Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2019-15900

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-18 Oct, 2019 | 15:41
Updated At-05 Aug, 2024 | 01:03
Rejected At-
Credits

An issue was discovered in slicer69 doas before 6.2 on certain platforms other than OpenBSD. On platforms without strtonum(3), sscanf was used without checking for error cases. Instead, the uninitialized variable errstr was checked and in some cases returned success even if sscanf failed. The result was that, instead of reporting that the supplied username or group name did not exist, it would execute the command as root.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:18 Oct, 2019 | 15:41
Updated At:05 Aug, 2024 | 01:03
Rejected At:
▼CVE Numbering Authority (CNA)

An issue was discovered in slicer69 doas before 6.2 on certain platforms other than OpenBSD. On platforms without strtonum(3), sscanf was used without checking for error cases. Instead, the uninitialized variable errstr was checked and in some cases returned success even if sscanf failed. The result was that, instead of reporting that the supplied username or group name did not exist, it would execute the command as root.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/slicer69/doas/commit/2f83222829448e5bc4c9391d607ec265a1e06531
x_refsource_MISC
https://github.com/slicer69/doas/compare/6.1p1...6.2
x_refsource_MISC
Hyperlink: https://github.com/slicer69/doas/commit/2f83222829448e5bc4c9391d607ec265a1e06531
Resource:
x_refsource_MISC
Hyperlink: https://github.com/slicer69/doas/compare/6.1p1...6.2
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/slicer69/doas/commit/2f83222829448e5bc4c9391d607ec265a1e06531
x_refsource_MISC
x_transferred
https://github.com/slicer69/doas/compare/6.1p1...6.2
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/slicer69/doas/commit/2f83222829448e5bc4c9391d607ec265a1e06531
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/slicer69/doas/compare/6.1p1...6.2
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:18 Oct, 2019 | 16:15
Updated At:16 Feb, 2024 | 15:34

An issue was discovered in slicer69 doas before 6.2 on certain platforms other than OpenBSD. On platforms without strtonum(3), sscanf was used without checking for error cases. Instead, the uninitialized variable errstr was checked and in some cases returned success even if sscanf failed. The result was that, instead of reporting that the supplied username or group name did not exist, it would execute the command as root.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary2.010.0HIGH
AV:N/AC:L/Au:N/C:C/I:C/A:C
Type: Primary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 10.0
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

doas_project
doas_project
>>doas>>Versions before 6.2(exclusive)
cpe:2.3:a:doas_project:doas:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-252Primarynvd@nist.gov
CWE-754Primarynvd@nist.gov
CWE-863Primarynvd@nist.gov
CWE-908Primarynvd@nist.gov
CWE ID: CWE-252
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-754
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-863
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-908
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/slicer69/doas/commit/2f83222829448e5bc4c9391d607ec265a1e06531cve@mitre.org
Patch
https://github.com/slicer69/doas/compare/6.1p1...6.2cve@mitre.org
Release Notes
Hyperlink: https://github.com/slicer69/doas/commit/2f83222829448e5bc4c9391d607ec265a1e06531
Source: cve@mitre.org
Resource:
Patch
Hyperlink: https://github.com/slicer69/doas/compare/6.1p1...6.2
Source: cve@mitre.org
Resource:
Release Notes

Change History

0
Information is not available yet

Similar CVEs

233Records found

CVE-2019-0036
Matching Score-4
Assigner-Juniper Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Juniper Networks, Inc.
CVSS Score-7.2||HIGH
EPSS-0.26% / 48.63%
||
7 Day CHG~0.00%
Published-10 Apr, 2019 | 20:13
Updated-16 Sep, 2024 | 20:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Junos OS: Firewall filter terms named "internal-1" and "internal-2" being ignored

When configuring a stateless firewall filter in Junos OS, terms named using the format "internal-n" (e.g. "internal-1", "internal-2", etc.) are silently ignored. No warning is issued during configuration, and the config is committed without error, but the filter criteria will match all packets leading to unexpected results. Affected releases are Juniper Networks Junos OS: All versions prior to and including 12.3; 14.1X53 versions prior to 14.1X53-D130, 14.1X53-D49; 15.1 versions prior to 15.1F6-S12, 15.1R7-S4; 15.1X49 versions prior to 15.1X49-D161, 15.1X49-D170; 15.1X53 versions prior to 15.1X53-D236, 15.1X53-D496, 15.1X53-D69; 16.1 versions prior to 16.1R7-S4, 16.1R7-S5; 16.2 versions prior to 16.2R2-S9; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R1-S8, 17.2R3-S1; 17.3 versions prior to 17.3R3-S4; 17.4 versions prior to 17.4R1-S7, 17.4R2-S3; 18.1 versions prior to 18.1R2-S4, 18.1R3-S4; 18.2 versions prior to 18.2R1-S5, 18.2R2-S1; 18.2X75 versions prior to 18.2X75-D40; 18.3 versions prior to 18.3R1-S3; 18.4 versions prior to 18.4R1-S1, 18.4R1-S2.

Action-Not Available
Vendor-Juniper Networks, Inc.
Product-junosJunos OS
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2024-6914
Matching Score-4
Assigner-WSO2 LLC
ShareView Details
Matching Score-4
Assigner-WSO2 LLC
CVSS Score-9.8||CRITICAL
EPSS-0.06% / 20.03%
||
7 Day CHG~0.00%
Published-22 May, 2025 | 18:26
Updated-27 Aug, 2025 | 21:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect Authorization in Multiple WSO2 Products via Account Recovery SOAP Admin Service Leading to Account Takeover

An incorrect authorization vulnerability exists in multiple WSO2 products due to a business logic flaw in the account recovery-related SOAP admin service. A malicious actor can exploit this vulnerability to reset the password of any user account, leading to a complete account takeover, including accounts with elevated privileges. This vulnerability is exploitable only through the account recovery SOAP admin services exposed via the "/services" context path in affected products. The impact may be reduced if access to these endpoints has been restricted based on the "Security Guidelines for Production Deployment" by disabling exposure to untrusted networks.

Action-Not Available
Vendor-WSO2 LLC
Product-WSO2 IoTWSO2 Identity ServerWSO2 API ManagerWSO2 Open Banking IAMWSO2 Open Banking AMWSO2 Governance RegistryWSO2 Carbon Identity ManagementWSO2 Open banking KMWSO2 Identity Server as Key Manager
CWE ID-CWE-863
Incorrect Authorization
CVE-2019-0006
Matching Score-4
Assigner-Juniper Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Juniper Networks, Inc.
CVSS Score-9.8||CRITICAL
EPSS-5.92% / 90.26%
||
7 Day CHG~0.00%
Published-15 Jan, 2019 | 21:00
Updated-16 Sep, 2024 | 19:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Junos OS: EX, QFX and MX series: Packet Forwarding Engine manager (FXPC) process crashes due to a crafted HTTP packet in a Virtual Chassis configuration

A certain crafted HTTP packet can trigger an uninitialized function pointer deference vulnerability in the Packet Forwarding Engine manager (fxpc) on all EX, QFX and MX Series devices in a Virtual Chassis configuration. This issue can result in a crash of the fxpc daemon or may potentially lead to remote code execution. This issue only occurs when the crafted packet it destined to the device. Affected releases are Juniper Networks Junos OS: 14.1X53 versions prior to 14.1X53-D47 on EX and QFX Virtual Chassis Platforms; 15.1 versions prior to 15.1R7-S3 all Virtual Chassis Platforms 15.1X53 versions prior to 15.1X53-D50 on EX and QFX Virtual Chassis Platforms.

