Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-2991

Summary
Assigner-VulDB
Assigner Org ID-1af790b2-7ee1-4545-860a-a788eba489b5
Published At-31 Mar, 2025 | 10:31
Updated At-31 Mar, 2025 | 12:36
Rejected At-
Credits

Tenda FH1202 Web Management Interface AdvSetWrlmacfilter access control

A vulnerability classified as critical has been found in Tenda FH1202 1.2.0.14(408). Affected is an unknown function of the file /goform/AdvSetWrlmacfilter of the component Web Management Interface. The manipulation leads to improper access controls. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:VulDB
Assigner Org ID:1af790b2-7ee1-4545-860a-a788eba489b5
Published At:31 Mar, 2025 | 10:31
Updated At:31 Mar, 2025 | 12:36
Rejected At:
▼CVE Numbering Authority (CNA)
Tenda FH1202 Web Management Interface AdvSetWrlmacfilter access control

A vulnerability classified as critical has been found in Tenda FH1202 1.2.0.14(408). Affected is an unknown function of the file /goform/AdvSetWrlmacfilter of the component Web Management Interface. The manipulation leads to improper access controls. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

Affected Products
Vendor
Tenda Technology Co., Ltd.Tenda
Product
FH1202
Modules
  • Web Management Interface
Versions
Affected
  • 1.2.0.14(408)
Problem Types
TypeCWE IDDescription
CWECWE-284Improper Access Controls
CWECWE-266Incorrect Privilege Assignment
Type: CWE
CWE ID: CWE-284
Description: Improper Access Controls
Type: CWE
CWE ID: CWE-266
Description: Incorrect Privilege Assignment
Metrics
VersionBase scoreBase severityVector
4.06.9MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
3.15.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
3.05.3MEDIUM
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
2.05.0N/A
AV:N/AC:L/Au:N/C:N/I:P/A:N
Version: 4.0
Base score: 6.9
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Version: 3.0
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Version: 2.0
Base score: 5.0
Base severity: N/A
Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

reporter
yhryhryhr_miemie (VulDB User)
Timeline
EventDate
Advisory disclosed2025-03-30 00:00:00
VulDB entry created2025-03-30 01:00:00
VulDB entry last update2025-03-30 19:21:47
Event: Advisory disclosed
Date: 2025-03-30 00:00:00
Event: VulDB entry created
Date: 2025-03-30 01:00:00
Event: VulDB entry last update
Date: 2025-03-30 19:21:47
Replaced By

Rejected Reason

References
HyperlinkResource
https://vuldb.com/?id.302040
vdb-entry
https://vuldb.com/?ctiid.302040
signature
permissions-required
https://vuldb.com/?submit.523412
third-party-advisory
https://lavender-bicycle-a5a.notion.site/Tenda-FH1202-AdvSetWrlmacfilter-1bc53a41781f807d97f3d01957f442a0?pvs=4
exploit
https://www.tenda.com.cn/
product
Hyperlink: https://vuldb.com/?id.302040
Resource:
vdb-entry
Hyperlink: https://vuldb.com/?ctiid.302040
Resource:
signature
permissions-required
Hyperlink: https://vuldb.com/?submit.523412
Resource:
third-party-advisory
Hyperlink: https://lavender-bicycle-a5a.notion.site/Tenda-FH1202-AdvSetWrlmacfilter-1bc53a41781f807d97f3d01957f442a0?pvs=4
Resource:
exploit
Hyperlink: https://www.tenda.com.cn/
Resource:
product
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cna@vuldb.com
Published At:31 Mar, 2025 | 11:15
Updated At:07 Apr, 2025 | 14:14

A vulnerability classified as critical has been found in Tenda FH1202 1.2.0.14(408). Affected is an unknown function of the file /goform/AdvSetWrlmacfilter of the component Web Management Interface. The manipulation leads to improper access controls. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.06.9MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Primary3.15.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Secondary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
Type: Secondary
Version: 4.0
Base score: 6.9
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Primary
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Type: Secondary
Version: 2.0
Base score: 5.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:N
CPE Matches

