset/3141393/'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/changeset/3141393/#file3'][email protected][/URL]
[URL='https://wordpress.org/plugins/logo-showcase-ultimate/#developers'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/89525af0-105a-4d7d-93d1-af724a837e7a?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]wpzoom--WPZOOM Portfolio Lite Filterable Portfolio Plugin
[/TD]
[TD]The WPZOOM Portfolio Lite - Filterable Portfolio Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'align' attribute within the 'wp:wpzoom-blocks' Gutenberg block in all versions up to, and including, 1.4.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.[/TD]
[TD]2024-08-31[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8276&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N']6.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8276']CVE-2024-8276[/URL]
[URL='https://plugins.trac.wordpress.org/browser/wpzoom-portfolio/trunk/build/blocks/portfolio-layouts/index.php#L63'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/changeset/3144394'][email protected][/URL]
[URL='https://wordpress.org/plugins/wpzoom-portfolio/#developers'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/2e7d5503-0a6e-4611-bb7c-b2871be828be?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Xiaomi--Router AX9000
[/TD]
[TD]The Xiaomi router AX9000 has a post-authentication command injection vulnerability. This vulnerability is caused by the lack of input filtering, allowing an attacker to exploit it to obtain root access to the device.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-26315&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H']6.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-26315']CVE-2023-26315[/URL]
[URL='https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=546'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Xiaomi--Xiaomi File Manager App International Version
[/TD]
[TD]A path traversal vulnerability exists in the Xiaomi File Manager application product(international version). The vulnerability is caused by unfiltered special characters and can be exploited by attackers to overwrite and execute code in the file.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-26321&vector=CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H']6.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-26321']CVE-2023-26321[/URL]
[URL='https://trust.mi.com/misrc/bulletins/advisory?cveId=541'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]xpro--140+ Widgets | Xpro Addons For Elementor FREE
[/TD]
[TD]The 140+ Widgets | Xpro Addons For Elementor - FREE plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'arrow' parameter within the Post Grid widget in all versions up to, and including, 1.4.4.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.[/TD]
[TD]2024-08-27[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-7791&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N']6.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-7791']CVE-2024-7791[/URL]
[URL='https://plugins.trac.wordpress.org/browser/xpro-elementor-addons/trunk/widgets/post-grid/post-grid.php#L1891'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/changeset/3141892/'][email protected][/URL]
[URL='https://plugins.trac.wordpress.org/changeset/3141892/#file2'][email protected][/URL]
[URL='https://wordpress.org/plugins/xpro-elementor-addons/#developers'][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/c6025dd5-a1d7-48cc-90b3-f020d3d2298b?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]youtag--Two-factor authentication (formerly IP Vault)
[/TD]
[TD]The IP Vault - WP Firewall plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 1.1. This is due to insufficient restrictions on where the IP Address information is being retrieved for request logging and login restrictions. Attackers can supply the X-Forwarded-For header with with a different IP Address that will be logged and can be used to bypass settings that may have blocked out an IP address or country from logging in.[/TD]
[TD]2024-08-31[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4536&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N']5.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4536']CVE-2022-4536[/URL]
[URL='https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2922250%40ip-vault-wp-firewall&new=2922250%40ip-vault-wp-firewall&sfp_email=&sfph_mail='][email protected][/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/66e89753-f83e-4e60-b165-6d3d101d6c59?source=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]zephyr-one -- zephyr_project_manager
[/TD]
[TD]Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Dylan James Zephyr Project Manager allows Reflected XSS.This issue affects Zephyr Project Manager: from n/a through .3.102.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43915&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']5.4[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43915']CVE-2024-43915[/URL]
[URL='https://patchstack.com/database/vulnerability/zephyr-project-manager/wordpress-zephyr-project-manager-plugin-3-3-102-cross-site-scripting-xss-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]zynith -- zynith
[/TD]
[TD]Missing Authorization vulnerability in VIICTORY MEDIA LLC Z Y N I T H allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Z Y N I T H: from n/a through 7.4.9.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43939&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L']6.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43939']CVE-2024-43939[/URL]
[URL='https://patchstack.com/database/vulnerability/zynith-seo/wordpress-z-y-n-i-t-h-plugin-7-4-9-unauthenticated-arbitrary-option-deletion-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]zynith -- zynith
[/TD]
[TD]Missing Authorization vulnerability in VIICTORY MEDIA LLC Z Y N I T H allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Z Y N I T H: from n/a through 7.4.9.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43940&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L']6.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43940']CVE-2024-43940[/URL]
[URL='https://patchstack.com/database/vulnerability/zynith-seo/wordpress-z-y-n-i-t-h-plugin-7-4-9-unauthenticated-plugin-settings-change-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[/TABLE][/CENTER]

[URL='https://www.cisa.gov/uscert/ncas/#top']Back to top[/URL]

[HEADING=1]Low Vulnerabilities[/HEADING]
[CENTER][TABLE]
[TR]
[TH]Primary
Vendor -- Product[/TH]
[TH]Description[/TH]
[TH]Published[/TH]
[TH]CVSS Score[/TH]
[TH]Source & Patch Info[/TH]
[/TR]
[TR]
[TD]Dell--PowerEdge Platform
[/TD]
[TD]Dell PowerEdge Platform, 14G Intel BIOS version(s) prior to 2.22.x, contains an Access of Memory Location After End of Buffer vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information disclosure.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-38304&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N']3.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-38304']CVE-2024-38304[/URL]
[URL='https://www.dell.com/support/kbdoc/en-us/000228137/dsa-2024-310-security-update-for-dell-poweredge-server-for-access-of-memory-location-after-end-of-buffer-vulnerability'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]HM Courts & Tribunals Service--Probate Back Office
[/TD]
[TD]A vulnerability was found in HM Courts & Tribunals Service Probate Back Office up to c1afe0cdb2b2766d9e24872c4e827f8b82a6cd31. It has been classified as problematic. Affected is an unknown function of the file src/main/java/uk/gov/hmcts/probate/service/NotificationService.java of the component Markdown Handler. The manipulation leads to injection. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The patch is identified as d90230d7cf575e5b0852d56660104c8bd2503c34. It is recommended to apply a patch to fix this issue.[/TD]
[TD]2024-09-01[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8367&vector=CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N']3.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8367']CVE-2024-8367[/URL]
[URL='https://github.com/hmcts/probate-back-office/commit/d90230d7cf575e5b0852d56660104c8bd2503c34'][email protected][/URL]
[URL='https://github.com/hmcts/probate-back-office/pull/2614'][email protected][/URL]
[URL='https://tools.hmcts.net/jira/browse/DTSPB-4180'][email protected][/URL]
[URL='https://vuldb.com/?ctiid.276270'][email protected][/URL]
[URL='https://vuldb.com/?id.276270'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]hwameistor--hwameistor
[/TD]
[TD]Hwameistor is an HA local storage system for cloud-native stateful workloads. This ClusterRole has * verbs of * resources. If a malicious user can access the worker node which has hwameistor's deployment, he/she can abuse these excessive permissions to do whatever he/she likes to the whole cluster, resulting in a cluster-level privilege escalation. This issue has been patched in version 0.14.6. All users are advised to upgrade. Users unable to upgrade should update and limit the ClusterRole using security-role.[/TD]
[TD]2024-08-28[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-45054&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:N/A:N']2.8[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-45054']CVE-2024-45054[/URL]
[URL='https://github.com/hwameistor/hwameistor/blob/main/helm/hwameistor/templates/clusterrole.yaml'][email protected][/URL]
[URL='https://github.com/hwameistor/hwameistor/commit/edf4cebed73cadd230bf97eab65c5311f2858450'][email protected][/URL]
[URL='https://github.com/hwameistor/hwameistor/issues/1457'][email protected][/URL]
[URL='https://github.com/hwameistor/hwameistor/issues/1460'][email protected][/URL]
[URL='https://github.com/hwameistor/hwameistor/security/advisories/GHSA-mgwr-h7mv-fh29'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--Grocy
[/TD]
[TD]A vulnerability classified as problematic was found in Grocy up to 4.2.0. This vulnerability affects unknown code of the file /api/files/recipepictures/ of the component SVG File Upload Handler. The manipulation of the argument force_serve_as with the input picture' leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. NOTE: The project maintainer explains that "this is 'nonsense' and practically irrelevant according to the project's security policy" which expects additional authentication for the software.[/TD]
[TD]2024-09-01[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8370&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N']3.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8370']CVE-2024-8370[/URL]
[URL='https://vuldb.com/?ctiid.276274'][email protected][/URL]
[URL='https://vuldb.com/?id.276274'][email protected][/URL]
[URL='https://vuldb.com/?submit.400844'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]A Cross-Site Request Forgery (CSRF) vulnerability was found in Kashipara Music Management System v1.0 via /music/ajax.php?action=delete_playlist page.[/TD]
[TD]2024-08-26[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-42792&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N']3.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-42792']CVE-2024-42792[/URL]
[URL='https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/CSRF%20-%20Delete%20Playlist.pdf'][email protected][/URL]
[URL='https://www.kashipara.com/project/php/12978/music-management-system-in-php-php-project-source-code'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]A cross-site scripting (XSS) vulnerability in the component admin_datarelate.php of SeaCMS v12.9 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-44918&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N']3.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44918']CVE-2024-44918[/URL]