Action-Not Available
Vendor-Juniper Networks, Inc.
Product-qfx3500ex4500ex8216ex4200qfx10008qfx5210qfx10002qfx5110qfx5120qfx10016qfx5100ex4300ex3300ex3400ex2200-cex9204ex2300ex9253ex4650ex9208ex4600ex2200qfx5200ex6210ex9214ex8208junosex2300-cex9251qfx3600ex4550Junos OS
CWE ID-CWE-908
Use of Uninitialized Resource
CVE-2016-20004
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.36% / 57.62%
||
7 Day CHG~0.00%
Published-31 Dec, 2020 | 23:27
Updated-06 Aug, 2024 | 03:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The REST/JSON project 7.x-1.x for Drupal allows field access bypass, aka SA-CONTRIB-2016-033. NOTE: This project is not covered by Drupal's security advisory policy.

Action-Not Available
Vendor-rest\/json_projectn/a
Product-rest\/jsonn/a
CWE ID-CWE-863
Incorrect Authorization
CVE-1999-0199
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.68% / 70.56%
||
7 Day CHG~0.00%
Published-06 Oct, 2020 | 12:49
Updated-01 Aug, 2024 | 16:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

manual/search.texi in the GNU C Library (aka glibc) before 2.2 lacks a statement about the unspecified tdelete return value upon deletion of a tree's root, which might allow attackers to access a dangling pointer in an application whose developer was unaware of a documentation update from 1999.

Action-Not Available
Vendor-n/aGNU
Product-glibcn/a
CWE ID-CWE-252
Unchecked Return Value
CVE-2016-20005
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.36% / 57.62%
||
7 Day CHG~0.00%
Published-31 Dec, 2020 | 23:26
Updated-06 Aug, 2024 | 03:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The REST/JSON project 7.x-1.x for Drupal allows user registration bypass, aka SA-CONTRIB-2016-033. NOTE: This project is not covered by Drupal's security advisory policy.

Action-Not Available
Vendor-rest\/json_projectn/a
Product-rest\/jsonn/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2010-0211
Matching Score-4
Assigner-CERT/CC
ShareView Details
Matching Score-4
Assigner-CERT/CC
CVSS Score-9.8||CRITICAL
EPSS-42.37% / 97.36%
||
7 Day CHG-0.26%
Published-27 Jul, 2010 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequences, which triggers a free of an invalid, uninitialized pointer in the slap_mods_free function, as demonstrated using the Codenomicon LDAPv3 test suite.

Action-Not Available
Vendor-openldapn/aVMware (Broadcom Inc.)openSUSEApple Inc.
Product-openldapopensuseesximac_os_xmac_os_x_servern/a
CWE ID-CWE-252
Unchecked Return Value
CVE-2025-50165
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.40% / 59.84%
||
7 Day CHG~0.00%
Published-12 Aug, 2025 | 17:10
Updated-27 Aug, 2025 | 16:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Graphics Component Remote Code Execution Vulnerability

Untrusted pointer dereference in Microsoft Graphics Component allows an unauthorized attacker to execute code over a network.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2025windows_11_24h2Windows Server 2025Windows Server 2025 (Server Core installation)Windows 11 Version 24H2
CWE ID-CWE-822
Untrusted Pointer Dereference
CWE ID-CWE-908
Use of Uninitialized Resource
CVE-2021-1619
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-9.8||CRITICAL
EPSS-1.23% / 78.37%
||
7 Day CHG~0.00%
Published-23 Sep, 2021 | 02:30
Updated-07 Nov, 2024 | 21:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Software NETCONF and RESTCONF Authentication Bypass Vulnerability