Tenda Technology Co., Ltd.
tenda
>>fh1202_firmware>>1.2.0.14\(408\)
cpe:2.3:o:tenda:fh1202_firmware:1.2.0.14\(408\):*:*:*:*:*:*:*
Tenda Technology Co., Ltd.
tenda
>>fh1202>>-
cpe:2.3:h:tenda:fh1202:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-266Primarycna@vuldb.com
CWE-284Primarycna@vuldb.com
NVD-CWE-noinfoPrimarynvd@nist.gov
CWE ID: CWE-266
Type: Primary
Source: cna@vuldb.com
CWE ID: CWE-284
Type: Primary
Source: cna@vuldb.com
CWE ID: NVD-CWE-noinfo
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://lavender-bicycle-a5a.notion.site/Tenda-FH1202-AdvSetWrlmacfilter-1bc53a41781f807d97f3d01957f442a0?pvs=4cna@vuldb.com
Exploit
Third Party Advisory
https://vuldb.com/?ctiid.302040cna@vuldb.com
Permissions Required
VDB Entry
https://vuldb.com/?id.302040cna@vuldb.com
Third Party Advisory
VDB Entry
https://vuldb.com/?submit.523412cna@vuldb.com
Third Party Advisory
VDB Entry
https://www.tenda.com.cn/cna@vuldb.com
Product
Hyperlink: https://lavender-bicycle-a5a.notion.site/Tenda-FH1202-AdvSetWrlmacfilter-1bc53a41781f807d97f3d01957f442a0?pvs=4
Source: cna@vuldb.com
Resource:
Exploit
Third Party Advisory
Hyperlink: https://vuldb.com/?ctiid.302040
Source: cna@vuldb.com
Resource:
Permissions Required
VDB Entry
Hyperlink: https://vuldb.com/?id.302040
Source: cna@vuldb.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://vuldb.com/?submit.523412
Source: cna@vuldb.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://www.tenda.com.cn/
Source: cna@vuldb.com
Resource:
Product

Change History

0
Information is not available yet

Similar CVEs

211Records found

CVE-2024-1701
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.25% / 48.07%
||
7 Day CHG~0.00%
Published-21 Feb, 2024 | 15:31
Updated-12 Feb, 2025 | 16:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
keerti1924 PHP-MYSQL-User-Login-System edit.php access control

A vulnerability has been found in keerti1924 PHP-MYSQL-User-Login-System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /edit.php. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-254389 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-keerti1924keerti1924keerti1924
Product-php_mysql_user_signup_login_systemPHP-MYSQL-User-Login-Systemphp-mysql-user-login-system
CWE ID-CWE-284
Improper Access Control
CVE-2024-6086
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-5.3||MEDIUM
EPSS-0.11% / 30.28%
||
7 Day CHG~0.00%
Published-27 Jun, 2024 | 18:46
Updated-19 Sep, 2024 | 15:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Access Control in lunary-ai/lunary

In version 1.2.7 of lunary-ai/lunary, any authenticated user, regardless of their role, can change the name of an organization due to improper access control. The function checkAccess() is not implemented, allowing users with the lowest privileges, such as the 'Prompt Editor' role, to modify organization attributes without proper authorization.

Action-Not Available
Vendor-Lunary LLC
Product-lunarylunary-ai/lunarylunary
CWE ID-CWE-284
Improper Access Control
CVE-2022-35621
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.50% / 64.98%
||
7 Day CHG~0.00%
Published-21 Sep, 2022 | 18:14
Updated-28 May, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Access control vulnerability in Evoh NFT EvohClaimable contract with sha256 hash code fa2084d5abca91a62ed1d2f1cad3ec318e6a9a2d7f1510a00d898737b05f48ae allows remote attackers to execute fraudulent NFT transfers.

Action-Not Available
Vendor-evohclaimable_projectn/a
Product-evohclaimablen/a
CWE ID-CWE-284
Improper Access Control
CVE-2022-33931
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-6.3||MEDIUM
EPSS-0.24% / 46.86%
||
7 Day CHG~0.00%
Published-10 Aug, 2022 | 16:31
Updated-16 Sep, 2024 | 22:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell Wyse Management Suite 3.6.1 and below contains an Improper Access control vulnerability in UI. An attacker with no access to Alert Classification page could potentially exploit this vulnerability, leading to the change the alert categories.