[URL='https://github.com/nn0nkey/nn0nkey/blob/main/CVE-2024-44918.md'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]NVIDIA--NVIDIA CUDA Toolkit
[/TD]
[TD]NVIDIA CUDA Toolkit contains a vulnerability in command [ICODE]cuobjdump[/ICODE] where a user may cause a crash by passing in a malformed ELF file. A successful exploit of this vulnerability may cause an out of bounds read in the unprivileged process memory which could lead to a limited denial of service.[/TD]
[TD]2024-08-31[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-0109&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L']3.3[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-0109']CVE-2024-0109[/URL]
[URL='https://nvidia.custhelp.com/app/answers/detail/a_id/5564'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]silabs.com--SE Firmware
[/TD]
[TD]An application can be configured to block boot attempts after consecutive tamper resets are detected, which may not occur as expected. This is possible because the TAMPERRSTCAUSE register may not be properly updated when a level 4 tamper event (a tamper reset) occurs. This impacts Series 2 HSE-SVH devices, including xG23B, xG24B, xG25B, and xG28B, but does not impact xG21B. To mitigate this issue, upgrade to SE Firmware version 2.2.6 or later.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-2502&vector=CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N']2[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-2502']CVE-2024-2502[/URL]
[URL='https://community.silabs.com/sfc/servlet.shepherd/document/download/069Vm00000BYb5HIAT?operationContext=S1'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]SourceCodester--Contact Manager with Export to VCF
[/TD]
[TD]A vulnerability, which was classified as problematic, has been found in SourceCodester Contact Manager with Export to VCF 1.0. Affected by this issue is some unknown functionality of the file index.html. The manipulation of the argument contact_name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.[/TD]
[TD]2024-08-30[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-8337&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N']3.5[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8337']CVE-2024-8337[/URL]
[URL='https://vuldb.com/?ctiid.276212'][email protected][/URL]
[URL='https://vuldb.com/?id.276212'][email protected][/URL]
[URL='https://vuldb.com/?submit.399338'][email protected][/URL]
[URL='https://www.sourcecodester.com/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Yassine Idrissi--Maintenance & Coming Soon Redirect Animation
[/TD]
[TD]Incorrect Authorization vulnerability in Yassine Idrissi Maintenance & Coming Soon Redirect Animation allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Maintenance & Coming Soon Redirect Animation: from n/a through 2.1.3.[/TD]
[TD]2024-08-29[/TD]
[TD][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2024-43944&vector=CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N']3.7[/URL][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43944']CVE-2024-43944[/URL]
[URL='https://patchstack.com/database/vulnerability/maintenance-coming-soon-redirect-animation/wordpress-maintenance-coming-soon-redirect-animation-plugin-2-1-3-ip-bypass-vulnerability?_s_id=cve'][email protected][/URL]
[/TD]
[/TR]
[/TABLE][/CENTER]

[URL='https://www.cisa.gov/uscert/ncas/#top']Back to top[/URL]

[HEADING=1]Severity Not Yet Assigned[/HEADING]
[CENTER][TABLE]
[TR]
[TH]Primary
Vendor -- Product[/TH]
[TH]Description[/TH]
[TH]Published[/TH]
[TH]CVSS Score[/TH]
[TH]Source & Patch Info[/TH]
[/TR]
[TR]
[TD]Acer--vz2694g
[/TD]
[TD]A vulnerability related to the use an insecure Platform Key (PK) has been discovered. An attacker with the compromised PK private key can create malicious UEFI software that is signed with a trusted key that has been compromised.[/TD]
[TD]2024-08-26[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8105']CVE-2024-8105[/URL]
[URL='https://github.com/binarly-io/Vulnerability-REsearch/blob/main/PKfail/BRLY-2024-005.md'][email protected][/URL]
[URL='https://kb.cert.org/vuls/id/455367'][email protected][/URL]
[URL='https://security.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-FJ-ISS-2024-072412-Security-Notice.pdf'][email protected][/URL]
[URL='https://uefi.org/specs/UEFI/2.9_A/32_Secure_Boot_and_Driver_Signing.html'][email protected][/URL]
[URL='https://www.binarly.io/advisories/brly-2024-005'][email protected][/URL]
[URL='https://www.gigabyte.com/us/Support/Security/2205'][email protected][/URL]
[URL='https://www.intel.com/content/www/us/en/security-center/announcement/intel-security-announcement-2024-07-25-001.html'][email protected][/URL]
[URL='https://www.supermicro.com/en/support/security_PKFAIL_Jul_2024'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Acronis--Acronis Snap Deploy
[/TD]
[TD]Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Snap Deploy (Windows) before build 4569.[/TD]
[TD]2024-08-29[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-34017']CVE-2024-34017[/URL]
[URL='https://security-advisory.acronis.com/advisories/SEC-4505'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Acronis--Acronis Snap Deploy
[/TD]
[TD]Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Snap Deploy (Windows) before build 4569.[/TD]
[TD]2024-08-29[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-34018']CVE-2024-34018[/URL]
[URL='https://security-advisory.acronis.com/advisories/SEC-4196'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Acronis--Acronis Snap Deploy
[/TD]
[TD]Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Snap Deploy (Windows) before build 4569.[/TD]
[TD]2024-08-29[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-34019']CVE-2024-34019[/URL]
[URL='https://security-advisory.acronis.com/advisories/SEC-3079'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]B&R Industrial Automation--B&R APROL
[/TD]
[TD]An untrusted search path vulnerability in the AprolConfigureCCServices of B&R APROL <= R 4.2.-07P3 and <= R 4.4-00P3 may allow an authenticated local attacker to execute arbitrary code with elevated privileges.[/TD]
[TD]2024-08-29[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-5622']CVE-2024-5622[/URL]
[URL='https://www.br-automation.com/fileadmin/SA24P2014_Multiple_vulnerabilities_in_BR_APROL.pdf-367290ae.pdf'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]B&R Industrial Automation--B&R APROL
[/TD]
[TD]An untrusted search path vulnerability in B&R APROL <= R 4.4-00P3 may be used by an authenticated local attacker to get other users to execute arbitrary code under their privileges.[/TD]
[TD]2024-08-29[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-5623']CVE-2024-5623[/URL]
[URL='https://www.br-automation.com/fileadmin/SA24P2014_Multiple_vulnerabilities_in_BR_APROL.pdf-367290ae.pdf'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]B&R Industrial Automation--B&R APROL
[/TD]
[TD]Reflected Cross-Site Scripting (XSS) in Shift Logbook application of B&R APROL <= R 4.4-00P3 may allow a network-based attacker to execute arbitrary JavaScript code in the context of the user's browser session[/TD]
[TD]2024-08-29[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-5624']CVE-2024-5624[/URL]
[URL='https://www.br-automation.com/fileadmin/SA24P2014_Multiple_vulnerabilities_in_BR_APROL.pdf-367290ae.pdf'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Checkmk GmbH--Checkmk
[/TD]
[TD]XSS in the view page with the SLA column configured in Checkmk versions prior to 2.3.0p14, 2.2.0p33, 2.1.0p47 and 2.0.0 (EOL) allowed malicious users to execute arbitrary scripts by injecting HTML elements into the SLA column title. These scripts could be executed when the view page was cloned by other users.[/TD]
[TD]2024-08-26[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-38859']CVE-2024-38859[/URL]
[URL='https://checkmk.com/werk/17026'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]ConnX--ESP HR Management
[/TD]
[TD]Improper Neutralization of Input During Web Page Generation vulnerability in "Update of Personal Details" form in ConnX ESP HR Management allows Stored XSS attack. An attacker might inject a script to be run in user's browser. After multiple attempts to contact the vendor we did not receive any answer. The finder provided the information that this issue affects ESP HR Management versions before 6.6.[/TD]
[TD]2024-08-28[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-7269']CVE-2024-7269[/URL]
[URL='https://cert.pl/en/posts/2024/08/CVE-2024-7269/'][email protected][/URL]
[URL='https://cert.pl/posts/2024/08/CVE-2024-7269/'][email protected][/URL]
[URL='https://connx.com.au/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Delta Electronics--DTN Soft
[/TD]
[TD]Delta Electronics DTN Soft version 2.0.1 and prior are vulnerable to an attacker achieving remote code execution through a deserialization of untrusted data vulnerability.[/TD]
[TD]2024-08-29[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-8255']CVE-2024-8255[/URL]
[URL='https://www.cisa.gov/news-events/ics-advisories/icsa-24-242-02'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]ELECOM CO.,LTD.--WAB-I1750-PS
[/TD]
[TD]Cross-site scripting vulnerability exists in WAB-I1750-PS and WAB-S1167-PS due to improper processing of input values in menu.cgi. If a user views a malicious web page while logged in to the product, an arbitrary script may be executed on the user's web browser.[/TD]
[TD]2024-08-30[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-42412']CVE-2024-42412[/URL]
[URL='https://jvn.jp/en/jp/JVN24885537/'][email protected][/URL]
[URL='https://www.elecom.co.jp/news/security/20240827-01/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]ELECOM CO.,LTD.--WRC-X3000GS2-B
[/TD]
[TD]Cross-site scripting vulnerability exists in WRC-X3000GS2-B, WRC-X3000GS2-W, and WRC-X3000GS2A-B due to improper processing of input values in easysetup.cgi. If a user views a malicious web page while logged in to the product, an arbitrary script may be executed on the user's web browser.[/TD]
[TD]2024-08-30[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-34577']CVE-2024-34577[/URL]
[URL='https://jvn.jp/en/jp/JVN24885537/'][email protected][/URL]
[URL='https://www.elecom.co.jp/news/security/20240827-01/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]HyperView--Geoportal Toolkit
[/TD]
[TD]HyperView Geoportal Toolkit in versions though 8.2.4 does not restrict cross-domain requests when fetching remote content pointed by one of GET request parameters. An unauthenticated remote attacker can prepare links, which upon opening will load scripts from a remote location controlled by the attacker and execute them in the user space. By manipulating this parameter it is also possible to enumerate some of the devices in Local Area Network in which the server resides.[/TD]
[TD]2024-08-28[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-6449']CVE-2024-6449[/URL]
[URL='https://cert.pl/en/posts/2024/08/CVE-2024-6449'][email protected][/URL]
[URL='https://cert.pl/posts/2024/08/CVE-2024-6449'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]HyperView--Geoportal Toolkit
[/TD]
[TD]HyperView Geoportal Toolkit in versions though 8.2.4 is vulnerable to Reflected Cross-Site Scripting (XSS). An unauthenticated attacker might trick somebody into using a crafted URL, which will cause a script to be run in user's browser.[/TD]
[TD]2024-08-28[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-6450']CVE-2024-6450[/URL]
