Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-45393

Summary
Assigner-Cribl
Assigner Org ID-af879a92-7297-456a-bb0e-905ac6c64bdc
Published At-12 May, 2026 | 01:06
Updated At-15 May, 2026 | 20:04
Rejected At-
Credits

Reserved. Details will be published at disclosure.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Cribl
Assigner Org ID:af879a92-7297-456a-bb0e-905ac6c64bdc
Published At:12 May, 2026 | 01:06
Updated At:15 May, 2026 | 20:04
Rejected At:
â–¼CVE Numbering Authority (CNA)

Reserved. Details will be published at disclosure.

Affected Products
Vendor
Cribl
Product
Cribl Edge
Platforms
  • Windows
Default Status
unaffected
Versions
Affected
  • From 0 before 4.17.1 (semver)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://docs.cribl.io/edge/release-notes/release-v4171#security-fixes
release-notes
https://trust.cribl.io/notifications
vendor-advisory
Hyperlink: https://docs.cribl.io/edge/release-notes/release-v4171#security-fixes
Resource:
release-notes
Hyperlink: https://trust.cribl.io/notifications
Resource:
vendor-advisory
â–¼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-20CWE-20 Improper Input Validation
Type: CWE
CWE ID: CWE-20
Description: CWE-20 Improper Input Validation
Metrics
VersionBase scoreBase severityVector
3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:af879a92-7297-456a-bb0e-905ac6c64bdc
Published At:12 May, 2026 | 02:16
Updated At:15 May, 2026 | 21:16

Reserved. Details will be published at disclosure.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-20Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-20
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://docs.cribl.io/edge/release-notes/release-v4171#security-fixesaf879a92-7297-456a-bb0e-905ac6c64bdc
N/A
https://trust.cribl.io/notificationsaf879a92-7297-456a-bb0e-905ac6c64bdc
N/A
Hyperlink: https://docs.cribl.io/edge/release-notes/release-v4171#security-fixes
Source: af879a92-7297-456a-bb0e-905ac6c64bdc
Resource: N/A
Hyperlink: https://trust.cribl.io/notifications
Source: af879a92-7297-456a-bb0e-905ac6c64bdc
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

532Records found

CVE-2024-42531
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.22% / 45.11%
||
7 Day CHG~0.00%
Published-23 Aug, 2024 | 00:00
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Ezviz Internet PT Camera CS-CV246 D15655150 allows an unauthenticated host to access its live video stream by crafting a set of RTSP packets with a specific set of URLs that can be used to redirect the camera feed. NOTE: the vendor's perspective is that the Anonymous120386 sample code can establish RTSP protocol communictaion, but cannot obtain video or audio data; thus, there is no risk.

Action-Not Available
Vendor-n/aezviz
Product-n/acs-cv246_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2022-24720
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.88% / 75.50%
||
7 Day CHG~0.00%
Published-01 Mar, 2022 | 00:00
Updated-22 Apr, 2025 | 18:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Input Validation in image_processing

image_processing is an image processing wrapper for libvips and ImageMagick/GraphicsMagick. Prior to version 1.12.2, using the `#apply` method from image_processing to apply a series of operations that are coming from unsanitized user input allows the attacker to execute shell commands. This method is called internally by Active Storage variants, so Active Storage is vulnerable as well. The vulnerability has been fixed in version 1.12.2 of image_processing. As a workaround, users who process based on user input should always sanitize the user input by allowing only a constrained set of operations.

Action-Not Available
Vendor-image_processing_projectjankoDebian GNU/Linux
Product-debian_linuximage_processingimage_processing
CWE ID-CWE-20
Improper Input Validation
CVE-2026-33729
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.02% / 4.86%
||
7 Day CHG~0.00%
Published-27 Mar, 2026 | 00:27
Updated-14 Apr, 2026 | 01:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OpenFGA has an Authorization Bypass through cached keys

OpenFGA is a high-performance and flexible authorization/permission engine built for developers and inspired by Google Zanzibar. In versions prior to 1.13.1, under specific conditions, models using conditions with caching enabled can result in two different check requests producing the same cache key. This can result in OpenFGA reusing an earlier cached result for a different request. Users are affected if the model has relations which rely on condition evaluation andncaching is enabled. OpenFGA v1.13.1 contains a patch.

Action-Not Available
Vendor-openfgaopenfga
Product-openfgaopenfga
CWE ID-CWE-1289
Improper Validation of Unsafe Equivalence in Input
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2017-4997
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-9.8||CRITICAL
EPSS-3.91% / 88.42%
||
7 Day CHG~0.00%
Published-29 Jun, 2017 | 17:00
Updated-13 May, 2026 | 00:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

EMC VASA Provider Virtual Appliance versions 8.3.x and prior has an unauthenticated remote code execution vulnerability that could potentially be exploited by malicious users to compromise the affected system.

