Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2013-3221

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-22 Apr, 2013 | 01:00
Updated At-06 Aug, 2024 | 16:00
Rejected At-
Credits

The Active Record component in Ruby on Rails 2.3.x, 3.0.x, 3.1.x, and 3.2.x does not ensure that the declared data type of a database column is used during comparisons of input values to stored values in that column, which makes it easier for remote attackers to conduct data-type injection attacks against Ruby on Rails applications via a crafted value, as demonstrated by unintended interaction between the "typed XML" feature and a MySQL database.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:22 Apr, 2013 | 01:00
Updated At:06 Aug, 2024 | 16:00
Rejected At:
▼CVE Numbering Authority (CNA)

The Active Record component in Ruby on Rails 2.3.x, 3.0.x, 3.1.x, and 3.2.x does not ensure that the declared data type of a database column is used during comparisons of input values to stored values in that column, which makes it easier for remote attackers to conduct data-type injection attacks against Ruby on Rails applications via a crafted value, as demonstrated by unintended interaction between the "typed XML" feature and a MySQL database.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://pl.reddit.com/r/netsec/comments/17yajp/mysql_madness_and_rails/
x_refsource_MISC
https://groups.google.com/group/rubyonrails-security/msg/1f3bc0b88a60c1ce?dmode=source&output=gplain
mailing-list
x_refsource_MLIST
http://www.phenoelit.org/blog/archives/2013/02/index.html
x_refsource_MISC
http://openwall.com/lists/oss-security/2013/04/24/7
mailing-list
x_refsource_MLIST
https://gist.github.com/dakull/5442275
x_refsource_CONFIRM
http://openwall.com/lists/oss-security/2013/02/06/7
mailing-list
x_refsource_MLIST
Hyperlink: http://pl.reddit.com/r/netsec/comments/17yajp/mysql_madness_and_rails/
Resource:
x_refsource_MISC
Hyperlink: https://groups.google.com/group/rubyonrails-security/msg/1f3bc0b88a60c1ce?dmode=source&output=gplain
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://www.phenoelit.org/blog/archives/2013/02/index.html
Resource:
x_refsource_MISC
Hyperlink: http://openwall.com/lists/oss-security/2013/04/24/7
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://gist.github.com/dakull/5442275
Resource:
x_refsource_CONFIRM
Hyperlink: http://openwall.com/lists/oss-security/2013/02/06/7
Resource:
mailing-list
x_refsource_MLIST
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://pl.reddit.com/r/netsec/comments/17yajp/mysql_madness_and_rails/
x_refsource_MISC
x_transferred
https://groups.google.com/group/rubyonrails-security/msg/1f3bc0b88a60c1ce?dmode=source&output=gplain
mailing-list
x_refsource_MLIST
x_transferred
http://www.phenoelit.org/blog/archives/2013/02/index.html
x_refsource_MISC
x_transferred
http://openwall.com/lists/oss-security/2013/04/24/7
mailing-list
x_refsource_MLIST
x_transferred
https://gist.github.com/dakull/5442275
x_refsource_CONFIRM
x_transferred
http://openwall.com/lists/oss-security/2013/02/06/7
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://pl.reddit.com/r/netsec/comments/17yajp/mysql_madness_and_rails/
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://groups.google.com/group/rubyonrails-security/msg/1f3bc0b88a60c1ce?dmode=source&output=gplain
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://www.phenoelit.org/blog/archives/2013/02/index.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://openwall.com/lists/oss-security/2013/04/24/7
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://gist.github.com/dakull/5442275
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://openwall.com/lists/oss-security/2013/02/06/7
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:22 Apr, 2013 | 03:27
Updated At:11 Apr, 2025 | 00:51

The Active Record component in Ruby on Rails 2.3.x, 3.0.x, 3.1.x, and 3.2.x does not ensure that the declared data type of a database column is used during comparisons of input values to stored values in that column, which makes it easier for remote attackers to conduct data-type injection attacks against Ruby on Rails applications via a crafted value, as demonstrated by unintended interaction between the "typed XML" feature and a MySQL database.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.06.4MEDIUM
AV:N/AC:L/Au:N/C:P/I:P/A:N
Type: Primary
Version: 2.0
Base score: 6.4
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:N
CPE Matches