[URL='https://cert.pl/en/posts/2024/08/CVE-2024-6449'][email protected][/URL]
[URL='https://cert.pl/posts/2024/08/CVE-2024-6449'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Lightdash--Lightdash
[/TD]
[TD]Multiple stored cross-site scripting ("XSS") vulnerabilities in the markdown dashboard and dashboard comment functionality of Lightdash version 0.1024.6 allows remote authenticated threat actors to inject malicious scripts into vulnerable web pages. A threat actor could potentially exploit this vulnerability to store malicious JavaScript which executes in the context of a user's session with the application.[/TD]
[TD]2024-08-30[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-6585']CVE-2024-6585[/URL]
[URL='https://github.com/google/security-research/security/advisories/GHSA-6529-6jv3-66q2'][email protected][/URL]
[URL='https://github.com/lightdash/lightdash'][email protected][/URL]
[URL='https://github.com/lightdash/lightdash/pull/9359'][email protected][/URL]
[URL='https://github.com/lightdash/lightdash/pull/9510'][email protected][/URL]
[URL='https://github.com/lightdash/lightdash/releases/tag/0.1042.2'][email protected][/URL]
[URL='https://patch-diff.githubusercontent.com/raw/lightdash/lightdash/pull/9359.patch'][email protected][/URL]
[URL='https://patch-diff.githubusercontent.com/raw/lightdash/lightdash/pull/9510.patch'][email protected][/URL]
[URL='https://www.cve.org/CVERecord?id=CVE-2024-6585'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Lightdash--Lightdash
[/TD]
[TD]Lightdash version 0.1024.6 allows users with the necessary permissions, such as Administrator or Editor, to create and share dashboards. A dashboard that contains HTML elements which point to a threat actor controlled source can trigger an SSRF request when exported, via a POST request to /api/v1/dashboards//export. The forged request contains the value of the exporting user's session token. A threat actor could obtain the session token of any user who exports the dashboard. The obtained session token can be used to perform actions as the victim on the application, resulting in session takeover.[/TD]
[TD]2024-08-30[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-6586']CVE-2024-6586[/URL]
[URL='https://github.com/google/security-research/security/advisories/GHSA-4h7x-6vxh-7hjf'][email protected][/URL]
[URL='https://github.com/lightdash/lightdash'][email protected][/URL]
[URL='https://github.com/lightdash/lightdash/pull/9295'][email protected][/URL]
[URL='https://github.com/lightdash/lightdash/releases/tag/0.1027.2'][email protected][/URL]
[URL='https://patch-diff.githubusercontent.com/raw/lightdash/lightdash/pull/9295.patch'][email protected][/URL]
[URL='https://www.cve.org/CVERecord?id=CVE-2024-6586'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Linux--Linux
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: tcp: add sanity tests to TCP_QUEUE_SEQ Qingyu Li reported a syzkaller bug where the repro changes RCV SEQ [I]after[/I] restoring data in the receive queue. mprotect(0x4aa000, 12288, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 socket(AF_INET6, SOCK_STREAM, IPPROTO_IP) = 3 setsockopt(3, SOL_TCP, TCP_REPAIR, [1], 4) = 0 connect(3, {sa_family=AF_INET6, sin6_port=htons(0), sin6_flowinfo=htonl(0), inet_pton(AF_INET6, "::1", &sin6_addr), sin6_scope_id=0}, 28) = 0 setsockopt(3, SOL_TCP, TCP_REPAIR_QUEUE, [1], 4) = 0 sendmsg(3, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="0x0000000000000003\0\0", iov_len=20}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 20 setsockopt(3, SOL_TCP, TCP_REPAIR, [0], 4) = 0 setsockopt(3, SOL_TCP, TCP_QUEUE_SEQ, [128], 4) = 0 recvfrom(3, NULL, 20, 0, NULL, NULL) = -1 ECONNRESET (Connection reset by peer) syslog shows: [ 111.205099] TCP recvmsg seq # bug 2: copied 80, seq 0, rcvnxt 80, fl 0 [ 111.207894] WARNING: CPU: 1 PID: 356 at net/ipv4/tcp.c:2343 tcp_recvmsg_locked+0x90e/0x29a0 This should not be allowed. TCP_QUEUE_SEQ should only be used when queues are empty. This patch fixes this case, and the tx path as well.[/TD]
[TD]2024-08-29[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-4442']CVE-2021-4442[/URL]
[URL='https://git.kernel.org/stable/c/046f3c1c2ff450fb7ae53650e9a95e0074a61f3e']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/319f460237fc2965a80aa9a055044e1da7b3692a']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/3b72d5a703842f582502d97906f17d6ee122dac2']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/3bf899438c123c444f6b644a57784dfbb6b15ad6']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/8811f4a9836e31c14ecdf79d9f3cb7c5d463265d']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]Linux--Linux
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: sched: Fix yet more sched_fork() races Where commit 4ef0c5c6b5ba ("kernel/sched: Fix sched_fork() access an invalid sched_task_group") fixed a fork race vs cgroup, it opened up a race vs syscalls by not placing the task on the runqueue before it gets exposed through the pidhash. Commit 13765de8148f ("sched/fair: Fix fault in reweight_entity") is trying to fix a single instance of this, instead fix the whole class of issues, effectively reverting this commit.[/TD]
[TD]2024-08-30[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-48944']CVE-2022-48944[/URL]
[URL='https://git.kernel.org/stable/c/3411613611a5cddf7e80908010dc87cb527dd13b']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/b1e8206582f9d680cff7d04828708c8b6ab32957']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/c65cfd89cef669d90c59f3bf150af6458137a04f']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]Linux--Linux
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: net/tcp: Disable TCP-AO static key after RCU grace period The lifetime of TCP-AO static_key is the same as the last tcp_ao_info. On the socket destruction tcp_ao_info ceases to be with RCU grace period, while tcp-ao static branch is currently deferred destructed. The static key definition is : DEFINE_STATIC_KEY_DEFERRED_FALSE(tcp_ao_needed, HZ); which means that if RCU grace period is delayed by more than a second and tcp_ao_needed is in the process of disablement, other CPUs may yet see tcp_ao_info which atent dead, but soon-to-be. And that breaks the assumption of static_key_fast_inc_not_disabled(). See the comment near the definition: > * The caller must make sure that the static key can't get disabled while > * in this function. It doesn't patch jump labels, only adds a user to > * an already enabled static key. Originally it was introduced in commit eb8c507296f6 ("jump_label: Prevent key->enabled int overflow"), which is needed for the atomic contexts, one of which would be the creation of a full socket from a request socket. In that atomic context, it's known by the presence of the key (md5/ao) that the static branch is already enabled. So, the ref counter for that static branch is just incremented instead of holding the proper mutex. static_key_fast_inc_not_disabled() is just a helper for such usage case. But it must not be used if the static branch could get disabled in parallel as it's not protected by jump_label_mutex and as a result, races with jump_label_update() implementation details. Happened on netdev test-bot[1], so not a theoretical issue: [] jump_label: Fatal kernel bug, unexpected op at tcp_inbound_hash+0x1a7/0x870 [ffffffffa8c4e9b7] (eb 50 0f 1f 44 != 66 90 0f 1f 00)) size:2 type:1 [] ------------[ cut here ]------------ [] kernel BUG at arch/x86/kernel/jump_label.c:73! [] Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI [] CPU: 3 PID: 243 Comm: kworker/3:3 Not tainted 6.10.0-virtme #1 [] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 [] Workqueue: events jump_label_update_timeout [] RIP: 0010:__jump_label_patch+0x2f6/0x350 ... [] Call Trace: [] <TASK> [] arch_jump_label_transform_queue+0x6c/0x110 [] __jump_label_update+0xef/0x350 [] __static_key_slow_dec_cpuslocked.part.0+0x3c/0x60 [] jump_label_update_timeout+0x2c/0x40 [] process_one_work+0xe3b/0x1670 [] worker_thread+0x587/0xce0 [] kthread+0x28a/0x350 [] ret_from_fork+0x31/0x70 [] ret_from_fork_asm+0x1a/0x30 [] </TASK> [] Modules linked in: veth [] ---[ end trace 0000000000000000 ]--- [] RIP: 0010:__jump_label_patch+0x2f6/0x350 [1]: https://netdev-3.bots.linux.dev/vmksft-tcp-ao-dbg/results/696681/5-connect-deny-ipv6/stderr[/TD]
[TD]2024-08-26[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43887']CVE-2024-43887[/URL]
[URL='https://git.kernel.org/stable/c/14ab4792ee120c022f276a7e4768f4dcb08f0cdd']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/954d55a59b2501f4a9bd693b40ce45a1c46cb2b3']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]Linux--Linux
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: tracing: Fix overflow in get_free_elt() "tracing_map->next_elt" in get_free_elt() is at risk of overflowing. Once it overflows, new elements can still be inserted into the tracing_map even though the maximum number of elements ([ICODE]max_elts[/ICODE]) has been reached. Continuing to insert elements after the overflow could result in the tracing_map containing "tracing_map->max_size" elements, leaving no empty entries. If any attempt is made to insert an element into a full tracing_map using [ICODE]__tracing_map_insert()[/ICODE], it will cause an infinite loop with preemption disabled, leading to a CPU hang problem. Fix this by preventing any further increments to "tracing_map->next_elt" once it reaches "tracing_map->max_elt".[/TD]
[TD]2024-08-26[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43890']CVE-2024-43890[/URL]
[URL='https://git.kernel.org/stable/c/236bb4690773ab6869b40bedc7bc8d889e36f9d6']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/302ceb625d7b990db205a15e371f9a71238de91c']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/788ea62499b3c18541fd6d621964d8fafbc4aec5']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/a172c7b22bc2feaf489cfc6d6865f7237134fdf8']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/bcf86c01ca4676316557dd482c8416ece8c2e143']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/cd10d186a5409a1fe6e976df82858e9773a698da']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/d3e4dbc2858fe85d1dbd2e72a9fc5dea988b5c18']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/eb223bf01e688dfe37e813c8988ee11c8c9f8d0a']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]Linux--Linux