Action-Not Available
Vendor-n/aDell Inc.
Product-emc_vasa_provider_virtual_applianceVASA Provider Virtual Appliance versions 8.3.x and prior
CWE ID-CWE-20
Improper Input Validation
CVE-2026-3204
Matching Score-4
Assigner-Devolutions Inc.
ShareView Details
Matching Score-4
Assigner-Devolutions Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.08% / 22.89%
||
7 Day CHG~0.00%
Published-03 Mar, 2026 | 21:24
Updated-05 Mar, 2026 | 15:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the error message page in Devolutions Server 2025.3.16 and earlier allows remote attackers to spoof the displayed error message via a specially crafted URL.

Action-Not Available
Vendor-Devolutions
Product-devolutions_serverServer
CWE ID-CWE-20
Improper Input Validation
CVE-2026-4755
Matching Score-4
Assigner-Government Technology Agency of Singapore Cyber Security Group (GovTech CSG)
ShareView Details
Matching Score-4
Assigner-Government Technology Agency of Singapore Cyber Security Group (GovTech CSG)
CVSS Score-9.8||CRITICAL
EPSS-0.15% / 34.70%
||
7 Day CHG~0.00%
Published-24 Mar, 2026 | 06:04
Updated-26 Mar, 2026 | 19:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CWE-20 in MolotovCherry Android-ImageMagick7

CWE-20 vulnerability in MolotovCherry Android-ImageMagick7.This issue affects Android-ImageMagick7: before 7.1.2-11.

Action-Not Available
Vendor-molotovcherryMolotovCherry
Product-android-imagemagick7Android-ImageMagick7
CWE ID-CWE-20
Improper Input Validation
CVE-2017-3881
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-9.8||CRITICAL
EPSS-94.28% / 99.94%
||
7 Day CHG~0.00%
Published-17 Mar, 2017 | 22:00
Updated-22 Apr, 2026 | 15:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-04-15||Apply updates per vendor instructions.