Ruby on Rails
rubyonrails
>>rails>>2.3.0
cpe:2.3:a:rubyonrails:rails:2.3.0:*:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>2.3.1
cpe:2.3:a:rubyonrails:rails:2.3.1:*:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>2.3.2
cpe:2.3:a:rubyonrails:rails:2.3.2:*:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>2.3.3
cpe:2.3:a:rubyonrails:rails:2.3.3:*:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>2.3.4
cpe:2.3:a:rubyonrails:rails:2.3.4:*:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>2.3.9
cpe:2.3:a:rubyonrails:rails:2.3.9:*:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>2.3.10
cpe:2.3:a:rubyonrails:rails:2.3.10:*:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>2.3.11
cpe:2.3:a:rubyonrails:rails:2.3.11:*:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>2.3.12
cpe:2.3:a:rubyonrails:rails:2.3.12:*:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>2.3.13
cpe:2.3:a:rubyonrails:rails:2.3.13:*:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>2.3.14
cpe:2.3:a:rubyonrails:rails:2.3.14:*:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>2.3.15
cpe:2.3:a:rubyonrails:rails:2.3.15:*:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>2.3.16
cpe:2.3:a:rubyonrails:rails:2.3.16:*:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>3.0.0
cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>3.0.0
cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>3.0.0
cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>3.0.0
cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>3.0.0
cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>3.0.0
cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>3.0.0
cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>3.0.1
cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>3.0.1
cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>3.0.2
cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>3.0.2
cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>3.0.3
cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>3.0.4
cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>3.0.5
cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>3.0.5
cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>3.0.6
cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>3.0.6
cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>3.0.6
cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>3.0.7
cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>3.0.7
cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>3.0.7
cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>3.0.8
cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>3.0.8
cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>3.0.8
cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>3.0.8
cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>3.0.8
cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>3.0.9
cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>3.0.9
cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>3.0.9
cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>3.0.9
cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>3.0.9
cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>3.0.9
cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>3.0.10
cpe:2.3:a:rubyonrails:rails:3.0.10:*:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>3.0.10
cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>3.0.11
cpe:2.3:a:rubyonrails:rails:3.0.11:*:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>3.0.12
cpe:2.3:a:rubyonrails:rails:3.0.12:*:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>3.0.12
cpe:2.3:a:rubyonrails:rails:3.0.12:rc1:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-20Primarynvd@nist.gov
CWE ID: CWE-20
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://openwall.com/lists/oss-security/2013/02/06/7cve@mitre.org
N/A
http://openwall.com/lists/oss-security/2013/04/24/7cve@mitre.org
N/A
http://pl.reddit.com/r/netsec/comments/17yajp/mysql_madness_and_rails/cve@mitre.org
N/A
http://www.phenoelit.org/blog/archives/2013/02/index.htmlcve@mitre.org
Exploit
https://gist.github.com/dakull/5442275cve@mitre.org
N/A
https://groups.google.com/group/rubyonrails-security/msg/1f3bc0b88a60c1ce?dmode=source&output=gplaincve@mitre.org
N/A
http://openwall.com/lists/oss-security/2013/02/06/7af854a3a-2127-422b-91ae-364da2661108
N/A
http://openwall.com/lists/oss-security/2013/04/24/7af854a3a-2127-422b-91ae-364da2661108
N/A
http://pl.reddit.com/r/netsec/comments/17yajp/mysql_madness_and_rails/af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.phenoelit.org/blog/archives/2013/02/index.htmlaf854a3a-2127-422b-91ae-364da2661108
Exploit
https://gist.github.com/dakull/5442275af854a3a-2127-422b-91ae-364da2661108
N/A
https://groups.google.com/group/rubyonrails-security/msg/1f3bc0b88a60c1ce?dmode=source&output=gplainaf854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://openwall.com/lists/oss-security/2013/02/06/7
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://openwall.com/lists/oss-security/2013/04/24/7
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://pl.reddit.com/r/netsec/comments/17yajp/mysql_madness_and_rails/
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.phenoelit.org/blog/archives/2013/02/index.html
Source: cve@mitre.org
Resource:
Exploit
Hyperlink: https://gist.github.com/dakull/5442275
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://groups.google.com/group/rubyonrails-security/msg/1f3bc0b88a60c1ce?dmode=source&output=gplain
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://openwall.com/lists/oss-security/2013/02/06/7
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://openwall.com/lists/oss-security/2013/04/24/7
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://pl.reddit.com/r/netsec/comments/17yajp/mysql_madness_and_rails/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.phenoelit.org/blog/archives/2013/02/index.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Hyperlink: https://gist.github.com/dakull/5442275
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://groups.google.com/group/rubyonrails-security/msg/1f3bc0b88a60c1ce?dmode=source&output=gplain
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

63Records found

CVE-2022-30712
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-8.5||HIGH
EPSS-0.07% / 20.87%
||
7 Day CHG~0.00%
Published-07 Jun, 2022 | 17:54
Updated-03 Aug, 2024 | 06:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper validation vulnerability in KfaOptions prior to SMR Jun-2022 Release 1 allows attackers to launch certain activities.