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: tracing: Have format file honor EVENT_FILE_FL_FREED When eventfs was introduced, special care had to be done to coordinate the freeing of the file meta data with the files that are exposed to user space. The file meta data would have a ref count that is set when the file is created and would be decremented and freed after the last user that opened the file closed it. When the file meta data was to be freed, it would set a flag (EVENT_FILE_FL_FREED) to denote that the file is freed, and any new references made (like new opens or reads) would fail as it is marked freed. This allowed other meta data to be freed after this flag was set (under the event_mutex). All the files that were dynamically created in the events directory had a pointer to the file meta data and would call event_release() when the last reference to the user space file was closed. This would be the time that it is safe to free the file meta data. A shortcut was made for the "format" file. It's i_private would point to the "call" entry directly and not point to the file's meta data. This is because all format files are the same for the same "call", so it was thought there was no reason to differentiate them. The other files maintain state (like the "enable", "trigger", etc). But this meant if the file were to disappear, the "format" file would be unaware of it. This caused a race that could be trigger via the user_events test (that would create dynamic events and free them), and running a loop that would read the user_events format files: In one console run: # cd tools/testing/selftests/user_events # while true; do ./ftrace_test; done And in another console run: # cd /sys/kernel/tracing/ # while true; do cat events/user_events/__test_event/format; done 2>/dev/null With KASAN memory checking, it would trigger a use-after-free bug report (which was a real bug). This was because the format file was not checking the file's meta data flag "EVENT_FILE_FL_FREED", so it would access the event that the file meta data pointed to after the event was freed. After inspection, there are other locations that were found to not check the EVENT_FILE_FL_FREED flag when accessing the trace_event_file. Add a new helper function: event_file_file() that will make sure that the event_mutex is held, and will return NULL if the trace_event_file has the EVENT_FILE_FL_FREED flag set. Have the first reference of the struct file pointer use event_file_file() and check for NULL. Later uses can still use the event_file_data() helper function if the event_mutex is still held and was not released since the event_file_file() call.[/TD]
[TD]2024-08-26[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43891']CVE-2024-43891[/URL]
[URL='https://git.kernel.org/stable/c/531dc6780d94245af037c25c2371c8caf652f0f9']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/b1560408692cd0ab0370cfbe9deb03ce97ab3f6d']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]Linux--Linux
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: memcg: protect concurrent access to mem_cgroup_idr Commit 73f576c04b94 ("mm: memcontrol: fix cgroup creation failure after many small jobs") decoupled the memcg IDs from the CSS ID space to fix the cgroup creation failures. It introduced IDR to maintain the memcg ID space. The IDR depends on external synchronization mechanisms for modifications. For the mem_cgroup_idr, the idr_alloc() and idr_replace() happen within css callback and thus are protected through cgroup_mutex from concurrent modifications. However idr_remove() for mem_cgroup_idr was not protected against concurrency and can be run concurrently for different memcgs when they hit their refcnt to zero. Fix that. We have been seeing list_lru based kernel crashes at a low frequency in our fleet for a long time. These crashes were in different part of list_lru code including list_lru_add(), list_lru_del() and reparenting code. Upon further inspection, it looked like for a given object (dentry and inode), the super_block's list_lru didn't have list_lru_one for the memcg of that object. The initial suspicions were either the object is not allocated through kmem_cache_alloc_lru() or somehow memcg_list_lru_alloc() failed to allocate list_lru_one() for a memcg but returned success. No evidence were found for these cases. Looking more deeply, we started seeing situations where valid memcg's id is not present in mem_cgroup_idr and in some cases multiple valid memcgs have same id and mem_cgroup_idr is pointing to one of them. So, the most reasonable explanation is that these situations can happen due to race between multiple idr_remove() calls or race between idr_alloc()/idr_replace() and idr_remove(). These races are causing multiple memcgs to acquire the same ID and then offlining of one of them would cleanup list_lrus on the system for all of them. Later access from other memcgs to the list_lru cause crashes due to missing list_lru_one.[/TD]
[TD]2024-08-26[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43892']CVE-2024-43892[/URL]
[URL='https://git.kernel.org/stable/c/37a060b64ae83b76600d187d76591ce488ab836b']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/51c0b1bb7541f8893ec1accba59eb04361a70946']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/9972605a238339b85bd16b084eed5f18414d22db']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]Linux--Linux
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: serial: core: check uartclk for zero to avoid divide by zero Calling ioctl TIOCSSERIAL with an invalid baud_base can result in uartclk being zero, which will result in a divide by zero error in uart_get_divisor(). The check for uartclk being zero in uart_set_info() needs to be done before other settings are made as subsequent calls to ioctl TIOCSSERIAL for the same port would be impacted if the uartclk check was done where uartclk gets set. Oops: divide error: 0000 PREEMPT SMP KASAN PTI RIP: 0010:uart_get_divisor (drivers/tty/serial/serial_core.c:580) Call Trace: <TASK> serial8250_get_divisor (drivers/tty/serial/8250/8250_port.c:2576 drivers/tty/serial/8250/8250_port.c:2589) serial8250_do_set_termios (drivers/tty/serial/8250/8250_port.c:502 drivers/tty/serial/8250/8250_port.c:2741) serial8250_set_termios (drivers/tty/serial/8250/8250_port.c:2862) uart_change_line_settings (./include/linux/spinlock.h:376 ./include/linux/serial_core.h:608 drivers/tty/serial/serial_core.c:222) uart_port_startup (drivers/tty/serial/serial_core.c:342) uart_startup (drivers/tty/serial/serial_core.c:368) uart_set_info (drivers/tty/serial/serial_core.c:1034) uart_set_info_user (drivers/tty/serial/serial_core.c:1059) tty_set_serial (drivers/tty/tty_io.c:2637) tty_ioctl (drivers/tty/tty_io.c:2647 drivers/tty/tty_io.c:2791) __x64_sys_ioctl (fs/ioctl.c:52 fs/ioctl.c:907 fs/ioctl.c:893 fs/ioctl.c:893) do_syscall_64 (arch/x86/entry/common.c:52 (discriminator 1) arch/x86/entry/common.c:83 (discriminator 1)) entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) Rule: add[/TD]
[TD]2024-08-26[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43893']CVE-2024-43893[/URL]
[URL='https://git.kernel.org/stable/c/3bbd90fca824e6fd61fb20f6dd2b0fa5f8b14bba']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/52b138f1021113e593ee6ad258ce08fe90693a9e']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/55b2a5d331a6ceb1c4372945fdb77181265ba24f']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/68dc02f319b9ee54dc23caba742a5c754d1cccc8']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/6eabce6608d6f3440f4c03aa3d3ef50a47a3d193']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/9196e42a3b8eeff1707e6ef769112b4b6096be49']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/e13ba3fe5ee070f8a9dab60029d52b1f61da5051']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/e3ad503876283ac3fcca922a1bf243ef9eb0b0e2']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]Linux--Linux
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: drm/client: fix null pointer dereference in drm_client_modeset_probe In drm_client_modeset_probe(), the return value of drm_mode_duplicate() is assigned to modeset->mode, which will lead to a possible NULL pointer dereference on failure of drm_mode_duplicate(). Add a check to avoid npd.[/TD]
[TD]2024-08-26[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43894']CVE-2024-43894[/URL]
[URL='https://git.kernel.org/stable/c/113fd6372a5bb3689aba8ef5b8a265ed1529a78f']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/24ddda932c43ffe156c7f3c568bed85131c63ae6']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/5291d4f73452c91e8a11f71207617e3e234d418e']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/612cae53e99ce32a58cb821b3b67199eb6e92dff']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/c763dfe09425152b6bb0e348900a637c62c2ce52']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/d64847c383100423aecb6ac5f18be5f4316d9d62']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/d64fc94f7bb24fc2be0d6bd5df8df926da461a6d']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]Linux--Linux
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Skip Recompute DSC Params if no Stream on Link [why] Encounter NULL pointer dereference uner mst + dsc setup. BUG: kernel NULL pointer dereference, address: 0000000000000008 PGD 0 P4D 0 Oops: 0000 [#1] PREEMPT SMP NOPTI CPU: 4 PID: 917 Comm: sway Not tainted 6.3.9-arch1-1 #1 124dc55df4f5272ccb409f39ef4872fc2b3376a2 Hardware name: LENOVO 20NKS01Y00/20NKS01Y00, BIOS R12ET61W(1.31 ) 07/28/2022 RIP: 0010:drm_dp_atomic_find_time_slots+0x5e/0x260 [drm_display_helper] Code: 01 00 00 48 8b 85 60 05 00 00 48 63 80 88 00 00 00 3b 43 28 0f 8d 2e 01 00 00 48 8b 53 30 48 8d 04 80 48 8d 04 c2 48 8b 40 18 <48> 8> RSP: 0018:ffff960cc2df77d8 EFLAGS: 00010293 RAX: 0000000000000000 RBX: ffff8afb87e81280 RCX: 0000000000000224 RDX: ffff8afb9ee37c00 RSI: ffff8afb8da1a578 RDI: ffff8afb87e81280 RBP: ffff8afb83d67000 R08: 0000000000000001 R09: ffff8afb9652f850 R10: ffff960cc2df7908 R11: 0000000000000002 R12: 0000000000000000 R13: ffff8afb8d7688a0 R14: ffff8afb8da1a578 R15: 0000000000000224 FS: 00007f4dac35ce00(0000) GS:ffff8afe30b00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000008 CR3: 000000010ddc6000 CR4: 00000000003506e0 Call Trace: <TASK> ? __die+0x23/0x70 ? page_fault_oops+0x171/0x4e0 ? plist_add+0xbe/0x100 ? exc_page_fault+0x7c/0x180 ? asm_exc_page_fault+0x26/0x30 ? drm_dp_atomic_find_time_slots+0x5e/0x260 [drm_display_helper 0e67723696438d8e02b741593dd50d80b44c2026] ? drm_dp_atomic_find_time_slots+0x28/0x260 [drm_display_helper 0e67723696438d8e02b741593dd50d80b44c2026] compute_mst_dsc_configs_for_link+0x2ff/0xa40 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054] ? fill_plane_buffer_attributes+0x419/0x510 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054] compute_mst_dsc_configs_for_state+0x1e1/0x250 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054] amdgpu_dm_atomic_check+0xecd/0x1190 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054] drm_atomic_check_only+0x5c5/0xa40 drm_mode_atomic_ioctl+0x76e/0xbc0 [how] dsc recompute should be skipped if no mode change detected on the new request. If detected, keep checking whether the stream is already on current state or not. (cherry picked from commit 8151a6c13111b465dbabe07c19f572f7cbd16fef)[/TD]
[TD]2024-08-26[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43895']CVE-2024-43895[/URL]
[URL='https://git.kernel.org/stable/c/282f0a482ee61d5e863512f3c4fcec90216c20d9']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/50e376f1fe3bf571d0645ddf48ad37eb58323919']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/70275bb960c71d313254473d38c14e7101cee5ad']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/718d83f66fb07b2cab89a1fc984613a00e3db18f']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]Linux--Linux
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: ASoC: cs-amp-lib: Fix NULL pointer crash if efi.get_variable is NULL Call efi_rt_services_supported() to check that efi.get_variable exists before calling it.[/TD]
[TD]2024-08-26[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43896']CVE-2024-43896[/URL]
[URL='https://git.kernel.org/stable/c/5b6baaa7cbd77ff980516bad38bbc5a648bb5158']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/dc268085e499666b9f4f0fcb4c5a94e1c0b193b3']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]Linux--Linux