A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-catalyst_2960l-16ts-llie_2000-16tc-g-e_industrial_ethernet_switchcatalyst_3560e-48pd-sfcatalyst_c2928-48tc-ccatalyst_3560v2-24pscatalyst_3560v2-24dcie_2000-4ts-g_industrial_ethernet_switchcatalyst_3560x-24t-scatalyst_2960s-48lpd-lcatalyst_2960s-48ts-scatalyst_2960-plus_24pc-lcatalyst_2960c-8tc-scatalyst_3560c-12pc-scatalyst_3560x-48u-scatalyst_2960x-48ts-llie_2000-4t_industrial_ethernet_switchcatalyst_2960-24lc-scatalyst_3550_24_pwrcatalyst_2960-24-scatalyst_2960-plus_48pst-lcatalyst_4500_supervisor_engine_ivioscatalyst_4500e_supervisor_engine_8-ecatalyst_3750x-24u-ecatalyst_2960xr-24pd-lcatalyst_2960x-48fpd-lcatalyst_3560g-24pscatalyst_2960xr-48td-icatalyst_3750x-12s-scatalyst_2360-48td-scatalyst_3560x-48pf-scatalyst_4948e_ethernet_switchenhanced_layer_2_etherswitch_service_modulecatalyst_2960l-48ps-llie_2000-4t-g_industrial_ethernet_switchcatalyst_2960s-48lps-lcatalyst_3750g-24tscatalyst_4500_supervisor_engine_6l-ecatalyst_2960xr-48lps-icatalyst_2960xr-24ts-lcatalyst_blade_switch_3130catalyst_3560x-24u-lcatalyst_2960-48pst-lcatalyst_2960-48tt-scatalyst_3560c-8pc-scatalyst_2960xr-48fps-lcatalyst_2960s-f24ps-lcatalyst_3560v2-48tscatalyst_2960g-24tc-lcatalyst_2960-plus_24pc-sie-4000-4t4p4g-e_industrial_ethernet_switchcatalyst_2960-24lt-lcatalyst_3750-24pscatalyst_3560x-24u-ecatalyst_3750x-48t-lenhanced_layer_2\/3_etherswitch_service_modulecatalyst_2350-48td-sdcatalyst_2960l-24ts-llie-4000-8gt4g-e_industrial_ethernet_switchie_2000-16tc_industrial_ethernet_switchcatalyst_2960s-24ps-lcatalyst_blade_switch_3020catalyst_2960g-48tc-lsm-x_layer_2\/3_etherswitch_service_modulecatalyst_3750x-24s-ecatalyst_4928_10_gigabit_ethernet_switchcatalyst_4948_10_gigabit_ethernet_switchie_2000-8tc-g-e_industrial_ethernet_switchcatalyst_3750x-48u-scatalyst_3560e-48pd-efcatalyst_3560e-24pd-scatalyst_2960-8tc-lcatalyst_2960-24pc-lcatalyst_2970g-24tembedded_service_2020_24tc_concatalyst_2960cg-8tc-lie-4010-16s12p_industrial_ethernet_switchie-4000-16gt4g-e_industrial_ethernet_switchcatalyst_2960xr-24ps-icatalyst_blade_switch_3120xcatalyst_3750x-48p-sie_2000-16ptc-g_industrial_ethernet_switchcatalyst_3560x-24t-lie-3010-16s-8pc_industrial_ethernet_switchcatalyst_2960-plus_48pst-scatalyst_2960-plus_24lc-sembedded_service_2020_con_bcatalyst_3560x-48t-scatalyst_3560x-24t-ecatalyst_2960s-f48ts-sie-4000-4tc4g-e_industrial_ethernet_switchembedded_service_2020_concatalyst_4500_supervisor_engine_6-ecatalyst_switch_module_3110catalyst_3560e-12d-scatalyst_3550_48_smicatalyst_3560-24pscatalyst_3560x-48u-ecatalyst_2960x-48lps-lcatalyst_2960-48tc-lcatalyst_3750x-48p-eie-4000-8gs4g-e_industrial_ethernet_switchcatalyst_2960s-24pd-lcatalyst_3560x-24p-scatalyst_blade_switch_3030catalyst_switch_module_3110xcatalyst_2960s-24ts-lcatalyst_3560cpd-8pt-scatalyst_3750g-16tdcatalyst_2918-24tc-ccatalyst_3560g-48tsie_3000-4tc_industrial_ethernet_switchcatalyst_2960-plus_24lc-lie-4000-4gc4gp4g-e_industrial_ethernet_switchie_3000-8tc_industrial_ethernet_switchcatalyst_3750e-48td-ecatalyst_3750x-48u-lcatalyst_3560e-48pd-sie_2000-16tc-g_industrial_ethernet_switchcatalyst_3750v2-24fsie_2000-4s-ts-g_industrial_ethernet_switchcatalyst_2960cx-8pc-lcatalyst_4948catalyst_3560-8pccatalyst_3560cx-12tc-scatalyst_3560e-48pd-eie-5000-16s12p_industrial_ethernet_switchcatalyst_3750x-24p-scatalyst_2960-24pc-scatalyst_3750x-48p-lcatalyst_3750x-24p-lcatalyst_2960c-8pc-lcatalyst_3750_metro_24-accatalyst_2960xr-48lps-lgigabit_ethernet_switch_module_\(cgesm\)catalyst_2960xr-48lpd-lcatalyst_2960s-f48fps-lcatalyst_3560x-48p-ecatalyst_2960x-48ts-lcatalyst_2960xr-48fps-icatalyst_3550_24_emicatalyst_3560e-24pd-eios_xecatalyst_4500_supervisor_engine_ii-plus-tsie_2000-8tc-g-n_industrial_ethernet_switchcatalyst_3750x-48pf-lie_2000-16tc-g-x_industrial_ethernet_switchcatalyst_2960x-24psq-lcatalyst_2960xr-24td-icatalyst_3560e-24td-ecatalyst_2960xr-48lpd-icatalyst_3750v2-48pscatalyst_2918-24tt-ccatalyst_3550_12tcatalyst_2960-48pst-sie-4000-4gs8gp4g-e_industrial_ethernet_switchcatalyst_3560-48tscatalyst_c2928-24lt-ccatalyst_3550_48_emicatalyst_3750g-24pscatalyst_2960-24tt-lcatalyst_2960l-8ts-llcatalyst_3750x-48pf-ecatalyst_3560x-48p-lcatalyst_3560e-12sd-eembedded_service_2020_ncpcatalyst_4500_supervisor_engine_v-10gecatalyst_3750_metro_24-dccatalyst_3560x-48pf-lcatalyst_2960cpd-8pt-lcatalyst_2960xr-48ts-icatalyst_2960l-24ps-llcatalyst_2960x-24ts-lcatalyst_4900mcatalyst_2960xr-24td-lcatalyst_3750e-48pd-scatalyst_2960xr-48fpd-lcatalyst_3560cx-8tc-scatalyst_3750-48pscatalyst_3560e-12sd-scatalyst_3560cx-12pd-sembedded_service_2020_24tc_ncp_bcatalyst_2960-48tt-lcatalyst_2960s-24td-lcatalyst_2960x-24ps-lcatalyst_2960xr-48ts-lcatalyst_3750x-48t-ecatalyst_2960-plus_24tc-lcatalyst_2960-plus_48tc-lcatalyst_3560e-24td-scatalyst_3560v2-24tsie_2000-4ts_industrial_ethernet_switchcatalyst_4000_supervisor_engine_vcatalyst_2960x-24pd-lcatalyst_3560cg-8pc-scatalyst_2960-24tc-lcatalyst_3560x-24p-eie-4000-8s4g-e_industrial_ethernet_switchcatalyst_2960-8tc-scatalyst_3750x-24u-lcatalyst_4500_supervisor_ii-plus-10gecatalyst_2928-24tc-ccatalyst_3560v2-48pscatalyst_2960xr-24pd-icatalyst_3750e-24td-scatalyst_4948e-f_ethernet_switchcatalyst_3560-12pc-scatalyst_2960s-48fps-lcatalyst_2975catalyst_3750x-24p-ecatalyst_3750-48tscatalyst_2960x-48td-lembedded_service_2020_24tc_ncpie_2000-24t67_industrial_ethernet_switchcatalyst_2960x-24ts-llcatalyst_3750x-24u-scatalyst_3550_24_fx_smicatalyst_3750e-24pd-ecatalyst_2970g-24tscatalyst_3750x-12s-ecatalyst_4500_supervisor_engine_ii-pluscatalyst_3560-24tscatalyst_3750-24fscatalyst_3560g-24tscatalyst_blade_switch_3040me_4924-10gecatalyst_2960-plus_24tc-scatalyst_3750g-48tsie-4000-16t4g-e_industrial_ethernet_switchcatalyst_2960xr-48td-lcatalyst_3560e-12d-ecatalyst_3560x-48pf-ecatalyst_2960s-f24ts-scatalyst_3750g-12scatalyst_3560-48psie-5000-12s12p-10g_industrial_ethernet_switchcatalyst_3750-24tscatalyst_3750e-48pd-ecatalyst_3750e-48td-sie_2000-8tc_industrial_ethernet_switchcatalyst_4000_supervisor_engine_icatalyst_3750g-24tie_2000-16t67_industrial_ethernet_switchie-4000-4s8p4g-e_industrial_ethernet_switchcatalyst_4500_supervisor_engine_vie-4000-8gt8gp4g-e_industrial_ethernet_switchcatalyst_2960-plus_48tc-scatalyst_3750x-24t-scatalyst_blade_switch_3032catalyst_2960s-f48lps-lembedded_service_2020_ncp_bcatalyst_2960xr-48fpd-icatalyst_3560x-48p-scatalyst_3750e-24pd-scatalyst_3560x-48u-lcatalyst_3560x-48t-ecatalyst_2918-48tt-ccatalyst_3560cx-8xpd-scatalyst_3750g-12s-sdcatalyst_2960x-48lpd-lcatalyst_3550_24_smicatalyst_2960-24tc-scatalyst_3560x-24u-scatalyst_3750e-48pd-sfcatalyst_3750v2-24pscatalyst_3750v2-24tscatalyst_3560g-48psrf_gateway_10catalyst_2960c-8tc-lie-4000-8t4g-e_industrial_ethernet_switchcatalyst_2960cpd-8tt-lcatalyst_2960s-24ts-sie_2000-8tc-g_industrial_ethernet_switchcatalyst_3560cx-8pc-scatalyst_2960-48tc-scatalyst_3750e-24td-eie-3010-24tc_industrial_ethernet_switchcatalyst_3560e-48td-sie-4010-4s24p_industrial_ethernet_switchcatalyst_3560x-48t-lcatalyst_2960x-24td-lcatalyst_switch_module_3012catalyst_2960c-12pc-lcatalyst_3750x-24t-lcatalyst_2960x-48fps-lcatalyst_3750e-48pd-efie_2000-8t67_industrial_ethernet_switchcatalyst_2960s-48fpd-lie_2000-16tc-g-n_industrial_ethernet_switchcatalyst_2960l-48ts-llcatalyst_2960pd-8tt-lcatalyst_3750g-48pscatalyst_2960cx-8tc-lcatalyst_2960s-f48ts-lcatalyst_3560cx-12pc-scatalyst_3750x-24s-scatalyst_3560cg-8tc-scatalyst_2960l-16ps-llie_2000-16t67p_industrial_ethernet_switchcatalyst_2350-48td-scatalyst_blade_switch_3120ie_2000-8t67p_industrial_ethernet_switchcatalyst_3750x-48pf-scatalyst_3560cx-8pt-scatalyst_2960s-48td-lcatalyst_3750x-24t-ecatalyst_2960g-8tc-lembedded_service_2020_24tc_con_bcatalyst_3750x-48u-ecatalyst_3750g-24ts-1ucatalyst_3550_12gcatalyst_2960s-f24ts-lcatalyst_3550_24_dc_smicatalyst_2960xr-24ts-icatalyst_3560x-24p-lcatalyst_3750v2-48tscatalyst_3750x-48t-scatalyst_2918-48tc-ccatalyst_4000_supervisor_engine_ivcatalyst_2960l-8ps-llcatalyst_2960xr-24ps-lcatalyst_2960s-48ts-lcatalyst_3560e-48td-eCisco IOS and IOS XE SoftwareIOS and IOS XE
CWE ID-CWE-20
Improper Input Validation
CVE-2026-31900
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-8.7||HIGH
EPSS-0.09% / 25.10%
||
7 Day CHG+0.01%
Published-11 Mar, 2026 | 19:15
Updated-16 Mar, 2026 | 20:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Black's vulnerable version parsing leads to RCE in GitHub Action