Action-Not Available
Vendor-Dell Inc.
Product-wyse_management_suiteWyse Management Suite
CWE ID-CWE-284
Improper Access Control
CVE-2022-30564
Matching Score-4
Assigner-Dahua Technologies
ShareView Details
Matching Score-4
Assigner-Dahua Technologies
CVSS Score-5.3||MEDIUM
EPSS-0.08% / 23.94%
||
7 Day CHG~0.00%
Published-09 Feb, 2023 | 00:00
Updated-25 Mar, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Some Dahua embedded products have a vulnerability of unauthorized modification of the device timestamp. By sending a specially crafted packet to the vulnerable interface, an attacker can modify the device system time.

Action-Not Available
Vendor-n/aDahua Technology Co., Ltd
Product-sd5a225gb-hnr-sl_firmwarexvr5832s-i2_firmwarexvr5832s-i2xvr5108h-i2_firmwaresd5a232gb-hnrsd59230i-hc\(-s3\)_firmwarenvr4416-16p-4ks2\/i_firmwarexvr5104h-i2sd59225i-hc\(-s3\)nvr4432-4ks2\/i_firmwarenvr5832-i\/l_firmwareipc-hf5442f-ze_firmwarenvr4432-isd5a445xa-hnr-1t_firmwaresd22404t-gn-w_firmwareipc-hf7442f-z-xxvr5216an-xnvr4816-16p-4ks2\/i_firmwareipc-hf5241f-zesd59430i-hcxvr5232an-xipc-hf5541f-ze_firmwarexvr5232an-i2_firmwarenvr5832-i\/lipc-hf5541f-zenvr4816-4ks2\/isd59232xa-hnr_firmwaresd5a225xa-hnr-slsd5a445xa-hnrnvr2104hs-i_firmwaresd5a225gb-hnr_firmwaresd5a425ga-hnr_firmwarenvr5432-16p-i\/lxvr4104hs-x_firmwarexvr5216an-i2sd59230i-hc\(-s3\)xvr5432l-i2_firmwaresd5a825-hnr-ya_firmwarexvr5108h-i2nvr5216-16p-i\/l_firmwaresd59430i-hc_firmwarexvr4108hs-x_firmwaresd5a432gb-hnrnvr4832-isd22404t-gn_firmwarexvr5116h-i2_firmwarexvr5116hs-i2_firmwarexvr5108hs-i2nvr2104-i_firmwaresd5a232xb-hnr-acnvr4816-4ks2\/i_firmwaresd5a232xb-hnr_firmwareipc-hf5842f-zenvr2204-ixvr5104hs-i2ipc-hf7842f-z-x_firmwarenvr2116-i_firmwarexvr5232an-i2sd59232-hc-la_firmwaresd22404t-gn-wxvr5116h-i2sd22204t-gn-s2sd59131i-hc\(-s3\)nvr2208-i_firmwarexvr4104c-x_firmwaresd5a245gb-hnrnvr2208-isd5a245xa-hnrnvr2104hs-invr4416-4ks2\/invr5832\/5864-i_firmwaresd5a225gb-hnr-slxvr5432l-i2nvr2116-ixvr5216a-i2_firmwarexvr5216a-i2xvr5108he-i2xvr5216an-x_firmwarenvr4416-16p-4ks2\/isd5a232xb-hnripc-hf5241f-ze_firmwaresd22204ue-gnnvr2108-isd5a425xa-hnr_firmwareipc-hf5442f-zesd5a225gb-hnrnvr4832-4ks2\/isd59225i-hc\(-s3\)_firmwarexvr5104h-i2_firmwarenvr5216-8p-i\/lxvr5432l-xsd5a245gb-hnr_firmwaresd22204db-gnynvr5216-16p-i\/lsd22204ue-gn_firmwaresd59225u-hni_firmwarenvr2204-i_firmwareipc-hf7442f-z-x_firmwarexvr5104he-i2xvr5108he-i2_firmwarenvr2116hs-i_firmwarenvr4432-i_firmwarenvr5864-i\/l_firmwaresd5a425xa-hnrsd5a232gb-hnr_firmwaresd5a432gb-hnr_firmwarenvr4432-4ks2\/ixvr4108hs-xsd5a245xa-hnr_firmwarexvr5416l-i2nvr2104-invr4432-16p-4ks2\/i_firmwaresd5a225xa-hnr-sl_firmwaresd5a232xb-hnr-pnvr2216-ixvr5116he-i2sd22204-gc-lbxvr5104hs-i2_firmwarexvr5232an-x_firmwaresd59432xa-hnrnvr4832-4ks2\/i_firmwareipc-hf71242f-z-x_firmwareipc-hf5842f-ze_firmwaresd5a445gb-hnrxvr5108hs-i2_firmwarexvr5116hs-i2nvr4832-i_firmwaresd59232-hc-lanvr5216-8p-i\/l_firmwarexvr5808s-i2_firmwarexvr4116hs-xsd22204db-gny_firmwaresd22204ue-gn-wsd59225-hc-la_firmwarexvr5216an-i2_firmwarexvr5408l-i2nvr2116hs-isd5a225xa-hnrxvr5108c-x_firmwaresd5a225xa-hnr_firmwarexvr4116hs-x_firmwaresd5a445xa-hnr-1tnvr4816-16p-4ks2\/ixvr5104he-i2_firmwarexvr4104c-xxvr5808s-i2xvr5816s-i2_firmwaresd22204ue-gn-w_firmwarexvr5408l-i2_firmwarexvr5216a-x_firmwaresd22204-gc-lb_firmwaresd59432xa-hnr_firmwarenvr4416-4ks2\/i_firmwarenvr5832\/5864-isd5a232xb-hnr-p_firmwaresd5a445gb-hnr_firmwarexvr4108c-xsd22204db-gny-w_firmwarenvr2216-i_firmwarenvr4832-16p-4ks2\/i_firmwaresd5a825-hnr-yanvr2108-i_firmwarenvr2108hs-i_firmwaresd59131i-hc\(-s3\)_firmwarenvr4216-isd22204db-gny-wsd5a425ga-hnrnvr4216-i_firmwarexvr5108c-xnvr4832-16p-4ks2\/isd22404t-gnipc-hf71242f-z-xsd59232xa-hnrnvr5864-i\/lxvr5116he-i2_firmwaresd5a825ga-hnrxvr4104hs-xsd5a825ga-hnr_firmwarexvr5216a-xxvr5416l-i2_firmwareipc-hf7842f-z-xnvr5432-16p-i\/l_firmwaresd59225-hc-laxvr5832s-x_firmwarexvr4108c-x_firmwarexvr5432l-x_firmwaresd22204t-gn-s2_firmwarexvr5816s-i2sd59225u-hnisd5a232xb-hnr-ac_firmwaresd5a445xa-hnr_firmwarexvr5832s-xnvr2108hs-invr4432-16p-4ks2\/iIPC-HX5XXX,IPC-HX7XXX,SD5A,SD22,SD59,NVR5XXX-I,NVR5XXX-I/L,NVR4XXX-I,NVR2XXX-I,XVRXXXX-I2,XVRXXXX-X
CWE ID-CWE-284
Improper Access Control
CVE-2024-50353
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.13% / 33.37%
||
7 Day CHG+0.02%
Published-30 Oct, 2024 | 13:57
Updated-13 Nov, 2024 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ICG.AspNetCore.Utilities.CloudStorage's Secure Token Durations Different Than Expected