A vulnerability in the authentication, authorization, and accounting (AAA) function of Cisco IOS XE Software could allow an unauthenticated, remote attacker to bypass NETCONF or RESTCONF authentication and do either of the following: Install, manipulate, or delete the configuration of an affected device Cause memory corruption that results in a denial of service (DoS) on an affected device This vulnerability is due to an uninitialized variable. An attacker could exploit this vulnerability by sending a series of NETCONF or RESTCONF requests to an affected device. A successful exploit could allow the attacker to use NETCONF or RESTCONF to install, manipulate, or delete the configuration of a network device or to corrupt memory on the device, resulting a DoS.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xe_sd-wan_16.10.4_when_installed_on_1000_series_integrated_servicesios_xe_sd-wan_16.12.1c_when_installed_on_1000_series_integrated_servicesios_xe_sd-wan_16.9.1_when_installed_on_integrated_services_virtualios_xe_sd-wan_16.10.3_when_installed_on_integrated_services_virtualios_xe_sd-wan_16.10.3_when_installed_on_1000_series_integrated_servicesios_xe_sd-wan_16.12.1a_when_installed_on_4000_series_integrated_servicesios_xe_sd-wan_16.12.1d_when_installed_on_cloud_services_router_1000vios_xe_sd-wan_16.11.1a_when_installed_on_asr_1000_series_aggregation_servicesios_xe_sd-wan_16.11.1b_when_installed_on_integrated_services_virtualios_xe_sd-wan_16.10.6_when_installed_on_asr_1000_series_aggregation_servicesios_xe_sd-wan_16.12.1b1_when_installed_on_1100_series_industrial_integrated_servicesios_xe_sd-wan_16.10.3a_when_installed_on_1000_series_integrated_servicesios_xe_sd-wan_16.12.2r_when_installed_on_1100_series_industrial_integrated_servicesios_xe_sd-wan_16.12.2r_when_installed_on_asr_1000_series_aggregation_servicesios_xe_sd-wan_16.12.5_when_installed_on_cloud_services_router_1000vios_xe_sd-wan_16.9.3_when_installed_on_asr_1000_series_aggregation_servicesios_xe_sd-wan_16.12.1_when_installed_on_asr_1000_series_aggregation_servicesios_xe_sd-wan_16.10.3b_when_installed_on_integrated_services_virtualios_xe_sd-wan_16.12.1d_when_installed_on_4000_series_integrated_servicesios_xe_sd-wan_16.12.5_when_installed_on_4000_series_integrated_servicesios_xe_sd-wan_16.11.1b_when_installed_on_4000_series_integrated_servicesios_xe_sd-wan_16.12.1e_when_installed_on_1100_series_industrial_integrated_servicesios_xe_sd-wan_16.9.3_when_installed_on_4000_series_integrated_servicesios_xe_sd-wan_16.12.1a_when_installed_on_integrated_services_virtualios_xe_sd-wan_16.12.1a_when_installed_on_1000_series_integrated_servicesios_xe_sd-wan_16.10.6_when_installed_on_1000_series_integrated_servicesios_xe_sd-wan_16.12.3_when_installed_on_asr_1000_series_aggregation_servicesios_xe_sd-wan_16.11.1s_when_installed_on_integrated_services_virtualios_xe_sd-wan_16.12.4_when_installed_on_integrated_services_virtualios_xe_sd-wan_16.11.1b_when_installed_on_1000_series_integrated_servicesios_xe_sd-wan_16.10.3_when_installed_on_4000_series_integrated_servicesios_xe_sd-wan_16.12.1_when_installed_on_cloud_services_router_1000vios_xe_sd-wan_16.10.2_when_installed_on_asr_1000_series_aggregation_servicesios_xe_sd-wan_16.12.1b_when_installed_on_integrated_services_virtualios_xe_sd-wan_16.10.5_when_installed_on_1000_series_integrated_servicesios_xe_sd-wan_16.11.1_when_installed_on_integrated_services_virtualios_xe_sd-wan_16.9.4_when_installed_on_integrated_services_virtualios_xe_sd-wan_16.9.2_when_installed_on_integrated_services_virtualios_xe_sd-wan_16.10.2_when_installed_on_4000_series_integrated_servicesios_xe_sd-wan_16.12.4_when_installed_on_cloud_services_router_1000vios_xe_sd-wan_16.11.1b_when_installed_on_asr_1000_series_aggregation_servicesios_xe_sd-wan_16.10.3a_when_installed_on_integrated_services_virtualios_xe_sd-wan_16.12.1c_when_installed_on_4000_series_integrated_servicesios_xe_sd-wan_16.10.3_when_installed_on_asr_1000_series_aggregation_servicesios_xe_sd-wan_16.10.1_when_installed_on_4000_series_integrated_servicesios_xe_sd-wan_16.12.2r_when_installed_on_integrated_services_virtualios_xe_sd-wan_16.12.1b_when_installed_on_asr_1000_series_aggregation_servicesios_xe_sd-wan_16.10.5_when_installed_on_asr_1000_series_aggregation_servicesios_xe_sd-wan_16.12.3_when_installed_on_1000_series_integrated_servicesios_xe_sd-wan_16.11.1_when_installed_on_4000_series_integrated_servicesios_xe_sd-wan_16.12.1c_when_installed_on_1100_series_industrial_integrated_servicesios_xe_sd-wan_16.12.5_when_installed_on_integrated_services_virtualios_xe_sd-wan_16.10.3b_when_installed_on_1000_series_integrated_servicesios_xe_sd-wan_16.10.5_when_installed_on_cloud_services_router_1000vios_xe_sd-wan_16.12.1_when_installed_on_1100_series_industrial_integrated_servicesios_xe_sd-wan_16.11.1a_when_installed_on_integrated_services_virtualios_xe_sd-wan_16.12.5_when_installed_on_1100_series_industrial_integrated_servicesios_xe_sd-wan_16.10.2_when_installed_on_1000_series_integrated_servicesios_xe_sd-wan_16.12.1d_when_installed_on_1000_series_integrated_servicesios_xe_sd-wan_16.10.4_when_installed_on_cloud_services_router_1000vios_xe_sd-wan_16.10.4_when_installed_on_4000_series_integrated_servicesios_xe_sd-wan_16.12.1e_when_installed_on_4000_series_integrated_servicesios_xe_sd-wan_16.10.1_when_installed_on_1000_series_integrated_servicesios_xe_sd-wan_16.10.1_when_installed_on_integrated_services_virtualios_xe_sd-wan_16.12.2r_when_installed_on_1000_series_integrated_servicesios_xe_sd-wan_16.12.3_when_installed_on_1100_series_industrial_integrated_servicesios_xe_sd-wan_16.10.3b_when_installed_on_asr_1000_series_aggregation_servicesios_xe_sd-wan_16.12.1_when_installed_on_integrated_services_virtualios_xe_sd-wan_16.12.1b1_when_installed_on_1000_series_integrated_servicesios_xe_sd-wan_16.12.1e_when_installed_on_asr_1000_series_aggregation_servicesios_xe_sd-wan_16.12.1b_when_installed_on_cloud_services_router_1000vios_xe_sd-wan_16.12.1b1_when_installed_on_cloud_services_router_1000vios_xe_sd-wan_16.12.1e_when_installed_on_integrated_services_virtualios_xe_sd-wan_16.9.1_when_installed_on_4000_series_integrated_servicesios_xe_sd-wan_16.9.4_when_installed_on_1000_series_integrated_servicesios_xe_sd-wan_16.9.2_when_installed_on_1000_series_integrated_servicesios_xe_sd-wan_16.12.4a_when_installed_on_cloud_services_router_1000vios_xe_sd-wan_16.12.1d_when_installed_on_asr_1000_series_aggregation_servicesios_xe_sd-wan_16.10.6_when_installed_on_integrated_services_virtualios_xe_sd-wanios_xe_sd-wan_16.9.2_when_installed_on_asr_1000_series_aggregation_servicesios_xe_sd-wan_16.12.1d_when_installed_on_1100_series_industrial_integrated_servicesios_xe_sd-wan_16.12.1d_when_installed_on_integrated_services_virtualios_xe_sd-wan_16.9.2_when_installed_on_4000_series_integrated_servicesios_xe_sd-wan_16.12.1_when_installed_on_4000_series_integrated_servicesios_xe_sd-wan_16.12.1b_when_installed_on_1100_series_industrial_integrated_servicesios_xe_sd-wan_16.9.1_when_installed_on_asr_1000_series_aggregation_servicesios_xe_sd-wan_16.12.1c_when_installed_on_integrated_services_virtualios_xe_sd-wan_16.10.1_when_installed_on_asr_1000_series_aggregation_servicesios_xe_sd-wan_16.12.5_when_installed_on_1000_series_integrated_servicesios_xe_sd-wan_16.12.2r_when_installed_on_4000_series_integrated_servicesios_xe_sd-wan_16.12.1e_when_installed_on_1000_series_integrated_servicesios_xe_sd-wan_16.10.3a_when_installed_on_4000_series_integrated_servicesios_xe_sd-wan_16.9.1_when_installed_on_1000_series_integrated_servicesios_xe_sd-wan_16.12.1a_when_installed_on_cloud_services_router_1000vios_xe_sd-wan_16.10.4_when_installed_on_asr_1000_series_aggregation_servicesios_xe_sd-wan_16.11.1a_when_installed_on_1000_series_integrated_servicesios_xe_sd-wan_16.11.1s_when_installed_on_4000_series_integrated_servicesios_xe_sd-wan_16.12.3_when_installed_on_cloud_services_router_1000vios_xe_sd-wan_16.12.1b_when_installed_on_4000_series_integrated_servicesios_xe_sd-wan_16.12.1c_when_installed_on_asr_1000_series_aggregation_servicesios_xe_sd-wan_16.12.4a_when_installed_on_integrated_services_virtualios_xe_sd-wan_16.10.3b_when_installed_on_4000_series_integrated_servicesios_xe_sd-wan_16.12.4_when_installed_on_asr_1000_series_aggregation_servicesios_xe_sd-wan_16.11.1_when_installed_on_1000_series_integrated_servicesios_xe_sd-wan_16.11.1_when_installed_on_asr_1000_series_aggregation_servicesios_xe_sd-wan_16.11.1f_when_installed_on_4000_series_integrated_servicesios_xe_sd-wan_16.11.1s_when_installed_on_asr_1000_series_aggregation_servicesios_xe_sd-wan_16.11.1a_when_installed_on_4000_series_integrated_servicesios_xe_sd-wan_16.12.1e_when_installed_on_cloud_services_router_1000vios_xe_sd-wan_16.12.4_when_installed_on_1100_series_industrial_integrated_servicesios_xe_sd-wan_16.12.3_when_installed_on_integrated_services_virtualios_xe_sd-wan_16.10.5_when_installed_on_integrated_services_virtualios_xe_sd-wan_16.11.1d_when_installed_on_integrated_services_virtualios_xe_sd-wan_16.10.6_when_installed_on_4000_series_integrated_servicesios_xe_sd-wan_16.9.4_when_installed_on_asr_1000_series_aggregation_servicesios_xe_sd-wan_16.10.4_when_installed_on_integrated_services_virtualios_xe_sd-wan_16.11.1s_when_installed_on_1000_series_integrated_servicesios_xe_sd-wan_16.12.1a_when_installed_on_1100_series_industrial_integrated_servicesios_xe_sd-wan_16.12.1_when_installed_on_1000_series_integrated_servicesios_xe_sd-wan_16.10.3a_when_installed_on_cloud_services_router_1000vios_xe_sd-wan_16.12.1b1_when_installed_on_4000_series_integrated_servicesios_xe_sd-wan_16.10.3a_when_installed_on_asr_1000_series_aggregation_servicesios_xe_sd-wan_16.10.5_when_installed_on_4000_series_integrated_servicesios_xe_sd-wan_16.11.1a_when_installed_on_cloud_services_router_1000vios_xe_sd-wan_16.12.1b_when_installed_on_1000_series_integrated_servicesios_xe_sd-wan_16.12.1b1_when_installed_on_integrated_services_virtualios_xe_sd-wan_16.12.1b1_when_installed_on_asr_1000_series_aggregation_servicesios_xe_sd-wan_16.12.1c_when_installed_on_cloud_services_router_1000vios_xe_sd-wan_16.12.3_when_installed_on_4000_series_integrated_servicesios_xe_sd-wan_16.11.1d_when_installed_on_cloud_services_router_1000vios_xe_sd-wan_16.12.4a_when_installed_on_4000_series_integrated_servicesios_xe_sd-wan_16.9.3_when_installed_on_1000_series_integrated_servicesios_xeios_xe_sd-wan_16.10.2_when_installed_on_integrated_services_virtualios_xe_sd-wan_16.12.4_when_installed_on_1000_series_integrated_servicesios_xe_sd-wan_16.12.5_when_installed_on_asr_1000_series_aggregation_servicesios_xe_sd-wan_16.12.2r_when_installed_on_cloud_services_router_1000vios_xe_sd-wan_16.12.1a_when_installed_on_asr_1000_series_aggregation_servicesios_xe_sd-wan_16.11.1s_when_installed_on_cloud_services_router_1000vios_xe_sd-wan_16.11.1b_when_installed_on_cloud_services_router_1000vios_xe_sd-wan_16.10.3b_when_installed_on_cloud_services_router_1000vios_xe_sd-wan_16.9.4_when_installed_on_4000_series_integrated_servicesios_xe_sd-wan_16.10.6_when_installed_on_cloud_services_router_1000vios_xe_sd-wan_16.9.3_when_installed_on_integrated_services_virtualios_xe_sd-wan_16.12.4_when_installed_on_4000_series_integrated_servicesCisco IOS XE Software
CWE ID-CWE-824
Access of Uninitialized Pointer
CWE ID-CWE-908
Use of Uninitialized Resource
CVE-2016-20002
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.36% / 57.62%
||
7 Day CHG~0.00%
Published-31 Dec, 2020 | 23:27
Updated-06 Aug, 2024 | 03:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The REST/JSON project 7.x-1.x for Drupal allows comment access bypass, aka SA-CONTRIB-2016-033. NOTE: This project is not covered by Drupal's security advisory policy.