Black is the uncompromising Python code formatter. Black provides a GitHub action for formatting code. This action supports an option, use_pyproject: true, for reading the version of Black to use from the repository pyproject.toml. A malicious pull request could edit pyproject.toml to use a direct URL reference to a malicious repository. This could lead to arbitrary code execution in the context of the GitHub Action. Attackers could then gain access to secrets or permissions available in the context of the action. Version 26.3.0 fixes this vulnerability.

Action-Not Available
Vendor-psfPython Software Foundation
Product-blackblack
CWE ID-CWE-20
Improper Input Validation
CVE-2020-3850
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-9.8||CRITICAL
EPSS-1.18% / 78.96%
||
7 Day CHG~0.00%
Published-01 Apr, 2020 | 18:08
Updated-04 Aug, 2024 | 07:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A memory corruption issue was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15.3. A remote attacker may be able to cause unexpected application termination or arbitrary code execution.

Action-Not Available
Vendor-Apple Inc.
Product-mac_os_xmacOS
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-20
Improper Input Validation
CVE-2022-23992
Matching Score-4
Assigner-CA Technologies - A Broadcom Company
ShareView Details
Matching Score-4
Assigner-CA Technologies - A Broadcom Company
CVSS Score-9.8||CRITICAL
EPSS-1.69% / 82.46%
||
7 Day CHG~0.00%
Published-14 Feb, 2022 | 21:04
Updated-03 Aug, 2024 | 03:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

XCOM Data Transport for Windows, Linux, and UNIX 11.6 releases contain a vulnerability due to insufficient input validation that could potentially allow remote attackers to execute arbitrary commands with elevated privileges.

Action-Not Available
Vendor-n/aBroadcom Inc.
Product-xcom_data_transportXCOM Data Transport for Windows, Linux, and UNIX
CWE ID-CWE-20
Improper Input Validation
CVE-2021-3028
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-1.05% / 77.76%
||
7 Day CHG~0.00%
Published-13 Jan, 2021 | 16:14
Updated-03 Aug, 2024 | 16:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

git-big-picture before 1.0.0 mishandles ' characters in a branch name, leading to code execution.

Action-Not Available
Vendor-git-big-picture_projectn/a
Product-git-big-picturen/a
CWE ID-CWE-20
Improper Input Validation
CVE-2022-47190
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
ShareView Details
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
CVSS Score-10||CRITICAL
EPSS-2.95% / 86.59%
||
7 Day CHG~0.00%
Published-31 Mar, 2023 | 00:00
Updated-11 Feb, 2025 | 19:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
RCE via file upload vulnerability in Generex CS141

Generex UPS CS141 below 2.06 version, could allow a remote attacker to upload a firmware file containing a webshell that could allow him to execute arbitrary code as root.

Action-Not Available
Vendor-generexGenerex
Product-cs141_firmwarecs141UPS CS141
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-434
Unrestricted Upload of File with Dangerous Type
CVE-2025-30452
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.20% / 42.03%
||
7 Day CHG+0.06%
Published-31 Mar, 2025 | 22:22
Updated-02 Apr, 2026 | 19:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5. An input validation issue was addressed.

Action-Not Available
Vendor-Apple Inc.
Product-macosmacOS
CWE ID-CWE-20
Improper Input Validation
CVE-2019-5464
Matching Score-4
Assigner-HackerOne
ShareView Details
Matching Score-4
Assigner-HackerOne
CVSS Score-9.8||CRITICAL
EPSS-0.43% / 62.69%
||
7 Day CHG~0.00%
Published-28 Jan, 2020 | 02:23
Updated-04 Aug, 2024 | 19:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flawed DNS rebinding protection issue was discovered in GitLab CE/EE 10.2 and later in the `url_blocker.rb` which could result in SSRF where the library is utilized.

Action-Not Available
Vendor-GitLab Inc.
Product-gitlabGitLab CE/EE
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2021-27388
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-9.8||CRITICAL
EPSS-1.86% / 83.28%
||
7 Day CHG~0.00%
Published-15 Jun, 2021 | 19:40
Updated-03 Aug, 2024 | 20:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SINAMICS medium voltage routable products are affected by a vulnerability in the Sm@rtServer component for remote access that could allow an unauthenticated attacker to cause a denial-of-service condition, and/or execution of limited configuration modifications and/or execution of limited control commands on the SINAMICS Medium Voltage Products, Remote Access (SINAMICS SL150: All versions, SINAMICS SM150: All versions, SINAMICS SM150i: All versions).