ICG.AspNetCore.Utilities.CloudStorage is a collection of cloud storage utilities to assist with the management of files for cloud upload. Users of this library that set a duration for a SAS Uri with a value other than 1 hour may have generated a URL with a duration that is longer, or shorter than desired. Users not implemented SAS Uri's are unaffected. This issue was resolved in version 8.0.0 of the library.

Action-Not Available
Vendor-iowacomputergurusIowaComputerGurusiowa_computer_gurus
Product-aspnetcore.utilities.cloudstorageaspnetcore.utilities.cloudstorageaspnetcore.utilites.cloudstorage
CWE ID-CWE-284
Improper Access Control
CVE-2021-28505
Matching Score-4
Assigner-Arista Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Arista Networks, Inc.
CVSS Score-7.5||HIGH
EPSS-0.20% / 42.60%
||
7 Day CHG~0.00%
Published-14 Apr, 2022 | 20:05
Updated-16 Sep, 2024 | 16:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
On affected Arista EOS platforms, if a VXLAN match rule exists in an IPv4 access-list that is applied to the ingress of an L2 or an L3 port/SVI, the VXLAN rule and subsequent ACL rules in that access list will ignore the specified IP protocol.

On affected Arista EOS platforms, if a VXLAN match rule exists in an IPv4 access-list that is applied to the ingress of an L2 or an L3 port/SVI, the VXLAN rule and subsequent ACL rules in that access list will ignore the specified IP protocol.

Action-Not Available
Vendor-Arista Networks, Inc.
Product-ccs-720xp-24zy4dcs-7050sx3-96yc8ccs-710p-12ccs-720xp-48y6dcs-7050cx3m-32sccs-722xpm-48zy8dcs-7050tx3-48c8ccs-720xp-24y6ccs-722xpm-48y4ccs-720xp-48zc2dcs-7010tx-48dcs-7050cx3-32sdcs-7050sx3-48yc12dcs-7050sx3-48yc8ccs-710p-16pdcs-7050sx3-48c8eosccs-720xp-96zc2EOS
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-863
Incorrect Authorization
CVE-2016-9415
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.92% / 75.02%
||
7 Day CHG~0.00%
Published-31 Jan, 2017 | 22:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

MyBB (aka MyBulletinBoard) before 1.8.8 on Windows and MyBB Merge System before 1.8.8 on Windows allow remote attackers to overwrite arbitrary CSS files via vectors related to "style import."

Action-Not Available
Vendor-n/aMyBBMicrosoft Corporation
Product-merge_systemmybbwindowsn/a
CWE ID-CWE-284
Improper Access Control
CVE-2020-3364
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.53% / 66.19%
||
7 Day CHG~0.00%
Published-18 Jun, 2020 | 02:17
Updated-15 Nov, 2024 | 17:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XR Software Standby Route Processor Gigabit Ethernet Management Interface Access Control List Bypass Vulnerability

A vulnerability in the access control list (ACL) functionality of the standby route processor management interface of Cisco IOS XR Software could allow an unauthenticated, remote attacker to reach the configured IP addresses on the standby route processor management Gigabit Ethernet Management interface. The vulnerability is due to a logic error that was introduced in the Cisco IOS XR Software, which prevents the ACL from working when applied against the standby route processor management interface. An attacker could exploit this vulnerability by attempting to access the device through the standby route processor management interface.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xrCisco IOS XR Software
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-863
Incorrect Authorization
CVE-2016-9467
Matching Score-4
Assigner-HackerOne
ShareView Details
Matching Score-4
Assigner-HackerOne
CVSS Score-5.3||MEDIUM
EPSS-1.04% / 76.61%
||
7 Day CHG~0.00%
Published-28 Mar, 2017 | 02:46
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Nextcloud Server before 9.0.54 and 10.0.1 & ownCloud Server before 9.0.6 and 9.1.2 suffer from content spoofing in the files app. The location bar in the files app was not verifying the passed parameters. An attacker could craft an invalid link to a fake directory structure and use this to display an attacker-controlled error message to the user.

Action-Not Available
Vendor-n/aNextcloud GmbHownCloud GmbH
Product-owncloudnextcloud_serverNextcloud Server & ownCloud Server Nextcloud Server before 9.0.54 and 10.0.1 & ownCloud Server before 9.0.6 and 9.1.2
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-451
User Interface (UI) Misrepresentation of Critical Information
CVE-2016-9468
Matching Score-4
Assigner-HackerOne
ShareView Details
Matching Score-4
Assigner-HackerOne
CVSS Score-5.3||MEDIUM
EPSS-0.30% / 52.95%
||
7 Day CHG~0.00%
Published-28 Mar, 2017 | 02:46
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Nextcloud Server before 9.0.54 and 10.0.1 & ownCloud Server before 9.0.6 and 9.1.2 suffer from content spoofing in the dav app. The exception message displayed on the DAV endpoints contained partially user-controllable input leading to a potential misrepresentation of information.

Action-Not Available
Vendor-n/aNextcloud GmbHownCloud GmbH
Product-owncloudnextcloud_serverNextcloud Server & ownCloud Server Nextcloud Server before 9.0.54 and 10.0.1 & ownCloud Server before 9.0.6 and 9.1.2
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-451
User Interface (UI) Misrepresentation of Critical Information
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next
Details not found