Action-Not Available
Vendor-rest\/json_projectn/a
Product-rest\/jsonn/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2016-20001
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.36% / 57.62%
||
7 Day CHG~0.00%
Published-31 Dec, 2020 | 23:27
Updated-06 Aug, 2024 | 03:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The REST/JSON project 7.x-1.x for Drupal allows node access bypass, aka SA-CONTRIB-2016-033. NOTE: This project is not covered by Drupal's security advisory policy.

Action-Not Available
Vendor-rest\/json_projectn/a
Product-rest\/jsonn/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2010-2965
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-92.24% / 99.71%
||
7 Day CHG~0.00%
Published-04 Aug, 2010 | 21:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The WDB target agent debug service in Wind River VxWorks 6.x, 5.x, and earlier, as used on the Rockwell Automation 1756-ENBT series A with firmware 3.2.6 and 3.6.1 and other products, allows remote attackers to read or modify arbitrary memory locations, perform function calls, or manage tasks via requests to UDP port 17185, a related issue to CVE-2005-3804.

Action-Not Available
Vendor-windrivern/aRockwell Automation, Inc.
Product-1756-enbt\/a_firmware1756-enbt\/avxworksn/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-1136
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.8||CRITICAL
EPSS-0.02% / 3.67%
||
7 Day CHG~0.00%
Published-27 Mar, 2023 | 14:50
Updated-16 Jan, 2025 | 21:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2023-1136

In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an unauthenticated attacker could generate a valid token, which would lead to authentication bypass.

Action-Not Available
Vendor-Delta Electronics, Inc.
Product-infrasuite_device_masterInfraSuite Device Master
CWE ID-CWE-863
Incorrect Authorization
CVE-2010-1435
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.01% / 1.55%
||
7 Day CHG~0.00%
Published-21 Jun, 2021 | 22:24
Updated-07 Aug, 2024 | 01:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to perform otherwise restricted actions and subsequently retrieve password reset tokens from the database through an already existing SQL injection vector. Joomla! Core versions 1.5.x ranging from 1.5.0 and up to and including 1.5.15 are vulnerable.

Action-Not Available
Vendor-n/aJoomla!
Product-joomla\!Joomla
CWE ID-CWE-863
Incorrect Authorization
CVE-2018-25014
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.20% / 42.43%
||
7 Day CHG-0.14%
Published-21 May, 2021 | 16:27
Updated-05 Aug, 2024 | 12:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A use of uninitialized value was found in libwebp in versions before 1.0.1 in ReadSymbol().