Action-Not Available
Vendor-n/aSiemens AG
Product-sinamics_sl150sinamics_sm150isinamics_sm150_firmwaresinamics_sl150_firmwaresinamics_sm150i_firmwaresinamics_sm150SINAMICS Medium Voltage Products, Remote Access
CWE ID-CWE-20
Improper Input Validation
CVE-2020-3847
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-9.8||CRITICAL
EPSS-1.34% / 80.19%
||
7 Day CHG~0.00%
Published-01 Apr, 2020 | 18:09
Updated-04 Aug, 2024 | 07:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15.3. A remote attacker may be able to leak memory.

Action-Not Available
Vendor-Apple Inc.
Product-mac_os_xmacOS
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-20
Improper Input Validation
CVE-2021-26630
Matching Score-4
Assigner-KrCERT/CC
ShareView Details
Matching Score-4
Assigner-KrCERT/CC
CVSS Score-7.8||HIGH
EPSS-0.29% / 52.43%
||
7 Day CHG~0.00%
Published-19 May, 2022 | 14:52
Updated-03 Aug, 2024 | 20:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HANDY Groupware file download and execute vulnerability

Improper input validation vulnerability in HANDY Groupware’s ActiveX moudle allows attackers to download or execute arbitrary files. This vulnerability can be exploited by using the file download or execution path as the parameter value of the vulnerable function.

Action-Not Available
Vendor-handysoftHandysoft Co.,LtdMicrosoft Corporation
Product-windowsgroupwareHANDY Groupware
CWE ID-CWE-20
Improper Input Validation
CVE-2022-25167
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-9.8||CRITICAL
EPSS-7.01% / 91.56%
||
7 Day CHG-1.01%
Published-14 Jun, 2022 | 07:55
Updated-03 Aug, 2024 | 04:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache Flume vulnerable to a JNDI RCE in JMSSource

Apache Flume versions 1.4.0 through 1.9.0 are vulnerable to a remote code execution (RCE) attack when a configuration uses a JMS Source with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI to allow only the use of the java protocol or no protocol.

Action-Not Available
Vendor-The Apache Software Foundation
Product-flumeApache Flume
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CWE ID-CWE-20
Improper Input Validation
CVE-2021-26617
Matching Score-4
Assigner-KrCERT/CC
ShareView Details
Matching Score-4
Assigner-KrCERT/CC
CVSS Score-8.1||HIGH
EPSS-0.73% / 72.84%
||
7 Day CHG~0.00%
Published-25 Feb, 2022 | 18:10
Updated-03 Aug, 2024 | 20:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Gabia Firstmall remote code execution vulnerability

This issues due to insufficient verification of the various input values from user’s input. The vulnerability allows remote attackers to execute malicious code in Firstmall via navercheckout_add function.

Action-Not Available
Vendor-firstmallGabia Co., LtdMicrosoft Corporation
Product-windowsfirstmallFirstmall
CWE ID-CWE-20
Improper Input Validation
CVE-2020-3703
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.29% / 52.80%
||
7 Day CHG~0.00%
Published-02 Nov, 2020 | 06:21
Updated-04 Aug, 2024 | 07:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

u'Buffer over-read issue in Bluetooth peripheral firmware due to lack of check for invalid opcode and length of opcode received from central device(This CVE is equivalent to Link Layer Length Overfow issue (CVE-2019-16336,CVE-2019-17519) and Silent Length Overflow issue(CVE-2019-17518) mentioned in sweyntooth paper)' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music in APQ8053, APQ8076, AR9344, Bitra, Kamorta, MDM9206, MDM9207C, MDM9607, MSM8905, MSM8917, MSM8937, MSM8940, MSM8953, Nicobar, QCA6174A, QCA9377, QCM2150, QCM6125, QCS404, QCS405, QCS605, QCS610, QM215, Rennell, SC8180X, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SDX24, SM6150, SM7150, SM8150, SXR1130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwarekamorta_firmwareqcm2150_firmwareqcs610sdm632_firmwaresdm845sdm450_firmwaresdm632sdx24sdm439qcs404_firmwaresdm429msm8940_firmwaresm7150_firmwaresm6150ar9344sm7150msm8917sdm670qcs605_firmwareapq8076sc8180xmdm9206qca6174asdm670_firmwareqcs404sdx24_firmwareapq8076_firmwaresdm636qca9377bitramdm9206_firmwareqcs605bitra_firmwaremsm8937_firmwaresdm429_firmwaremsm8905_firmwaresxr1130_firmwaresxr1130apq8053_firmwarenicobarmsm8953sdm450sdm636_firmwaresdx20qcm2150sdm660sdm630mdm9607_firmwaresc8180x_firmwareqcs405sdm710qm215mdm9607sdm710_firmwareqcm6125qcs610_firmwaremsm8937mdm9207c_firmwaremsm8905mdm9207cqca6174a_firmwaresm8150_firmwaresdm439_firmwareqcs405_firmwarerennellsdm630_firmwarerennell_firmwareqm215_firmwaremsm8953_firmwaremsm8940sm6150_firmwareapq8053msm8917_firmwaresm8150ar9344_firmwaresdx20_firmwarekamortanicobar_firmwaresdm660_firmwareqcm6125_firmwaresdm845_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-20
Improper Input Validation
CVE-2010-4815
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.96% / 76.77%
||
7 Day CHG~0.00%
Published-05 Feb, 2020 | 18:54
Updated-07 Aug, 2024 | 04:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Coppermine gallery before 1.4.26 has an input validation vulnerability that allows for code execution.