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: net: drop bad gso csum_start and offset in virtio_net_hdr Tighten csum_start and csum_offset checks in virtio_net_hdr_to_skb for GSO packets. The function already checks that a checksum requested with VIRTIO_NET_HDR_F_NEEDS_CSUM is in skb linear. But for GSO packets this might not hold for segs after segmentation. Syzkaller demonstrated to reach this warning in skb_checksum_help offset = skb_checksum_start_offset(skb); ret = -EINVAL; if (WARN_ON_ONCE(offset >= skb_headlen(skb))) By injecting a TSO packet: WARNING: CPU: 1 PID: 3539 at net/core/dev.c:3284 skb_checksum_help+0x3d0/0x5b0 ip_do_fragment+0x209/0x1b20 net/ipv4/ip_output.c:774 ip_finish_output_gso net/ipv4/ip_output.c:279 [inline] __ip_finish_output+0x2bd/0x4b0 net/ipv4/ip_output.c:301 iptunnel_xmit+0x50c/0x930 net/ipv4/ip_tunnel_core.c:82 ip_tunnel_xmit+0x2296/0x2c70 net/ipv4/ip_tunnel.c:813 __gre_xmit net/ipv4/ip_gre.c:469 [inline] ipgre_xmit+0x759/0xa60 net/ipv4/ip_gre.c:661 __netdev_start_xmit include/linux/netdevice.h:4850 [inline] netdev_start_xmit include/linux/netdevice.h:4864 [inline] xmit_one net/core/dev.c:3595 [inline] dev_hard_start_xmit+0x261/0x8c0 net/core/dev.c:3611 __dev_queue_xmit+0x1b97/0x3c90 net/core/dev.c:4261 packet_snd net/packet/af_packet.c:3073 [inline] The geometry of the bad input packet at tcp_gso_segment: [ 52.003050][ T8403] skb len=12202 headroom=244 headlen=12093 tailroom=0 [ 52.003050][ T8403] mac=(168,24) mac_len=24 net=(192,52) trans=244 [ 52.003050][ T8403] shinfo(txflags=0 nr_frags=1 gso(size=1552 type=3 segs=0)) [ 52.003050][ T8403] csum(0x60000c7 start=199 offset=1536 ip_summed=3 complete_sw=0 valid=0 level=0) Mitigate with stricter input validation. csum_offset: for GSO packets, deduce the correct value from gso_type. This is already done for USO. Extend it to TSO. Let UFO be: udp[46]_ufo_fragment ignores these fields and always computes the checksum in software. csum_start: finding the real offset requires parsing to the transport header. Do not add a parser, use existing segmentation parsing. Thanks to SKB_GSO_DODGY, that also catches bad packets that are hw offloaded. Again test both TSO and USO. Do not test UFO for the above reason, and do not test UDP tunnel offload. GSO packet are almost always CHECKSUM_PARTIAL. USO packets may be CHECKSUM_NONE since commit 10154dbded6d6 ("udp: Allow GSO transmit from devices with no checksum offload"), but then still these fields are initialized correctly in udp4_hwcsum/udp6_hwcsum_outgoing. So no need to test for ip_summed == CHECKSUM_PARTIAL first. This revises an existing fix mentioned in the Fixes tag, which broke small packets with GSO offload, as detected by kselftests.[/TD]
[TD]2024-08-26[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43897']CVE-2024-43897[/URL]
[URL='https://git.kernel.org/stable/c/2edbb3e8838c672cd7e247e47989df9d03fc6668']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/6772c4868a8e7ad5305957cdb834ce881793acb7']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/89add40066f9ed9abe5f7f886fe5789ff7e0c50e']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/f01c5e335fbb7fb612d40f14a3c02e2612a43d3b']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]Linux--Linux
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: ext4: sanity check for NULL pointer after ext4_force_shutdown Test case: 2 threads write short inline data to a file. In ext4_page_mkwrite the resulting inline data is converted. Handling ext4_grp_locked_error with description "block bitmap and bg descriptor inconsistent: X vs Y free clusters" calls ext4_force_shutdown. The conversion clears EXT4_STATE_MAY_INLINE_DATA but fails for ext4_destroy_inline_data_nolock and ext4_mark_iloc_dirty due to ext4_forced_shutdown. The restoration of inline data fails for the same reason not setting EXT4_STATE_MAY_INLINE_DATA. Without the flag set a regular process path in ext4_da_write_end follows trying to dereference page folio private pointer that has not been set. The fix calls early return with -EIO error shall the pointer to private be NULL. Sample crash report: Unable to handle kernel paging request at virtual address dfff800000000004 KASAN: null-ptr-deref in range [0x0000000000000020-0x0000000000000027] Mem abort info: ESR = 0x0000000096000005 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x05: level 1 translation fault Data abort info: ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000 CM = 0, WnR = 0, TnD = 0, TagAccess = 0 GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [dfff800000000004] address between user and kernel address ranges Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP Modules linked in: CPU: 1 PID: 20274 Comm: syz-executor185 Not tainted 6.9.0-rc7-syzkaller-gfda5695d692c #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __block_commit_write+0x64/0x2b0 fs/buffer.c:2167 lr : __block_commit_write+0x3c/0x2b0 fs/buffer.c:2160 sp : ffff8000a1957600 x29: ffff8000a1957610 x28: dfff800000000000 x27: ffff0000e30e34b0 x26: 0000000000000000 x25: dfff800000000000 x24: dfff800000000000 x23: fffffdffc397c9e0 x22: 0000000000000020 x21: 0000000000000020 x20: 0000000000000040 x19: fffffdffc397c9c0 x18: 1fffe000367bd196 x17: ffff80008eead000 x16: ffff80008ae89e3c x15: 00000000200000c0 x14: 1fffe0001cbe4e04 x13: 0000000000000000 x12: 0000000000000000 x11: 0000000000000001 x10: 0000000000ff0100 x9 : 0000000000000000 x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000000 x5 : fffffdffc397c9c0 x4 : 0000000000000020 x3 : 0000000000000020 x2 : 0000000000000040 x1 : 0000000000000020 x0 : fffffdffc397c9c0 Call trace: __block_commit_write+0x64/0x2b0 fs/buffer.c:2167 block_write_end+0xb4/0x104 fs/buffer.c:2253 ext4_da_do_write_end fs/ext4/inode.c:2955 [inline] ext4_da_write_end+0x2c4/0xa40 fs/ext4/inode.c:3028 generic_perform_write+0x394/0x588 mm/filemap.c:3985 ext4_buffered_write_iter+0x2c0/0x4ec fs/ext4/file.c:299 ext4_file_write_iter+0x188/0x1780 call_write_iter include/linux/fs.h:2110 [inline] new_sync_write fs/read_write.c:497 [inline] vfs_write+0x968/0xc3c fs/read_write.c:590 ksys_write+0x15c/0x26c fs/read_write.c:643 __do_sys_write fs/read_write.c:655 [inline] __se_sys_write fs/read_write.c:652 [inline] __arm64_sys_write+0x7c/0x90 fs/read_write.c:652 __invoke_syscall arch/arm64/kernel/syscall.c:34 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:48 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:133 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:152 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 Code: 97f85911 f94002da 91008356 d343fec8 (38796908) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: 97f85911 bl 0xffffffffffe16444 4: f94002da ldr x26, [x22] 8: 91008356 add x22, x26, #0x20 c: d343fec8 lsr x8, x22, #3 * 10: 38796908 ldrb w8, [x8, x25] <-- trapping instruction[/TD]
[TD]2024-08-26[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43898']CVE-2024-43898[/URL]
[URL='https://git.kernel.org/stable/c/3f6bbe6e07e5239294ecc3d2efa70d1f98aed52e']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/83f4414b8f84249d538905825b088ff3ae555652']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/f619876ccbfd329ae785fe5d3289b9dcd6eb5901']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]Linux--Linux
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: bpf: add missing check_func_arg_reg_off() to prevent out-of-bounds memory accesses Currently, it's possible to pass in a modified CONST_PTR_TO_DYNPTR to a global function as an argument. The adverse effects of this is that BPF helpers can continue to make use of this modified CONST_PTR_TO_DYNPTR from within the context of the global function, which can unintentionally result in out-of-bounds memory accesses and therefore compromise overall system stability i.e. [ 244.157771] BUG: KASAN: slab-out-of-bounds in bpf_dynptr_data+0x137/0x140 [ 244.161345] Read of size 8 at addr ffff88810914be68 by task test_progs/302 [ 244.167151] CPU: 0 PID: 302 Comm: test_progs Tainted: G O E 6.10.0-rc3-00131-g66b586715063 #533 [ 244.174318] Call Trace: [ 244.175787] <TASK> [ 244.177356] dump_stack_lvl+0x66/0xa0 [ 244.179531] print_report+0xce/0x670 [ 244.182314] ? __virt_addr_valid+0x200/0x3e0 [ 244.184908] kasan_report+0xd7/0x110 [ 244.187408] ? bpf_dynptr_data+0x137/0x140 [ 244.189714] ? bpf_dynptr_data+0x137/0x140 [ 244.192020] bpf_dynptr_data+0x137/0x140 [ 244.194264] bpf_prog_b02a02fdd2bdc5fa_global_call_bpf_dynptr_data+0x22/0x26 [ 244.198044] bpf_prog_b0fe7b9d7dc3abde_callback_adjust_bpf_dynptr_reg_off+0x1f/0x23 [ 244.202136] bpf_user_ringbuf_drain+0x2c7/0x570 [ 244.204744] ? 0xffffffffc0009e58 [ 244.206593] ? __pfx_bpf_user_ringbuf_drain+0x10/0x10 [ 244.209795] bpf_prog_33ab33f6a804ba2d_user_ringbuf_callback_const_ptr_to_dynptr_reg_off+0x47/0x4b [ 244.215922] bpf_trampoline_6442502480+0x43/0xe3 [ 244.218691] __x64_sys_prlimit64+0x9/0xf0 [ 244.220912] do_syscall_64+0xc1/0x1d0 [ 244.223043] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 244.226458] RIP: 0033:0x7ffa3eb8f059 [ 244.228582] Code: 08 89 e8 5b 5d c3 66 2e 0f 1f 84 00 00 00 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8f 1d 0d 00 f7 d8 64 89 01 48 [ 244.241307] RSP: 002b:00007ffa3e9c6eb8 EFLAGS: 00000206 ORIG_RAX: 000000000000012e [ 244.246474] RAX: ffffffffffffffda RBX: 00007ffa3e9c7cdc RCX: 00007ffa3eb8f059 [ 244.250478] RDX: 00007ffa3eb162b4 RSI: 0000000000000000 RDI: 00007ffa3e9c7fb0 [ 244.255396] RBP: 00007ffa3e9c6ed0 R08: 00007ffa3e9c76c0 R09: 0000000000000000 [ 244.260195] R10: 0000000000000000 R11: 0000000000000206 R12: ffffffffffffff80 [ 244.264201] R13: 000000000000001c R14: 00007ffc5d6b4260 R15: 00007ffa3e1c7000 [ 244.268303] </TASK> Add a check_func_arg_reg_off() to the path in which the BPF verifier verifies the arguments of global function arguments, specifically those which take an argument of type ARG_PTR_TO_DYNPTR | MEM_RDONLY. Also, process_dynptr_func() doesn't appear to perform any explicit and strict type matching on the supplied register type, so let's also enforce that a register either type PTR_TO_STACK or CONST_PTR_TO_DYNPTR is by the caller.[/TD]
[TD]2024-08-26[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43910']CVE-2024-43910[/URL]
[URL='https://git.kernel.org/stable/c/13663a7c644bf1dedaf461d07252db5d76c8759a']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/ec2b9a5e11e51fea1bb04c1e7e471952e887e874']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]Linux--Linux
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: wifi: nl80211: disallow setting special AP channel widths Setting the AP channel width is meant for use with the normal 20/40/... MHz channel width progression, and switching around in S1G or narrow channels isn't supported. Disallow that.[/TD]
[TD]2024-08-26[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43912']CVE-2024-43912[/URL]
[URL='https://git.kernel.org/stable/c/23daf1b4c91db9b26f8425cc7039cf96d22ccbfe']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/3d42f2125f6c89e1e71c87b9f23412afddbba45e']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/ac3bf6e47fd8da9bfe8027e1acfe0282a91584fc']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/c6ea738e3feb407a3283197d9a25d0788f4f3cee']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]Linux--Linux
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: nvme: apple: fix device reference counting Drivers must call nvme_uninit_ctrl after a successful nvme_init_ctrl. Split the allocation side out to make the error handling boundary easier to navigate. The apple driver had been doing this wrong, leaking the controller device memory on a tagset failure.[/TD]
[TD]2024-08-26[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43913']CVE-2024-43913[/URL]
[URL='https://git.kernel.org/stable/c/b9ecbfa45516182cd062fecd286db7907ba84210']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/d59c4d0eb6adc24c2201f153ccb7fd0a335b0d3d']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]Linux--Linux
