
CVE-2024-7970 – Debian Security Advisory 5766-1
https://notcve.org/view.php?id=CVE-2024-7970
03 Sep 2024 — (Chromium security severity: High) Security issues were discovered in Chromium which could result in the execution of arbitrary code, denial of service, or information disclosure. • https://chromereleases.googleblog.com/2024/09/stable-channel-update-for-desktop.html • CWE-787: Out-of-bounds Write •

CVE-2024-8362 – Debian Security Advisory 5766-1
https://notcve.org/view.php?id=CVE-2024-8362
03 Sep 2024 — (Chromium security severity: High) Security issues were discovered in Chromium which could result in the execution of arbitrary code, denial of service, or information disclosure. • https://chromereleases.googleblog.com/2024/09/stable-channel-update-for-desktop.html • CWE-416: Use After Free •

CVE-2024-45588 – Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2024-45588
03 Sep 2024 — An authenticated remote attacker could exploit this vulnerability by manipulating parameters through HTTP request which could lead to unauthorized access and modification of sensitive information belonging to other users. • https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0281 • CWE-863: Incorrect Authorization •

CVE-2024-44947 – fuse: Initialize beyond-EOF page contents before setting uptodate
https://notcve.org/view.php?id=CVE-2024-44947
02 Sep 2024 — This is an information leak, but only affects systems which do not enable init-on-alloc (via CONFIG_INIT_ON_ALLOC_DEFAULT_ON=y or the corresponding kernel command line parameter). ... This is an information leak, but only affects systems which do not enable init-on-alloc (via CONFIG_INIT_ON_ALLOC_DEFAULT_ON=y or the corresponding kernel command line parameter). • https://github.com/Abdurahmon3236/CVE-2024-44947 • CWE-402: Transmission of Private Resources into a New Sphere ('Resource Leak') •

CVE-2024-23359 – Buffer Over-read in Multi Mode Call Processor
https://notcve.org/view.php?id=CVE-2024-23359
02 Sep 2024 — Information disclosure while decoding Tracking Area Update Accept or Attach Accept message received from network. • https://docs.qualcomm.com/product/publicresources/securitybulletin/september-2024-bulletin.html • CWE-126: Buffer Over-read •

CVE-2024-41160 – Liteos-A has an use after free vulnerability
https://notcve.org/view.php?id=CVE-2024-41160
02 Sep 2024 — in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free. en OpenHarmony v4.1.0 y versiones anteriores se permite que un atacante local haga que el permiso común se actualice a superusuario y se filtre información confidencial mediante use after free. • https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-09.md • CWE-416: Use After Free •

CVE-2024-41157 – Liteos-A has an use after free vulnerability
https://notcve.org/view.php?id=CVE-2024-41157
02 Sep 2024 — in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free. en OpenHarmony v4.1.0 y versiones anteriores se permite que un atacante local haga que el permiso común se actualice a superusuario y se filtre información confidencial mediante use after free. • https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-09.md • CWE-416: Use After Free •

CVE-2024-39775 – Net Manager has an out-of-bounds read permission bypass vulnerability
https://notcve.org/view.php?id=CVE-2024-39775
02 Sep 2024 — in OpenHarmony v4.1.0 and prior versions allow a remote attacker cause information leak through out-of-bounds Read. en OpenHarmony v4.1.0 y versiones anteriores, permitir que un atacante remoto provoque fuga de información a través de lecturas fuera de los límites. • https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-09.md • CWE-125: Out-of-bounds Read CWE-922: Insecure Storage of Sensitive Information •

CVE-2024-39612 – Background Task Manager has an out-of-bounds read permission bypass vulnerability
https://notcve.org/view.php?id=CVE-2024-39612
02 Sep 2024 — in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read. en OpenHarmony v4.0.0 y versiones anteriores, se permite que un atacante local provoque fugas de información a través de lecturas fuera de los límites. • https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-09.md • CWE-125: Out-of-bounds Read CWE-922: Insecure Storage of Sensitive Information •

CVE-2024-38382 – Ability Runtime has an out-of-bounds read permission bypass vulnerability
https://notcve.org/view.php?id=CVE-2024-38382
02 Sep 2024 — in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read. en OpenHarmony v4.0.0 y versiones anteriores, se permite que un atacante local provoque fugas de información a través de lecturas fuera de los límites. • https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-09.md • CWE-125: Out-of-bounds Read CWE-922: Insecure Storage of Sensitive Information •