Action-Not Available
Vendor-coppermine-gallerycoppermine gallery
Product-coppermine_gallerycoppermine gallery
CWE ID-CWE-20
Improper Input Validation
CVE-2025-27378
Matching Score-4
Assigner-4760f414-e1ae-4ff1-bdad-c7a9c3538b79
ShareView Details
Matching Score-4
Assigner-4760f414-e1ae-4ff1-bdad-c7a9c3538b79
CVSS Score-8.6||HIGH
EPSS-0.03% / 10.30%
||
7 Day CHG~0.00%
Published-22 Jan, 2026 | 01:06
Updated-26 Feb, 2026 | 21:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SQL Injection in AES Due to Inactive SQL Parsing Configuration

AES contains a SQL injection vulnerability due to an inactive configuration that prevents the latest SQL parsing logic from being applied. When this configuration is not enabled, crafted input may be improperly handled, allowing attackers to inject and execute arbitrary SQL queries.

Action-Not Available
Vendor-altiumAltium
Product-on-prem_enterprise_serverAES
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2025-27151
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-4.7||MEDIUM
EPSS-0.27% / 50.40%
||
7 Day CHG~0.00%
Published-29 May, 2025 | 09:07
Updated-23 Dec, 2025 | 15:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
redis-check-aof may lead to stack overflow and potential RCE

Redis is an open source, in-memory database that persists on disk. In versions starting from 7.0.0 to before 8.0.2, a stack-based buffer overflow exists in redis-check-aof due to the use of memcpy with strlen(filepath) when copying a user-supplied file path into a fixed-size stack buffer. This allows an attacker to overflow the stack and potentially achieve code execution. This issue has been patched in version 8.0.2.

Action-Not Available
Vendor-Redis Inc.
Product-redisredis
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-20
Improper Input Validation
CVE-2025-2690
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.08% / 24.39%
||
7 Day CHG~0.00%
Published-24 Mar, 2025 | 07:31
Updated-24 Mar, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
yiisoft Yii2 MockClass.php generate deserialization

A vulnerability, which was classified as critical, was found in yiisoft Yii2 up to 2.0.39. This affects the function Generate of the file phpunit\src\Framework\MockObject\MockClass.php. The manipulation leads to deserialization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-yiiframeworkyiisoft
Product-yiiYii2
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-502
Deserialization of Untrusted Data
CVE-2025-2689
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.11% / 28.88%
||
7 Day CHG~0.00%
Published-24 Mar, 2025 | 07:00
Updated-24 Mar, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
yiisoft Yii2 SortableIterator.php getIterator deserialization

A vulnerability, which was classified as critical, has been found in yiisoft Yii2 up to 2.0.45. Affected by this issue is the function getIterator of the file symfony\finder\Iterator\SortableIterator.php. The manipulation leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-yiiframeworkyiisoft
Product-yiiYii2
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-502
Deserialization of Untrusted Data
CVE-2010-4660
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.42% / 62.00%
||
7 Day CHG~0.00%
Published-20 Nov, 2019 | 15:41
Updated-07 Aug, 2024 | 03:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in statusnet through 2010 due to the way addslashes are used in SQL string escapes..

Action-Not Available
Vendor-statusstatusnet
Product-statusnetstatusnet
CWE ID-CWE-20
Improper Input Validation
CVE-2025-27224
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.24% / 46.97%
||
7 Day CHG~0.00%
Published-27 Oct, 2025 | 00:00
Updated-31 Oct, 2025 | 20:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TRUfusion Enterprise through 7.10.4.0 uses the /trufusionPortal/fileupload endpoint to upload files. However, the application doesn't properly sanitize the input to this endpoint, ultimately allowing path traversal sequences to be included. This can be used to write to any filename with any file type at any location on the local server, ultimately allowing execution of arbitrary code.