Action-Not Available
Vendor-webmprojectn/aRed Hat, Inc.
Product-libwebpenterprise_linuxlibwebp
CWE ID-CWE-908
Use of Uninitialized Resource
CVE-2024-23653
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.8||CRITICAL
EPSS-8.85% / 92.18%
||
7 Day CHG-0.22%
Published-31 Jan, 2024 | 22:03
Updated-23 Aug, 2024 | 18:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
BuildKit interactive containers API does not validate entitlements check

BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. In addition to running containers as build steps, BuildKit also provides APIs for running interactive containers based on built images. It was possible to use these APIs to ask BuildKit to run a container with elevated privileges. Normally, running such containers is only allowed if special `security.insecure` entitlement is enabled both by buildkitd configuration and allowed by the user initializing the build request. The issue has been fixed in v0.12.5 . Avoid using BuildKit frontends from untrusted sources.

Action-Not Available
Vendor-mobyprojectmobymobyproject
Product-buildkitbuildkitbuildkit
CWE ID-CWE-863
Incorrect Authorization
CVE-2015-8390
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-4.42% / 88.59%
||
7 Day CHG~0.00%
Published-02 Dec, 2015 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

PCRE before 8.38 mishandles the [: and \\ substrings in character classes, which allows remote attackers to cause a denial of service (uninitialized memory read) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.

Action-Not Available
Vendor-pcren/aFedora ProjectThe PHP Group
Product-fedoraperl_compatible_regular_expression_libraryphpn/a
CWE ID-CWE-908
Use of Uninitialized Resource
CVE-2022-47002
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-63.01% / 98.32%
||
7 Day CHG~0.00%
Published-01 Feb, 2023 | 00:00
Updated-03 Aug, 2024 | 14:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Remember Me function of Masa CMS v7.2, 7.3, and 7.4-beta allows attackers to bypass authentication via a crafted web request.

Action-Not Available
Vendor-masacmsn/a
Product-masacmsn/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-38171
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.24% / 47.20%
||
7 Day CHG~0.00%
Published-21 Aug, 2021 | 00:00
Updated-04 Aug, 2024 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

adts_decode_extradata in libavformat/adtsenc.c in FFmpeg 4.4 does not check the init_get_bits return value, which is a necessary step because the second argument to init_get_bits can be crafted.

Action-Not Available
Vendor-n/aDebian GNU/LinuxFFmpeg
Product-ffmpegdebian_linuxn/a
CWE ID-CWE-252
Unchecked Return Value
CVE-2022-45788
Matching Score-4
Assigner-Schneider Electric
ShareView Details
Matching Score-4
Assigner-Schneider Electric
CVSS Score-7.5||HIGH
EPSS-0.29% / 52.23%
||
7 Day CHG~0.00%
Published-30 Jan, 2023 | 00:00
Updated-05 Feb, 2025 | 20:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists that could cause arbitrary code execution, denial of service and loss of confidentiality & integrity when a malicious project file is loaded onto the controller. Affected Products: EcoStruxure Control Expert (All Versions), EcoStruxure Process Expert (All Versions), Modicon M340 CPU - part numbers BMXP34* (All Versions), Modicon M580 CPU - part numbers BMEP* and BMEH* (All Versions), Modicon M580 CPU Safety - part numbers BMEP58*S and BMEH58*S (All Versions), Modicon Momentum Unity M1E Processor - 171CBU* (All Versions), Modicon MC80 - BMKC80 (All Versions), Legacy Modicon Quantum - 140CPU65* and Premium CPUs - TSXP57* (All Versions)

Action-Not Available
Vendor-Schneider Electric SE
Product-modicon_m340_bmxp342030_firmwaremodicon_premium_tsxp57_454mmodicon_m340_bmxp3420302h_firmwaremodicon_premium_tsxp57_2834m_firmwaremodicon_premium_tsxp57_6634m_firmwaremodicon_m340_bmxp342020h_firmwaremodicon_m580_bmep583040_firmwaremodicon_m580_bmeh582040smodicon_quantum_140cpu65160_firmwaremodicon_m340_bmxp3420302_firmwaremodicon_m340_bmxp342010modicon_m580_bmeh584040smodicon_m580_bmep582020h_firmwaremodicon_m580_bmep584040s_firmwaremodicon_m580_bmep584040modicon_m340_bmxp342010_firmwaremodicon_m340_bmxp342020_firmwaremodicon_mc80_bmkc8020310_firmwaremodicon_m340_bmxp3420102_firmwaremodicon_m580_bmep585040_firmwaremodicon_m580_bmep582040h_firmwaremodicon_premium_tsxp57_454m_firmwaremodicon_quantum_140cpu65150modicon_m580_bmep584040_firmwaremodicon_momentum_171cbu78090_firmwaremodicon_m580_bmep584040smodicon_m580_bmeh582040cmodicon_m580_bmep583040ecostruxure_control_expertmodicon_m580_bmep582040modicon_m580_bmep585040modicon_premium_tsxp57_4634mmodicon_m580_bmep584020_firmwaremodicon_m580_bmeh584040modicon_m580_bmep585040c_firmwaremodicon_premium_tsxp57_2634m_firmwaremodicon_m580_bmeh584040_firmwaremodicon_momentum_171cbu78090modicon_premium_tsxp57_5634mmodicon_m580_bmep581020h_firmwaremodicon_m580_bmep584020modicon_mc80_bmkc8020301modicon_m580_bmeh584040s_firmwaremodicon_momentum_171cbu98090_firmwaremodicon_m580_bmep582040smodicon_premium_tsxp57_1634m_firmwaremodicon_m340_bmxp342020modicon_m340_bmxp342030hmodicon_m340_bmxp342020hmodicon_m580_bmeh586040cmodicon_m580_bmep582020_firmwaremodicon_momentum_171cbu98091modicon_m340_bmxp342000_firmwaremodicon_m580_bmep581020hmodicon_m580_bmeh586040_firmwaremodicon_m580_bmeh584040cmodicon_m340_bmxp342030modicon_m580_bmeh586040c_firmwaremodicon_m580_bmep586040_firmwaremodicon_m580_bmeh582040_firmwaremodicon_quantum_140cpu65150c_firmwaremodicon_m580_bmep582040_firmwaremodicon_m580_bmeh582040modicon_quantum_140cpu65160c_firmwaremodicon_mc80_bmkc8030311modicon_quantum_140cpu65160modicon_momentum_171cbu98090modicon_premium_tsxp57_1634mmodicon_m580_bmeh582040c_firmwaremodicon_m580_bmep583020modicon_m580_bmeh586040s_firmwaremodicon_m580_bmeh586040smodicon_m580_bmep586040modicon_premium_tsxp57_2634mmodicon_m340_bmxp342000modicon_m580_bmeh586040modicon_m580_bmep583020_firmwaremodicon_premium_tsxp57_5634m_firmwaremodicon_premium_tsxp57_554m_firmwaremodicon_m340_bmxp341000modicon_mc80_bmkc8020310modicon_m580_bmep582020modicon_quantum_140cpu65160cmodicon_m580_bmeh584040c_firmwaremodicon_quantum_140cpu65150_firmwaremodicon_momentum_171cbu98091_firmwaremodicon_quantum_140cpu65150cmodicon_m340_bmxp3420302hmodicon_m580_bmep585040cmodicon_mc80_bmkc8030311_firmwaremodicon_m580_bmep582040hmodicon_m340_bmxp3420302modicon_premium_tsxp57_554mmodicon_m580_bmep582040s_firmwaremodicon_premium_tsxp57_2834mmodicon_m340_bmxp341000_firmwaremodicon_m580_bmep581020_firmwaremodicon_mc80_bmkc8020301_firmwareecostruxure_process_expertmodicon_m580_bmep581020modicon_m580_bmep586040cmodicon_premium_tsxp57_4634m_firmwaremodicon_m340_bmxp342030h_firmwaremodicon_m580_bmep582020hmodicon_m580_bmep586040c_firmwaremodicon_m340_bmxp3420102modicon_m580_bmeh582040s_firmwaremodicon_premium_tsxp57_6634mModicon MC80 (BMKC80)Legacy Modicon Quantum (140CPU65*) and Premium CPUs (TSXP57*)Modicon M580 CPU Safety (part numbers BMEP58*S and BMEH58*S)Modicon M340 CPU (part numbers BMXP34*)Modicon Momentum Unity M1E Processor (171CBU*)EcoStruxure Control Expert Modicon M580 CPU (part numbers BMEP* and BMEH*) EcoStruxure Process Expert
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2024-13258
Matching Score-4
Assigner-Drupal.org
ShareView Details
Matching Score-4
Assigner-Drupal.org
CVSS Score-9.8||CRITICAL
EPSS-0.15% / 35.81%
||
7 Day CHG~0.00%
Published-09 Jan, 2025 | 19:05
Updated-04 Jun, 2025 | 15:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Drupal REST & JSON API Authentication - Moderately critical - Access bypass - SA-CONTRIB-2024-022