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: md/raid5: avoid BUG_ON() while continue reshape after reassembling Currently, mdadm support --revert-reshape to abort the reshape while reassembling, as the test 07revert-grow. However, following BUG_ON() can be triggerred by the test: kernel BUG at drivers/md/raid5.c:6278! invalid opcode: 0000 [#1] PREEMPT SMP PTI irq event stamp: 158985 CPU: 6 PID: 891 Comm: md0_reshape Not tainted 6.9.0-03335-g7592a0b0049a #94 RIP: 0010:reshape_request+0x3f1/0xe60 Call Trace: <TASK> raid5_sync_request+0x43d/0x550 md_do_sync+0xb7a/0x2110 md_thread+0x294/0x2b0 kthread+0x147/0x1c0 ret_from_fork+0x59/0x70 ret_from_fork_asm+0x1a/0x30 </TASK> Root cause is that --revert-reshape update the raid_disks from 5 to 4, while reshape position is still set, and after reassembling the array, reshape position will be read from super block, then during reshape the checking of 'writepos' that is caculated by old reshape position will fail. Fix this panic the easy way first, by converting the BUG_ON() to WARN_ON(), and stop the reshape if checkings fail. Noted that mdadm must fix --revert-shape as well, and probably md/raid should enhance metadata validation as well, however this means reassemble will fail and there must be user tools to fix the wrong metadata.[/TD]
[TD]2024-08-26[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-43914']CVE-2024-43914[/URL]
[URL='https://git.kernel.org/stable/c/2c92f8c1c456d556f15cbf51667b385026b2e6a0']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/305a5170dc5cf3d395bb4c4e9239bca6d0b54b49']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/3b33740c1750a39e046339ff9240e954f0156707']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/4811d6e5d9f4090c3e0ff9890eb24077108046ab']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/6b33c468d543f6a83de2d61f09fec74b27e19fd2']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/775a9ba16c9ffe98fe54ebf14e55d5660f2bf600']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/bf0ff69a42a3d2d46876d0514ecf13dffc516666']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/c384dd4f1fb3b14a2fd199360701cc163ea88705']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]Linux--Linux
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: gpio: prevent potential speculation leaks in gpio_device_get_desc() Userspace may trigger a speculative read of an address outside the gpio descriptor array. Users can do that by calling gpio_ioctl() with an offset out of range. Offset is copied from user and then used as an array index to get the gpio descriptor without sanitization in gpio_device_get_desc(). This change ensures that the offset is sanitized by using array_index_nospec() to mitigate any possibility of speculative information leaks. This bug was discovered and resolved using Coverity Static Analysis Security Testing (SAST) by Synopsys, Inc.[/TD]
[TD]2024-08-26[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44931']CVE-2024-44931[/URL]
[URL='https://git.kernel.org/stable/c/1b955f786a4bcde8c0ccb2b7d519def2acb6f3cc']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/d776c0486b03a5c4afca65b8ff44573592bf93bb']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/d795848ecce24a75dfd46481aee066ae6fe39775']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]Linux--Linux
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: power: supply: rt5033: Bring back i2c_set_clientdata Commit 3a93da231c12 ("power: supply: rt5033: Use devm_power_supply_register() helper") reworked the driver to use devm. While at it, the i2c_set_clientdata was dropped along with the remove callback. Unfortunately other parts of the driver also rely on i2c clientdata so this causes kernel oops. Bring the call back to fix the driver.[/TD]
[TD]2024-08-26[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44936']CVE-2024-44936[/URL]
[URL='https://git.kernel.org/stable/c/3c5d0871b0af0184abc6f7f52f8705b39a6251ae']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/d3911f1639e67fc7b12aae0efa5a540976d7443b']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]Linux--Linux
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: jfs: Fix shift-out-of-bounds in dbDiscardAG When searching for the next smaller log2 block, BLKSTOL2() returned 0, causing shift exponent -1 to be negative. This patch fixes the issue by exiting the loop directly when negative shift is found.[/TD]
[TD]2024-08-26[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44938']CVE-2024-44938[/URL]
[URL='https://git.kernel.org/stable/c/234e6ea0855cdb5673d54ecaf7dc5c78f3e84630']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/7063b80268e2593e58bee8a8d709c2f3ff93e2f2']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/bd04a149e3a29e7f71b7956ed41dba34e42d539e']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/f650148b43949ca9e37e820804bb6026fff404f3']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]Linux--Linux
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: jfs: fix null ptr deref in dtInsertEntry [syzbot reported] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN PTI KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f] CPU: 0 PID: 5061 Comm: syz-executor404 Not tainted 6.8.0-syzkaller-08951-gfe46a7dd189e #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 RIP: 0010:dtInsertEntry+0xd0c/0x1780 fs/jfs/jfs_dtree.c:3713 ... [Analyze] In dtInsertEntry(), when the pointer h has the same value as p, after writing name in UniStrncpy_to_le(), p->header.flag will be cleared. This will cause the previously true judgment "p->header.flag & BT-LEAF" to change to no after writing the name operation, this leads to entering an incorrect branch and accessing the uninitialized object ih when judging this condition for the second time. [Fix] After got the page, check freelist first, if freelist == 0 then exit dtInsert() and return -EINVAL.[/TD]
[TD]2024-08-26[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44939']CVE-2024-44939[/URL]
[URL='https://git.kernel.org/stable/c/53023ab11836ac56fd75f7a71ec1356e50920fa9']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/6ea10dbb1e6c58384136e9adfd75f81951e423f6']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/9c2ac38530d1a3ee558834dfa16c85a40fd0e702']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/ce6dede912f064a855acf6f04a04cbb2c25b8c8c']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]Linux--Linux
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: fou: remove warn in gue_gro_receive on unsupported protocol Drop the WARN_ON_ONCE inn gue_gro_receive if the encapsulated type is not known or does not have a GRO handler. Such a packet is easily constructed. Syzbot generates them and sets off this warning. Remove the warning as it is expected and not actionable. The warning was previously reduced from WARN_ON to WARN_ON_ONCE in commit 270136613bf7 ("fou: Do WARN_ON_ONCE in gue_gro_receive for bad proto callbacks").[/TD]
[TD]2024-08-26[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44940']CVE-2024-44940[/URL]
[URL='https://git.kernel.org/stable/c/3db4395332e7050ef9ddeb3052e6b5019f2a2a59']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/440ab7f97261bc28501636a13998e1b1946d2e79']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/5a2e37bc648a2503bf6d687aed27b9f4455d82eb']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/dd89a81d850fa9a65f67b4527c0e420d15bf836c']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]Linux--Linux
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to cover read extent cache access with lock syzbot reports a f2fs bug as below: BUG: KASAN: slab-use-after-free in sanity_check_extent_cache+0x370/0x410 fs/f2fs/extent_cache.c:46 Read of size 4 at addr ffff8880739ab220 by task syz-executor200/5097 CPU: 0 PID: 5097 Comm: syz-executor200 Not tainted 6.9.0-rc6-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114 print_address_description mm/kasan/report.c:377 [inline] print_report+0x169/0x550 mm/kasan/report.c:488 kasan_report+0x143/0x180 mm/kasan/report.c:601 sanity_check_extent_cache+0x370/0x410 fs/f2fs/extent_cache.c:46 do_read_inode fs/f2fs/inode.c:509 [inline] f2fs_iget+0x33e1/0x46e0 fs/f2fs/inode.c:560 f2fs_nfs_get_inode+0x74/0x100 fs/f2fs/super.c:3237 generic_fh_to_dentry+0x9f/0xf0 fs/libfs.c:1413 exportfs_decode_fh_raw+0x152/0x5f0 fs/exportfs/expfs.c:444 exportfs_decode_fh+0x3c/0x80 fs/exportfs/expfs.c:584 do_handle_to_path fs/fhandle.c:155 [inline] handle_to_path fs/fhandle.c:210 [inline] do_handle_open+0x495/0x650 fs/fhandle.c:226 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f We missed to cover sanity_check_extent_cache() w/ extent cache lock, so, below race case may happen, result in use after free issue. - f2fs_iget - do_read_inode - f2fs_init_read_extent_tree : add largest extent entry in to cache - shrink - f2fs_shrink_read_extent_tree - __shrink_extent_tree - __detach_extent_node : drop largest extent entry - sanity_check_extent_cache : access et->largest w/o lock let's refactor sanity_check_extent_cache() to avoid extent cache access and call it before f2fs_init_read_extent_tree() to fix this issue.[/TD]
[TD]2024-08-26[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44941']CVE-2024-44941[/URL]
[URL='https://git.kernel.org/stable/c/263df78166d3a9609b97d28c34029bd01874cbb8']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/323ef20b5558b9d9fd10c1224327af6f11a8177d']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/d7409b05a64f212735f0d33f5f1602051a886eab']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]Linux--Linux
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: mm: gup: stop abusing try_grab_folio A kernel warning was reported when pinning folio in CMA memory when launching SEV virtual machine. The splat looks like: [ 464.325306] WARNING: CPU: 13 PID: 6734 at mm/gup.c:1313 __get_user_pages+0x423/0x520 [ 464.325464] CPU: 13 PID: 6734 Comm: qemu-kvm Kdump: loaded Not tainted 6.6.33+ #6 [ 464.325477] RIP: 0010:__get_user_pages+0x423/0x520 [ 464.325515] Call Trace: [ 464.325520] <TASK> [ 464.325523] ? __get_user_pages+0x423/0x520 [ 464.325528] ? __warn+0x81/0x130 [ 464.325536] ? __get_user_pages+0x423/0x520 [ 464.325541] ? report_bug+0x171/0x1a0 [ 464.325549] ? handle_bug+0x3c/0x70 [ 464.325554] ? exc_invalid_op+0x17/0x70 [ 464.325558] ? asm_exc_invalid_op+0x1a/0x20 [ 464.325567] ? __get_user_pages+0x423/0x520 [ 464.325575] __gup_longterm_locked+0x212/0x7a0 [ 464.325583] internal_get_user_pages_fast+0xfb/0x190 [ 464.325590] pin_user_pages_fast+0x47/0x60 [ 464.325598] sev_pin_memory+0xca/0x170 [kvm_amd] [ 464.325616] sev_mem_enc_register_region+0x81/0x130 [kvm_amd] Per the analysis done by yangge, when starting the SEV virtual machine, it will call pin_user_pages_fast(..., FOLL_LONGTERM, ...) to pin the memory. But the page is in CMA area, so fast GUP will fail then fallback to the slow path due to the longterm pinnalbe check in try_grab_folio(). The slow path will try to pin the pages then migrate them out of CMA area. But the slow path also uses try_grab_folio() to pin the page, it will also fail due to the same check then the above warning is triggered. In addition, the try_grab_folio() is supposed to be used in fast path and it elevates folio refcount by using add ref unless zero. We are guaranteed to have at least one stable reference in slow path, so the simple atomic add could be used. The performance difference should be trivial, but the misuse may be confusing and misleading. Redefined try_grab_folio() to try_grab_folio_fast(), and try_grab_page() to try_grab_folio(), and use them in the proper paths. This solves both the abuse and the kernel warning. The proper naming makes their usecase more clear and should prevent from abusing in the future. peterx said: : The user will see the pin fails, for gpu-slow it further triggers the WARN : right below that failure (as in the original report): : : folio = try_grab_folio(page, page_increm - 1, : foll_flags); : if (WARN_ON_ONCE(!folio)) { <------------------------ here : /* : * Release the 1st page ref if the : * folio is problematic, fail hard. : */ : gup_put_folio(page_folio(page), 1, : foll_flags); : ret = -EFAULT; : goto out; : } [1] https://lore.kernel.org/linux-mm/[email protected]/ [[email protected]: fix implicit declaration of function try_grab_folio_fast] Link: https://lkml.kernel.org/r/CAHbLzkowMSso-4Nufc9hcMehQsK9PNz3OSu-+eniU-2Mm-xjhA@mail.gmail.com[/TD]