Action-Not Available
Vendor-Google LLCSamsung Electronics
Product-androidSamsung Mobile Devices
CWE ID-CWE-20
Improper Input Validation
CVE-2019-13932
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-9.1||CRITICAL
EPSS-0.37% / 57.96%
||
7 Day CHG~0.00%
Published-12 Dec, 2019 | 19:08
Updated-05 Aug, 2024 | 00:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in XHQ (All versions < V6.0.0.2). The web application requests could be manipulated, causing the the application to behave in unexpected ways for legitimate users. Successful exploitation does not require for an attacker to be authenticated. A successful attack could allow the import of scripts or generation of malicious links. This could allow the attacker to read or modify contents of the web application. At the time of advisory publication no public exploitation of this security vulnerability was known.

Action-Not Available
Vendor-Siemens AG
Product-xhqXHQ
CWE ID-CWE-20
Improper Input Validation
CVE-2019-1109
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-9.1||CRITICAL
EPSS-7.97% / 91.71%
||
7 Day CHG~0.00%
Published-29 Jul, 2019 | 14:08
Updated-04 Aug, 2024 | 18:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A spoofing vulnerability exists when Microsoft Office Javascript does not check the validity of the web page making a request to Office documents.An attacker who successfully exploited this vulnerability could read or write information in Office documents.The security update addresses the vulnerability by correcting the way that Microsoft Office Javascript verifies trusted web pages., aka 'Microsoft Office Spoofing Vulnerability'.

Action-Not Available
Vendor-Microsoft Corporation
Product-office_365officeMicrosoft OfficeOffice 365 ProPlus
CWE ID-CWE-20
Improper Input Validation
CVE-2018-20864
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.23% / 45.70%
||
7 Day CHG~0.00%
Published-30 Jul, 2019 | 14:21
Updated-05 Aug, 2024 | 12:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

cPanel before 76.0.8 allows a persistent Virtual FTP accounts after removal of its associated domain (SEC-454).

Action-Not Available
Vendor-n/acPanel (WebPros International, LLC)
Product-cpaneln/a
CWE ID-CWE-20
Improper Input Validation
CVE-2018-20981
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.60% / 68.38%
||
7 Day CHG~0.00%
Published-22 Aug, 2019 | 12:40
Updated-05 Aug, 2024 | 12:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The ninja-forms plugin before 3.3.9 for WordPress has insufficient restrictions on submission-data retrieval during Export Personal Data requests.

Action-Not Available
Vendor-n/aSaturday Drive, INC
Product-ninja_formsn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2008-0473
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-7.71% / 91.54%
||
7 Day CHG~0.00%
Published-29 Jan, 2008 | 19:00
Updated-07 Aug, 2024 | 07:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

RTE_popup_save_file.asp in Web Wiz Rich Text Editor 4.0 allows remote attackers to upload (1) .html and (2) .htm files via unspecified vectors.

Action-Not Available
Vendor-web_wizn/a
Product-rich_text_editorn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2018-13906
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.23% / 45.98%
||
7 Day CHG~0.00%
Published-14 Jun, 2019 | 17:02
Updated-05 Aug, 2024 | 09:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The HMAC authenticating the message from QSEE is vulnerable to timing side channel analysis leading to potentially forged application message in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in IPQ4019, IPQ8074, MDM9150, MDM9206, MDM9607, MDM9635M, MDM9640, MDM9650, MDM9655, MSM8909W, MSM8996AU, QCA8081, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, SDX20, Snapdragon_High_Med_2016, SXR1130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sd_850mdm9150_firmwaresd_632mdm9635m_firmwaremdm9640_firmwaresd_820amsm8996au_firmwaresd_439sd_670_firmwaresd_429sdm439mdm9650sd_636sd_615_firmwaresnapdragon_high_med_2016_firmwaremsm8909w_firmwaremsm8996ausd_820sd_650sd_450_firmwaresd_845_firmwaresd_410sd_820a_firmwareqcs605_firmwareipq4019_firmwaremdm9206sd_652sd_425_firmwaresd_625_firmwareipq8074sd_450mdm9635msd_8cx_firmwaresd_845mdm9206_firmwareqcs605sd_632_firmwaresd_835_firmwaremdm9650_firmwaresd_835sda660sxr1130_firmwaresd_210_firmwaresd_415_firmwaresd_652_firmwareqca8081_firmwaresxr1130msm8909wsd_616_firmwaresd_205_firmwaresd_415sd_212sd_650_firmwaresd_427_firmwaresd_712sd_855sd_412qualcomm_215sdx20sd_616sd_425sdm660sd_430_firmwaremdm9607_firmwaresd_435mdm9655_firmwaresd_615sd_710_firmwareqcs405sdm630sd_625ipq8074_firmwaresd_820_firmwaresd_210mdm9607sd_636_firmwaresd_439_firmwareqca8081qualcomm_215_firmwaremdm9150sd_429_firmwaresnapdragon_high_med_2016sd_212_firmwaresd_850_firmwaremdm9655sdm439_firmwareqcs405_firmwaresd_712_firmwaresd_412_firmwaresd_855_firmwaresdm630_firmwaresda660_firmwaresd_8cxsd_430ipq4019sd_427sd_670sd_435_firmwaresdx20_firmwaresd_710sd_410_firmwaresd_205sdm660_firmwaremdm9640Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-417
Not Available
CWE ID-CWE-20
Improper Input Validation
CVE-2018-13115
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.32% / 54.00%
||
7 Day CHG~0.00%
Published-22 Oct, 2018 | 20:00
Updated-05 Aug, 2024 | 08:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Lack of an authentication mechanism in KERUI Wifi Endoscope Camera (YPC99) allows an attacker to watch or block the camera stream. The RTSP server on port 7070 accepts the command STOP to stop streaming, and the command SETSSID to disconnect a user.