Incorrect Authorization vulnerability in Drupal Drupal REST & JSON API Authentication allows Forceful Browsing.This issue affects Drupal REST & JSON API Authentication: from 0.0.0 before 2.0.13.

Action-Not Available
Vendor-rest_\&_json_api_authentication_projectThe Drupal Association
Product-rest_\&_json_api_authenticationDrupal REST & JSON API Authentication
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-11680
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-9.8||CRITICAL
EPSS-93.61% / 99.83%
||
7 Day CHG~0.00%
Published-26 Nov, 2024 | 09:55
Updated-30 Jul, 2025 | 01:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2024-12-24||Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
ProjectSend Unauthenticated Configuration Modification

ProjectSend versions prior to r1720 are affected by an improper authentication vulnerability. Remote, unauthenticated attackers can exploit this flaw by sending crafted HTTP requests to options.php, enabling unauthorized modification of the application's configuration. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript.

Action-Not Available
Vendor-projectsendProjectSendprojectsendProjectSend
Product-projectsendProjectSendprojectsendProjectSend
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-863
Incorrect Authorization
CVE-2025-49825
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.10% / 28.82%
||
7 Day CHG+0.03%
Published-17 Jun, 2025 | 21:43
Updated-18 Jun, 2025 | 13:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Teleport allows remote authentication bypass

Teleport provides connectivity, authentication, access controls and audit for infrastructure. Community Edition versions before and including 17.5.1 are vulnerable to remote authentication bypass. At time of posting, there is no available open-source patch.

Action-Not Available
Vendor-gravitational
Product-teleport
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-23064
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.10% / 29.15%
||
7 Day CHG~0.00%
Published-17 Feb, 2023 | 00:00
Updated-18 Mar, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TOTOLINK A720R V4.1.5cu.532_ B20210610 is vulnerable to Incorrect Access Control.

Action-Not Available
Vendor-n/aTOTOLINK
Product-a720ra720r_firmwaren/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2008-7109
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-3.77% / 87.59%
||
7 Day CHG~0.00%
Published-28 Aug, 2009 | 15:00
Updated-21 Jan, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Scanner File Utility (aka listener) in Kyocera Mita (KM) 3.3.0.1 allows remote attackers to bypass authorization and upload arbitrary files to the client system via a modified program that does not prompt the user for a password.

Action-Not Available
Vendor-kyoceramitan/a
Product-scanner_file_utilityn/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-0949
Matching Score-4
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
ShareView Details
Matching Score-4
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
CVSS Score-9.8||CRITICAL
EPSS-0.12% / 32.03%
||
7 Day CHG~0.00%
Published-27 Jun, 2024 | 09:36
Updated-01 Aug, 2024 | 18:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Access Control in Talya Informatics' Elektraweb

Improper Access Control, Missing Authorization, Incorrect Authorization, Incorrect Permission Assignment for Critical Resource, Missing Authentication, Weak Authentication, Improper Restriction of Communication Channel to Intended Endpoints vulnerability in Talya Informatics Elektraweb allows Exploiting Incorrectly Configured Access Control Security Levels, Manipulating Web Input to File System Calls, Embedding Scripts within Scripts, Malicious Logic Insertion, Modification of Windows Service Configuration, Malicious Root Certificate, Intent Spoof, WebView Exposure, Data Injected During Configuration, Incomplete Data Deletion in a Multi-Tenant Environment, Install New Service, Modify Existing Service, Install Rootkit, Replace File Extension Handlers, Replace Trusted Executable, Modify Shared File, Add Malicious File to Shared Webroot, Run Software at Logon, Disable Security Software.This issue affects Elektraweb: before v17.0.68.

Action-Not Available
Vendor-Talya Informaticstalya_informatics
Product-Elektrawebelektraweb
CWE ID-CWE-862
Missing Authorization
CWE ID-CWE-1390
Weak Authentication
CWE ID-CWE-863
Incorrect Authorization
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-923
Improper Restriction of Communication Channel to Intended Endpoints
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2023-6036
Matching Score-4
Assigner-WPScan
ShareView Details
Matching Score-4
Assigner-WPScan
CVSS Score-9.8||CRITICAL
EPSS-46.58% / 97.58%
||
7 Day CHG~0.00%
Published-12 Feb, 2024 | 16:06
Updated-06 May, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Web3 – Crypto wallet Login & NFT token gating < 3.0.0 - Authentication Bypass

The Web3 WordPress plugin before 3.0.0 is vulnerable to an authentication bypass due to incorrect authentication checking in the login flow in functions 'handle_auth_request' and 'hadle_login_request'. This makes it possible for non authenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username.

Action-Not Available
Vendor-miniorangeUnknown
Product-web3_-_crypto_wallet_login_\&_nft_token_gatingWeb3
CWE ID-CWE-863
Incorrect Authorization
CWE ID-CWE-287
Improper Authentication
CVE-2022-46080
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-16.56% / 94.64%
||
7 Day CHG~0.00%
Published-06 Jul, 2023 | 00:00
Updated-20 Nov, 2024 | 20:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Nexxt Nebula 1200-AC 15.03.06.60 allows authentication bypass and command execution by using the HTTPD service to enable TELNET.