[TD]2024-08-28[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44943']CVE-2024-44943[/URL]
[URL='https://git.kernel.org/stable/c/26273f5f4cf68b29414e403837093408a9c98e1f']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/f442fa6141379a20b48ae3efabee827a3d260787']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]Linux--Linux
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: netfilter: ctnetlink: use helper function to calculate expect ID Delete expectation path is missing a call to the nf_expect_get_id() helper function to calculate the expectation ID, otherwise LSB of the expectation object address is leaked to userspace.[/TD]
[TD]2024-08-30[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44944']CVE-2024-44944[/URL]
[URL='https://git.kernel.org/stable/c/24f407042cf90b0872de667460230d8d50c06c39']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/27662b46f2adaa52c1665a82af4b21c42c4337fd']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/5e2c24f7b0911b15c29aefce760bcf770542fb61']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/64c0b8e64be8368617ef08dfc59a3160563a1435']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/66e7650dbbb8e236e781c670b167edc81e771450']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/74de442b8e12a207c07953ee068009a7701aff8f']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/782161895eb4ac45cf7cfa8db375bd4766cb8299']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/eb4ca1a97e08ff5b920664ba292e576257e2d184']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]Linux--Linux
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: netfilter: nfnetlink: Initialise extack before use in ACKs Add missing extack initialisation when ACKing BATCH_BEGIN and BATCH_END.[/TD]
[TD]2024-08-31[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44945']CVE-2024-44945[/URL]
[URL='https://git.kernel.org/stable/c/3e03b536d9454c5802168b9e85248d456d3ff6a3']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/d1a7b382a9d3f0f3e5a80e0be2991c075fa4f618']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]Linux--Linux
[/TD]
[TD]In the Linux kernel, the following vulnerability has been resolved: kcm: Serialise kcm_sendmsg() for the same socket. syzkaller reported UAF in kcm_release(). [0] The scenario is 1. Thread A builds a skb with MSG_MORE and sets kcm->seq_skb. 2. Thread A resumes building skb from kcm->seq_skb but is blocked by sk_stream_wait_memory() 3. Thread B calls sendmsg() concurrently, finishes building kcm->seq_skb and puts the skb to the write queue 4. Thread A faces an error and finally frees skb that is already in the write queue 5. kcm_release() does double-free the skb in the write queue When a thread is building a MSG_MORE skb, another thread must not touch it. Let's add a per-sk mutex and serialise kcm_sendmsg(). [0]: BUG: KASAN: slab-use-after-free in __skb_unlink include/linux/skbuff.h:2366 [inline] BUG: KASAN: slab-use-after-free in __skb_dequeue include/linux/skbuff.h:2385 [inline] BUG: KASAN: slab-use-after-free in __skb_queue_purge_reason include/linux/skbuff.h:3175 [inline] BUG: KASAN: slab-use-after-free in __skb_queue_purge include/linux/skbuff.h:3181 [inline] BUG: KASAN: slab-use-after-free in kcm_release+0x170/0x4c8 net/kcm/kcmsock.c:1691 Read of size 8 at addr ffff0000ced0fc80 by task syz-executor329/6167 CPU: 1 PID: 6167 Comm: syz-executor329 Tainted: G B 6.8.0-rc5-syzkaller-g9abbc24128bc #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:291 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:298 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xd0/0x124 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:377 [inline] print_report+0x178/0x518 mm/kasan/report.c:488 kasan_report+0xd8/0x138 mm/kasan/report.c:601 __asan_report_load8_noabort+0x20/0x2c mm/kasan/report_generic.c:381 __skb_unlink include/linux/skbuff.h:2366 [inline] __skb_dequeue include/linux/skbuff.h:2385 [inline] __skb_queue_purge_reason include/linux/skbuff.h:3175 [inline] __skb_queue_purge include/linux/skbuff.h:3181 [inline] kcm_release+0x170/0x4c8 net/kcm/kcmsock.c:1691 __sock_release net/socket.c:659 [inline] sock_close+0xa4/0x1e8 net/socket.c:1421 __fput+0x30c/0x738 fs/file_table.c:376 ____fput+0x20/0x30 fs/file_table.c:404 task_work_run+0x230/0x2e0 kernel/task_work.c:180 exit_task_work include/linux/task_work.h:38 [inline] do_exit+0x618/0x1f64 kernel/exit.c:871 do_group_exit+0x194/0x22c kernel/exit.c:1020 get_signal+0x1500/0x15ec kernel/signal.c:2893 do_signal+0x23c/0x3b44 arch/arm64/kernel/signal.c:1249 do_notify_resume+0x74/0x1f4 arch/arm64/kernel/entry-common.c:148 exit_to_user_mode_prepare arch/arm64/kernel/entry-common.c:169 [inline] exit_to_user_mode arch/arm64/kernel/entry-common.c:178 [inline] el0_svc+0xac/0x168 arch/arm64/kernel/entry-common.c:713 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 Allocated by task 6166: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x40/0x78 mm/kasan/common.c:68 kasan_save_alloc_info+0x70/0x84 mm/kasan/generic.c:626 unpoison_slab_object mm/kasan/common.c:314 [inline] __kasan_slab_alloc+0x74/0x8c mm/kasan/common.c:340 kasan_slab_alloc include/linux/kasan.h:201 [inline] slab_post_alloc_hook mm/slub.c:3813 [inline] slab_alloc_node mm/slub.c:3860 [inline] kmem_cache_alloc_node+0x204/0x4c0 mm/slub.c:3903 __alloc_skb+0x19c/0x3d8 net/core/skbuff.c:641 alloc_skb include/linux/skbuff.h:1296 [inline] kcm_sendmsg+0x1d3c/0x2124 net/kcm/kcmsock.c:783 sock_sendmsg_nosec net/socket.c:730 [inline] __sock_sendmsg net/socket.c:745 [inline] sock_sendmsg+0x220/0x2c0 net/socket.c:768 splice_to_socket+0x7cc/0xd58 fs/splice.c:889 do_splice_from fs/splice.c:941 [inline] direct_splice_actor+0xec/0x1d8 fs/splice.c:1164 splice_direct_to_actor+0x438/0xa0c fs/splice.c:1108 do_splice_direct_actor ---truncated---[/TD]
[TD]2024-08-31[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44946']CVE-2024-44946[/URL]
[URL='https://git.kernel.org/stable/c/00425508f30baa5ab6449a1f478480ca7cffa6da']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/72da240aafb142630cf16adc803ccdacb3780849']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/807067bf014d4a3ae2cc55bd3de16f22a01eb580']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[URL='https://git.kernel.org/stable/c/9c8d544ed619f704e2b70e63e08ab75630c2ea23']416baaa9-dc9f-4396-8d5f-8c081fb06d67[/URL]
[/TD]
[/TR]
[TR]
[TD]M-Files Corporation--M-Files Server
[/TD]
[TD]A path traversal issue in API endpoint in M-Files Server before version 24.8.13981.0 allows authenticated user to read files[/TD]
[TD]2024-08-27[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-6789']CVE-2024-6789[/URL]
[URL='https://product.m-files.com/security-advisories/cve-2024-6789/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]ntfs3 in the Linux kernel before 6.5.11 allows a physically proximate attacker to read kernel memory by mounting a filesystem (e.g., if a Linux distribution is configured to allow unprivileged mounts of removable media) and then leveraging local access to trigger an out-of-bounds read. A length value can be larger than the amount of memory allocated. NOTE: the supplier's perspective is that there is no vulnerability when an attack requires an attacker-modified filesystem image.[/TD]
[TD]2024-08-28[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-45896']CVE-2023-45896[/URL]
[URL='https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.11'][email protected][/URL]
[URL='https://dfir.ru/2024/06/19/vulnerabilities-in-7-zip-and-ntfs3/'][email protected][/URL]
[URL='https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=013ff63b649475f0ee134e2c8d0c8e65284ede50'][email protected][/URL]
[URL='https://github.com/torvalds/linux/commit/013ff63b649475f0ee134e2c8d0c8e65284ede50'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]A denial-of-service issue was discovered on certain GL-iNet devices. Some websites can detect devices exposed to the external network through DDNS, and consequently obtain the IP addresses and ports of devices that are exposed. By using special usernames and special characters (such as half parentheses or square brackets), one can call the login interface and cause the session-management program to crash, resulting in customers being unable to log into their devices. This affects MT6000 4.5.6, XE3000 4.4.5, X3000 4.4.6, MT3000 4.5.0, MT2500 4.5.0, AXT1800 4.5.0, AX1800 4.5.0, A1300 4.5.0, S200 4.1.4-0300, X750 4.3.7, SFT1200 4.3.7, MT1300 4.3.10, AR750 4.3.10, AR750S 4.3.10, AR300M 4.3.10, AR300M16 4.3.10, B1300 4.3.10, MT300N-V2 4.3.10, and XE300 4.3.16.[/TD]
[TD]2024-08-26[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-28077']CVE-2024-28077[/URL]
[URL='https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Denial%20of%20service.md'][email protected][/URL]
[URL='https://gl-inet.com'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]unmark 1.9.2 is vulnerable to Cross Site Scripting (XSS) via application/views/marks/add_by_url.php.[/TD]
[TD]2024-08-29[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-41349']CVE-2024-41349[/URL]
[URL='https://github.com/cdevroe/unmark/issues/290'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]phpipam 1.6 is vulnerable to Cross Site Scripting (XSS) via app\admin\import-export\import-load-data.php.[/TD]
[TD]2024-08-29[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-41358']CVE-2024-41358[/URL]
[URL='https://github.com/phpipam/phpipam/issues/4148'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]RuoYi CMS v4.7.9 was discovered to contain a SQL injection vulnerability via the job_id parameter at /sasfs1.[/TD]
[TD]2024-08-26[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-42913']CVE-2024-42913[/URL]
[URL='https://github.com/kkll5875'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]ShopXO 6.2 is vulnerable to Cross Site Scripting (XSS) in the backend that allows attackers to execute code by changing POST parameters.[/TD]
[TD]2024-08-30[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44682']CVE-2024-44682[/URL]
[URL='https://github.com/147536951/Qianyi/blob/main/xss.md'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]Seacms v13 is vulnerable to Cross Site Scripting (XSS) via admin-video.php.[/TD]
[TD]2024-08-30[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44683']CVE-2024-44683[/URL]
[URL='https://github.com/147536951/Qianyi/blob/main/Seacms.md'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]TpMeCMS 1.3.3.2 is vulnerable to Cross Site Scripting (XSS) in /h.php/page?ref=addtabs via the "Title," "Images," and "Content" fields.[/TD]
[TD]2024-08-30[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44684']CVE-2024-44684[/URL]
[URL='https://github.com/147536951/Qianyi/blob/main/Tp_xss.md'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]A cross-site scripting (XSS) vulnerability in DedeBIZ v6.3.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.[/TD]
[TD]2024-08-29[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44716']CVE-2024-44716[/URL]
[URL='https://gitee.com/DedeBIZ/DedeV6/releases/tag/6.3.0'][email protected][/URL]