Action-Not Available
Vendor-keruigroupn/a
Product-ypc99ypc99_firmwaren/a
CWE ID-CWE-20
Improper Input Validation
CVE-2018-11932
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.22% / 44.66%
||
7 Day CHG~0.00%
Published-25 Feb, 2019 | 23:00
Updated-05 Aug, 2024 | 08:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation can lead RW access to secure subsystem from HLOS in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in versions MDM9650, MDM9655, MSM8996AU, QCS605, SD 410/12, SD 615/16/SD 415, SD 675, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 8CX, SXR1130.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sd_712sd_850sd_16sd_820asd_675msm8996au_firmwaresd_12sd_670_firmwaresd_615sd_710_firmwaremdm9655_firmwaremdm9650sd_615_firmwaresd_820_firmwaremsm8996ausd_820sd_845_firmwaresd_410sd_820a_firmwareqcs605_firmwaresd_675_firmwaresd_850_firmwaremdm9655sd_16_firmwaresd_712_firmwaresd_8cx_firmwaresd_845sd_8cxqcs605sd_670sd_835_firmwaremdm9650_firmwaresd_710sd_410_firmwaresd_12_firmwaresd_835sxr1130_firmwaresd_415_firmwaresxr1130sd_415Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile
CWE ID-CWE-20
Improper Input Validation
CVE-2017-18648
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.12% / 31.55%
||
7 Day CHG~0.00%
Published-07 Apr, 2020 | 15:56
Updated-05 Aug, 2024 | 21:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Samsung mobile devices with KK(4.4.x), L(5.x), M(6.x), and N(7.x) software. Arbitrary file read/write operations can occur in the locked state via a crafted MTP command. The Samsung ID is SVE-2017-10086 (November 2017).

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2003-1488
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-2.62% / 85.10%
||
7 Day CHG~0.00%
Published-24 Oct, 2007 | 23:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The (1) verif_admin.php and (2) check_admin.php scripts in Truegalerie 1.0 allow remote attackers to gain administrator access via a request to admin.php without the connect parameter and with the loggedin parameter set to any value, such as 1.

Action-Not Available
Vendor-truelogikn/a
Product-truegalerien/a
CWE ID-CWE-20
Improper Input Validation
CVE-2003-1538
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.45% / 62.78%
||
7 Day CHG~0.00%
Published-20 Dec, 2007 | 21:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

susehelp in SuSE Linux 8.1, Enterprise Server 8, Office Server, and Openexchange Server 4 does not properly filter shell metacharacters, which allows remote attackers to execute arbitrary commands via CGI queries.

Action-Not Available
Vendor-n/aSUSE
Product-suse_linux_openexchange_serversuse_linuxoffice_servern/a
CWE ID-CWE-20
Improper Input Validation
CVE-2013-6887
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.24% / 47.49%
||
7 Day CHG~0.00%
Published-27 Apr, 2014 | 20:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OpenJPEG 1.5.1 allows remote attackers to cause a denial of service via unspecified vectors that trigger NULL pointer dereferences, division-by-zero, and other errors.

Action-Not Available
Vendor-uclouvainn/a
Product-openjpegn/a
CWE ID-CWE-20
Improper Input Validation
  • Previous
  • 1
  • 2
  • Next
Details not found