Action-Not Available
Vendor-nexxtsolutionsn/anexxtsolutions
Product-nebula1200-acnebula1200-ac_firmwaren/anebula1200-ac
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-5521
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-7.3||HIGH
EPSS-0.44% / 62.09%
||
7 Day CHG~0.00%
Published-11 Oct, 2023 | 12:00
Updated-18 Sep, 2024 | 15:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect Authorization in tiann/kernelsu

Incorrect Authorization in GitHub repository tiann/kernelsu prior to v0.6.9.

Action-Not Available
Vendor-kernelsutianntiann
Product-kernelsutiann/kernelsukernelsu
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-52077
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-8.9||HIGH
EPSS-0.14% / 33.95%
||
7 Day CHG~0.00%
Published-27 Dec, 2023 | 18:45
Updated-02 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
External apps using tokens issued by administrators and moderators can call admin APIs

Nexkey is a lightweight fork of Misskey v12 optimized for small to medium size servers. Prior to 12.23Q4.5, Nexkey allows external apps using tokens issued by administrators and moderators to call admin APIs. This allows malicious third-party apps to perform operations such as updating server settings, as well as compromise object storage and email server credentials. This issue has been patched in 12.23Q4.5.

Action-Not Available
Vendor-nexryainexryai
Product-nexkeynexkey
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-32986
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.8||CRITICAL
EPSS-0.19% / 40.96%
||
7 Day CHG~0.00%
Published-04 Apr, 2022 | 19:45
Updated-16 Apr, 2025 | 16:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Automation Direct CLICK PLC CPU Modules Authentication Bypass Using an Alternate Path or Channel

After Automation Direct CLICK PLC CPU Modules: C0-1x CPUs with firmware prior to v3.00 is unlocked by an authorized user, the unlocked state does not timeout. If the programming software is interrupted, the PLC remains unlocked. All subsequent programming connections are allowed without authorization. The PLC is only relocked by a power cycle, or when the programming software disconnects correctly.

Action-Not Available
Vendor-AutomationDirect
Product-c0-12dd1e-d_firmwarec0-10dd1e-dc0-12dd1e-1-dc0-11dd1e-dc0-11dre-d_firmwarec0-12are-1-dc0-11dd2e-d_firmwarec0-10dd1e-d_firmwarec0-11dd2e-dc0-12dre-2-dc0-12are-d_firmwarec0-12dd2e-d_firmwarec0-12dre-dc0-12are-2-dc0-10dre-d_firmwarec0-12dd1e-dc0-11dre-dc0-10dre-dc0-11are-dc0-12dd2e-dc0-12dd1e-2-d_firmwarec0-12dd1e-1-d_firmwarec0-12dre-d_firmwarec0-12are-2-d_firmwarec0-12dd2e-2-d_firmwarec0-12dd2e-1-d_firmwarec0-11dd1e-d_firmwarec0-12dd1e-2-dc0-12dd2e-1-dc0-10dd2e-dc0-12dre-2-d_firmwarec0-11are-d_firmwarec0-10are-d_firmwarec0-10dd2e-d_firmwarec0-12dd2e-2-dc0-12are-1-d_firmwarec0-12dre-1-d_firmwarec0-12dre-1-dc0-10are-dc0-12are-dCLICK PLC CPU Modules: C0-1x CPUs
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-5009
Matching Score-4
Assigner-GitLab Inc.
ShareView Details
Matching Score-4
Assigner-GitLab Inc.
CVSS Score-9.6||CRITICAL
EPSS-0.02% / 3.28%
||
7 Day CHG~0.00%
Published-19 Sep, 2023 | 07:01
Updated-22 May, 2025 | 04:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect Authorization in GitLab

An issue has been discovered in GitLab EE affecting all versions starting from 13.12 before 16.2.7, all versions starting from 16.3 before 16.3.4. It was possible for an attacker to run pipeline jobs as an arbitrary user via scheduled security scan policies. This was a bypass of [CVE-2023-3932](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3932) showing additional impact.

Action-Not Available
Vendor-GitLab Inc.
Product-gitlabGitLab
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-48698
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-6.8||MEDIUM
EPSS-1.47% / 80.12%
||
7 Day CHG~0.00%
Published-05 Dec, 2023 | 00:25
Updated-27 Nov, 2024 | 15:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Azure RTOS USBX Remote Code Execution Vulnerability

Azure RTOS USBX is a USB host, device, and on-the-go (OTG) embedded stack, that is fully integrated with Azure RTOS ThreadX. An attacker can cause remote code execution due to expired pointer dereference vulnerabilities in Azure RTOS USBX. The affected components include functions/processes in host stack and host classes, related to device linked classes, GSER and HID in RTOS v6.2.1 and below. The fixes have been included in USBX release 6.3.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Action-Not Available
Vendor-azure-rtosMicrosoft Corporation
Product-azure_rtos_usbxusbx
CWE ID-CWE-825
Expired Pointer Dereference
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2023-48696
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.34% / 56.29%
||
7 Day CHG~0.00%
Published-05 Dec, 2023 | 00:24
Updated-02 Aug, 2024 | 21:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Azure RTOS USBX Remote Code Execution Vulnerability

Azure RTOS USBX is a USB host, device, and on-the-go (OTG) embedded stack, that is fully integrated with Azure RTOS ThreadX. An attacker can cause remote code execution due to expired pointer dereference vulnerabilities in Azure RTOS USBX. The affected components include components in host class, related to CDC ACM in RTOS v6.2.1 and below. The fixes have been included in USBX release 6.3.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Action-Not Available
Vendor-azure-rtosMicrosoft Corporation
Product-azure_rtos_usbxusbx
CWE ID-CWE-825
Expired Pointer Dereference
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2021-33622
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.55% / 66.84%
||
7 Day CHG~0.00%
Published-15 Jun, 2021 | 18:59
Updated-03 Aug, 2024 | 23:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Sylabs Singularity 3.5.x and 3.6.x, and SingularityPRO before 3.5-8, has an Incorrect Check of a Function's Return Value.

Action-Not Available
Vendor-sylabsn/a
Product-singularitysingularitypron/a
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2021-32619
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.36% / 57.62%
||
7 Day CHG~0.00%
Published-28 May, 2021 | 21:00
Updated-03 Aug, 2024 | 23:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Static imports inside dynamically imported modules do not adhere to permission checks

Deno is a runtime for JavaScript and TypeScript that uses V8 and is built in Rust. In Deno versions 1.5.0 to 1.10.1, modules that are dynamically imported through `import()` or `new Worker` might have been able to bypass network and file system permission checks when statically importing other modules. The vulnerability has been patched in Deno release 1.10.2.