[URL='https://github.com/Jingyi-u/DedeBIZ'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]A cross-site scripting (XSS) vulnerability in DedeBIZ v6.3.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.[/TD]
[TD]2024-08-29[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44717']CVE-2024-44717[/URL]
[URL='https://gitee.com/DedeBIZ/DedeV6/releases/tag/6.3.0'][email protected][/URL]
[URL='https://github.com/Jingyi-u/DedeBIZ2'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]An Open Redirect vulnerability in the page parameter of vTiger CRM v7.4.0 allows attackers to redirect users to a malicious site via a crafted URL.[/TD]
[TD]2024-08-29[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44776']CVE-2024-44776[/URL]
[URL='http://vtiger.com'][email protected][/URL]
[URL='https://packetstormsecurity.com/files/180461/vTiger-CRM-7.4.0-Open-Redirection.html'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]A cross-site scripting (XSS) vulnerability in the component /auth/AzureRedirect.php of PicUploader commit fcf82ea allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the error_description parameter.[/TD]
[TD]2024-08-26[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44796']CVE-2024-44796[/URL]
[URL='http://picuploader.com'][email protected][/URL]
[URL='https://github.com/xiebruce/PicUploader'][email protected][/URL]
[URL='https://github.com/xiebruce/PicUploader/issues/90'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]Serilog before v2.1.0 was discovered to contain a Client IP Spoofing vulnerability, which allows attackers to falsify their IP addresses by specifying an arbitrary IP as a value of X-Forwarded-For or Client-Ip headers while performing HTTP requests.[/TD]
[TD]2024-08-29[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-44930']CVE-2024-44930[/URL]
[URL='https://github.com/serilog-contrib/serilog-enrichers-clientinfo/issues/29'][email protected][/URL]
[URL='https://github.com/serilog-contrib/serilog-enrichers-clientinfo/releases/tag/v2.1.0'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]core/authorize.php in Drupal 11.x-dev allows Full Path Disclosure (even when error logging is None) if the value of hash_salt is file_get_contents of a file that does not exist.[/TD]
[TD]2024-08-29[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-45440']CVE-2024-45440[/URL]
[URL='https://www.drupal.org/project/drupal/issues/3457781'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]HTMLDOC before 1.9.19 has an out-of-bounds write in parse_paragraph in ps-pdf.cxx because of an attempt to strip leading whitespace from a whitespace-only node.[/TD]
[TD]2024-09-01[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-45508']CVE-2024-45508[/URL]
[URL='https://github.com/michaelrsweet/htmldoc/blob/2d5b2ab9ddbf2aee2209010cebc11efdd1cab6e2/CHANGES.md'][email protected][/URL]
[URL='https://github.com/michaelrsweet/htmldoc/commit/2d5b2ab9ddbf2aee2209010cebc11efdd1cab6e2'][email protected][/URL]
[URL='https://github.com/michaelrsweet/htmldoc/issues/528'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]n/a--n/a
[/TD]
[TD]In MISP through 2.4.196, app/Controller/BookmarksController.php does not properly restrict access to bookmarks data in the case where the user is not an org admin.[/TD]
[TD]2024-09-01[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-45509']CVE-2024-45509[/URL]
[URL='https://github.com/MISP/MISP/commit/3f3b9a574f349182a545636e12efa39267e9db04'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Netskope--Netskope Client
[/TD]
[TD]Netskope was notified about a security gap in Netskope Client enrollment process where NSClient is using a static token "Orgkey" as authentication parameter. Since this is a static token, if leaked, cannot be rotated or revoked. A malicious actor can use this token to enroll NSClient from a customer's tenant and impersonate a user.[/TD]
[TD]2024-08-26[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-7401']CVE-2024-7401[/URL]
[URL='https://docs.netskope.com/en/secure-enrollment/'][email protected][/URL]
[URL='https://www.netskope.com/company/security-compliance-and-assurance/security-advisories-and-disclosures/netskope-security-advisory-nskpsa-2024-001'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]portabilis--i-educar
[/TD]
[TD]i-Educar is free, completely online school management software that allows school secretaries, teachers, coordinators and area managers. The lack of sanitization of user-controlled parameters for generating HTML field values ??dynamically leads to XSS (Cross-Site Scripting) attacks. The dynamic generation of HTML fields in the ieducar/intranet/include/clsCampos.inc.php file does not perform the correct validation or sanitization, reflecting the user-controlled values ??to be shown in the page's HTML. This allows an attacker to inject a specific XSS payload into a parameter. Successful exploitation of this flaw allows an attacker to trick the victim into clicking a vulnerable URL, enabling JavaScript scripts to be executed in the browser. Due to the configuration of session cookies, with the HttpOnly and SameSite=Lax flags being defined, there is little an attacker can do to steal the session or force the victim to perform actions within the application. This issue hast been patched but a new release has not yet been made. Users are advised to contact the developer and to coordinate an update schedule.[/TD]
[TD]2024-08-28[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-45057']CVE-2024-45057[/URL]
[URL='https://github.com/portabilis/i-educar/commit/f2d768534aabc09b2a1fc8a5cc5f9c93925cb273'][email protected][/URL]
[URL='https://github.com/portabilis/i-educar/security/advisories/GHSA-fqwh-c3c8-7gwj'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]portabilis--i-educar
[/TD]
[TD]i-Educar is free, completely online school management software that allows school secretaries, teachers, coordinators and area managers. An attacker with only minimal viewing privileges in the settings section is able to change their user type to Administrator (or another type with super-permissions). Any user is capable of becoming an administrator, which can lead to account theft, changing administrative tasks, etc. The failure occurs in the file located in ieducar/intranet/educar_usuario_cad.php on line 446 , which does not perform checks on the user's current permission level to make changes. This issue has not yet been patched. Users are advised to contact the developer and to coordinate an update schedule.[/TD]
[TD]2024-08-28[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-45058']CVE-2024-45058[/URL]
[URL='https://github.com/portabilis/i-educar/security/advisories/GHSA-53vj-fq8x-2mvg'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]portabilis--i-educar
[/TD]
[TD]i-Educar is free, completely online school management software that allows school secretaries, teachers, coordinators and area managers. In affected versions Creating a SQL query from a concatenation of a user-controlled GET parameter allows an attacker to manipulate the query. Successful exploitation of this flaw allows an attacker to have complete and unrestricted access to the database, with a web user with minimal permissions. This may involve obtaining user information, such as emails, password hashes, etc. This issue has not yet been patched. Users are advised to contact the developer and to coordinate an update schedule.[/TD]
[TD]2024-08-28[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-45059']CVE-2024-45059[/URL]
[URL='https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html'][email protected][/URL]
[URL='https://github.com/portabilis/i-educar/security/advisories/GHSA-2v4w-7xqr-hxmr'][email protected][/URL]
[URL='https://portswigger.net/web-security/sql-injection'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Rockwell Automation--ThinManager ThinServer
[/TD]
[TD]A remote code execution vulnerability exists in the Rockwell Automation ThinManager® ThinServer™ that allows a threat actor to execute arbitrary code with System privileges. To exploit this vulnerability and a threat actor must abuse the ThinServer™ service by creating a junction and use it to upload arbitrary files.[/TD]
[TD]2024-08-26[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-7987']CVE-2024-7987[/URL]
[URL='https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1692.html'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Safie Inc.--QBiC CLOUD CC-2L
[/TD]
[TD]QBiC CLOUD CC-2L v1.1.30 and earlier and Safie One v1.8.2 and earlier do not properly validate certificates, which may allow a network-adjacent unauthenticated attacker to obtain and/or alter communications of the affected product via a man-in-the-middle attack.[/TD]
[TD]2024-08-28[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-39771']CVE-2024-39771[/URL]
[URL='https://jvn.jp/en/jp/JVN83440451/'][email protected][/URL]
[URL='https://safie.jp/information/post_6933/'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]Shopify--tophat
[/TD]
[TD]Tophat is a mobile applications testing harness. An Improper Access Control vulnerability can expose the [ICODE]TOPHAT_APP_TOKEN[/ICODE] token stored in [ICODE]~/.tophatrc[/ICODE] through use of a malicious Tophat URL controlled by the attacker. The vulnerability allows Tophat to send this token to the attacker's server without any checks to ensure that the server is trusted. This token can then be used to access internal build artifacts, for mobile applications, not intended to be public. The issue has been patched as of version 1.10.0. The ability to request artifacts using a Tophat API has been deprecated as this flow was inherently insecure. Systems that have implemented this kind of endpoint should cease use and invalidate the token immediately. There are no workarounds and all users should update as soon as possible.[/TD]
[TD]2024-08-26[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-45036']CVE-2024-45036[/URL]
[URL='https://github.com/Shopify/tophat/pull/10'][email protected][/URL]
[URL='https://github.com/Shopify/tophat/security/advisories/GHSA-p7xh-6hjr-mmg6'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]wolfSSL--wolfSSL
[/TD]
[TD]A malicious TLS1.2 server can force a TLS1.3 client with downgrade capability to use a ciphersuite that it did not agree to and achieve a successful connection. This is because, aside from the extensions, the client was skipping fully parsing the server hello. https://doi.org/10.46586/tches.v2024.i1.457-500[/TD]
[TD]2024-08-27[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-5814']CVE-2024-5814[/URL]
[URL='https://github.com/wolfSSL/wolfssl/blob/master/ChangeLog.md#add_later'][email protected][/URL]
[/TD]
[/TR]
[TR]
[TD]wolfSSL--wolfSSL
[/TD]
[TD]In function MatchDomainName(), input param str is treated as a NULL terminated string despite being user provided and unchecked. Specifically, the function X509_check_host() takes in a pointer and length to check against, with no requirements that it be NULL terminated. If a caller was attempting to do a name check on a non-NULL terminated buffer, the code would read beyond the bounds of the input array until it found a NULL terminator.This issue affects wolfSSL: through 5.7.0.[/TD]
[TD]2024-08-27[/TD]
[TD]not yet calculated[/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2024-5991']CVE-2024-5991[/URL]
[URL='https://https://github.com/wolfSSL/wolfssl/pull/7604'][email protected][/URL]
[/TD]
[/TR]
[/TABLE][/CENTER]

[URL='https://www.cisa.gov/uscert/ncas/#top']Back to top[/URL]

[url="https://www.cisa.gov/news-events/bulletins/sb24-247"]Continue reading...[/url]