Action-Not Available
Vendor-denodenoland
Product-denodeno
CWE ID-CWE-285
Improper Authorization
CWE ID-CWE-863
Incorrect Authorization
CVE-2025-3960
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.06% / 20.14%
||
7 Day CHG~0.00%
Published-27 Apr, 2025 | 06:00
Updated-12 May, 2025 | 19:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
withstars Books-Management-System Background Interface allreaders.html authorization

A vulnerability was found in withstars Books-Management-System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /allreaders.html of the component Background Interface. The manipulation leads to missing authorization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

Action-Not Available
Vendor-withstarswithstars
Product-books-management-systemBooks-Management-System
CWE ID-CWE-862
Missing Authorization
CWE ID-CWE-863
Incorrect Authorization
CVE-2025-3963
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.06% / 20.14%
||
7 Day CHG~0.00%
Published-27 Apr, 2025 | 07:31
Updated-12 May, 2025 | 19:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
withstars Books-Management-System Background Interface list authorization

A vulnerability, which was classified as critical, has been found in withstars Books-Management-System 1.0. This issue affects some unknown processing of the file /admin/article/list of the component Background Interface. The manipulation leads to missing authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

Action-Not Available
Vendor-withstarswithstars
Product-books-management-systemBooks-Management-System
CWE ID-CWE-862
Missing Authorization
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-32163
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.24% / 47.41%
||
7 Day CHG~0.00%
Published-17 Feb, 2023 | 00:00
Updated-18 Mar, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Authentication vulnerability in MOSN v.0.23.0 allows attacker to escalate privileges via case-sensitive JWT authorization.

Action-Not Available
Vendor-n/aThe Linux Foundation
Product-modular_open_smart_networkn/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2022-44039
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.27% / 50.18%
||
7 Day CHG~0.00%
Published-05 Dec, 2022 | 00:00
Updated-24 Apr, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Franklin Fueling System FFS Colibri 1.9.22.8925 is affected by: File system overwrite. The impact is: File system rewrite (remote). ¶¶ An attacker can overwrite system files like [system.conf] and [passwd], this occurs because the insecure usage of "fopen" system function with the mode "wb" which allows overwriting file if exists. Overwriting files such as passwd, allows an attacker to escalate his privileges by planting backdoor user with root privilege or change root password.

Action-Not Available
Vendor-franklinfuelingn/a
Product-colibri_firmwaren/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-29936
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.50% / 65.08%
||
7 Day CHG~0.00%
Published-01 Apr, 2021 | 04:23
Updated-03 Aug, 2024 | 22:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the adtensor crate through 2021-01-11 for Rust. There is a drop of uninitialized memory via the FromIterator implementation for Vector and Matrix.

Action-Not Available
Vendor-adtensor_projectn/a
Product-adtensorn/a
CWE ID-CWE-908
Use of Uninitialized Resource
CVE-2025-36157
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.07% / 23.13%
||
7 Day CHG~0.00%
Published-24 Aug, 2025 | 01:14
Updated-26 Aug, 2025 | 14:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Engineering Lifecycle Management incorrect authorization

IBM Jazz Foundation 7.0.2 to 7.0.2 iFix035, 7.0.3 to 7.0.3 iFix018, and 7.1.0 to 7.1.0 iFix004 could allow an unauthenticated remote attacker to update server property files that would allow them to perform unauthorized actions.

Action-Not Available
Vendor-IBM Corporation
Product-Engineering Lifecycle Management
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-28793
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.43% / 61.56%
||
7 Day CHG~0.00%
Published-20 Apr, 2021 | 12:36
Updated-03 Aug, 2024 | 21:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

vscode-restructuredtext before 146.0.0 contains an incorrect access control vulnerability, where a crafted project folder could execute arbitrary binaries via crafted workspace configuration.

Action-Not Available
Vendor-lextudion/a
Product-restructuredtextn/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-28033
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.46% / 63.16%
||
7 Day CHG~0.00%
Published-05 Mar, 2021 | 08:38
Updated-03 Aug, 2024 | 21:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the byte_struct crate before 0.6.1 for Rust. There can be a drop of uninitialized memory if a certain deserialization method panics.

Action-Not Available
Vendor-byte_struct_projectn/a
Product-byte_structn/a
CWE ID-CWE-908
Use of Uninitialized Resource
CVE-2020-13957
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-9.8||CRITICAL
EPSS-84.90% / 99.29%
||
7 Day CHG~0.00%
Published-13 Oct, 2020 | 18:28
Updated-04 Aug, 2024 | 12:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Apache Solr versions 6.6.0 to 6.6.6, 7.0.0 to 7.7.3 and 8.0.0 to 8.6.2 prevents some features considered dangerous (which could be used for remote code execution) to be configured in a ConfigSet that's uploaded via API without authentication/authorization. The checks in place to prevent such features can be circumvented by using a combination of UPLOAD/CREATE actions.

Action-Not Available
Vendor-n/aThe Apache Software Foundation
Product-solrApache Solr
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-28035
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.42% / 60.98%
||
7 Day CHG~0.00%
Published-05 Mar, 2021 | 08:39
Updated-03 Aug, 2024 | 21:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the stack_dst crate before 0.6.1 for Rust. Because of the push_inner behavior, a drop of uninitialized memory can occur upon a val.clone() panic.

Action-Not Available
Vendor-stack_dst_projectn/a
Product-stack_dstn/a
CWE ID-CWE-908
Use of Uninitialized Resource
CVE-2023-43119
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.37% / 58.21%
||
7 Day CHG~0.00%
Published-16 Oct, 2023 | 00:00
Updated-17 Sep, 2024 | 17:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An Access Control issue discovered in Extreme Networks Switch Engine (EXOS) before 32.5.1.5, also fixed in 22.7, 31.7.2 allows attackers to gain escalated privileges using crafted telnet commands via Redis server.

Action-Not Available
Vendor-extremenetworksn/a
Product-exosn/a
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-27177
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.07% / 21.66%
||
7 Day CHG~0.00%
Published-10 Feb, 2021 | 18:34
Updated-03 Aug, 2024 | 20:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on FiberHome HG6245D devices through RP2613. It is possible to bypass authentication by sending the decoded value of the GgpoZWxwCmxpc3QKd2hvCg== string to the telnet server.

Action-Not Available
Vendor-fiberhomen/a
Product-hg6245dhg6245d_firmwaren/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-26951
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.50% / 65.08%
||
7 Day CHG~0.00%
Published-09 Feb, 2021 | 22:07
Updated-03 Aug, 2024 | 20:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the calamine crate before 0.17.0 for Rust. It allows attackers to overwrite heap-memory locations because Vec::set_len is used without proper memory claiming, and this uninitialized memory is used for a user-provided Read operation, as demonstrated by Sectors::get.

Action-Not Available
Vendor-calamine_projectn/a
Product-calaminen/a
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-908
Use of Uninitialized Resource
CVE-2021-26955
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.50% / 65.08%
||
7 Day CHG~0.00%
Published-09 Feb, 2021 | 22:07
Updated-03 Aug, 2024 | 20:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the xcb crate through 2021-02-04 for Rust. It has a soundness violation because xcb::xproto::GetAtomNameReply::name() calls std::str::from_utf8_unchecked() on unvalidated bytes from an X server.

Action-Not Available
Vendor-xcb_projectn/a
Product-xcbn/a
CWE ID-CWE-252
Unchecked Return Value
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next
Details not found