Action-Not Available
Vendor-rocketsoftwaren/a
Product-trufusion_enterprisen/a
CWE ID-CWE-20
Improper Input Validation
CVE-2025-27212
Matching Score-4
Assigner-HackerOne
ShareView Details
Matching Score-4
Assigner-HackerOne
CVSS Score-9.8||CRITICAL
EPSS-1.07% / 77.98%
||
7 Day CHG~0.00%
Published-04 Aug, 2025 | 22:12
Updated-05 Aug, 2025 | 14:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An Improper Input Validation in certain UniFi Access devices could allow a Command Injection by a malicious actor with access to UniFi Access management network. Affected Products: UniFi Access Reader Pro (Version 2.14.21 and earlier) UniFi Access G2 Reader Pro (Version 1.10.32 and earlier) UniFi Access G3 Reader Pro (Version 1.10.30 and earlier) UniFi Access Intercom (Version 1.7.28 and earlier) UniFi Access G3 Intercom (Version 1.7.29 and earlier) UniFi Access Intercom Viewer (Version 1.3.20 and earlier) Mitigation: Update UniFi Access Reader Pro Version 2.15.9 or later Update UniFi Access G2 Reader Pro Version 1.11.23 or later Update UniFi Access G3 Reader Pro Version 1.11.22 or later Update UniFi Access Intercom Version 1.8.22 or later Update UniFi Access G3 Intercom Version 1.8.22 or later Update UniFi Access Intercom Viewer Version 1.4.39 or later

Action-Not Available
Vendor-Ubiquiti Inc.
Product-UniFi Access G3 Reader ProUniFi Access G2 Reader ProUniFi Access IntercomUniFi Access Reader ProUniFi Access G3 IntercomUniFi Access Intercom Viewer
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CVE-2022-23425
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-8.6||HIGH
EPSS-0.15% / 34.69%
||
7 Day CHG~0.00%
Published-11 Feb, 2022 | 17:40
Updated-03 Aug, 2024 | 03:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in Exynos baseband prior to SMR Feb-2022 Release 1 allows attackers to send arbitrary NAS signaling messages with fake base station.

Action-Not Available
Vendor-Google LLCSamsungSamsung Electronics
Product-androidexynosSamsung Mobile Devices
CWE ID-CWE-20
Improper Input Validation
CVE-2010-3375
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-1.05% / 77.76%
||
7 Day CHG~0.00%
Published-29 Oct, 2019 | 12:20
Updated-07 Aug, 2024 | 03:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

qtparted has insecure library loading which may allow arbitrary code execution

Action-Not Available
Vendor-qtparted_projectn/a
Product-qtpartedn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2021-25435
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-9.8||CRITICAL
EPSS-1.10% / 78.21%
||
7 Day CHG~0.00%
Published-08 Jul, 2021 | 13:46
Updated-03 Aug, 2024 | 20:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation vulnerability in Tizen bootloader prior to Firmware update JUL-2021 Release allows arbitrary code execution using recovery partition in wireless firmware download mode.

Action-Not Available
Vendor-Linux Kernel Organization, IncSamsung Electronics
Product-tizenTizen wearable devices
CWE ID-CWE-20
Improper Input Validation
CVE-2010-2476
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.53% / 67.37%
||
7 Day CHG~0.00%
Published-07 Nov, 2019 | 20:19
Updated-07 Aug, 2024 | 02:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

syscp 1.4.2.1 allows attackers to add arbitrary paths via the documentroot of a domain by appending a colon to it and setting the open basedir path to use that domain documentroot.

Action-Not Available
Vendor-syscp_projectsyscp
Product-syscpsyscp
CWE ID-CWE-20
Improper Input Validation
CVE-2010-2447
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.51% / 66.60%
||
7 Day CHG~0.00%
Published-07 Nov, 2019 | 19:32
Updated-07 Aug, 2024 | 02:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

gitolite before 1.4.1 does not filter src/ or hooks/ from path names.

Action-Not Available
Vendor-gitoliten/a
Product-gitoliten/a
CWE ID-CWE-20
Improper Input Validation
CVE-2024-11737
Matching Score-4
Assigner-Schneider Electric
ShareView Details
Matching Score-4
Assigner-Schneider Electric
CVSS Score-9.3||CRITICAL
EPSS-0.46% / 64.37%
||
7 Day CHG~0.00%
Published-11 Dec, 2024 | 09:36
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CWE-20: Improper Input Validation vulnerability exists that could lead to a denial of service and a loss of confidentiality, integrity of the controller when an unauthenticated crafted Modbus packet is sent to the device.

Action-Not Available
Vendor-
Product-Modicon Controllers M241 / M251Modicon Controllers M258 / LMC058
CWE ID-CWE-20
Improper Input Validation
CVE-2002-2444
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.48% / 65.06%
||
7 Day CHG~0.00%
Published-28 Oct, 2019 | 13:11
Updated-08 Aug, 2024 | 04:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Snoopy before 2.0.0 has a security hole in exec cURL

Action-Not Available
Vendor-snoopy_projectn/a
Product-snoopyn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2020-36199
Matching Score-4
Assigner-Kaspersky
ShareView Details
Matching Score-4
Assigner-Kaspersky
CVSS Score-9.8||CRITICAL
EPSS-6.02% / 90.81%
||
7 Day CHG~0.00%
Published-21 Jan, 2021 | 21:20
Updated-04 Aug, 2024 | 17:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TinyCheck before commits 9fd360d and ea53de8 was vulnerable to command injection due to insufficient checks of input parameters in several places.

Action-Not Available
Vendor-n/aKaspersky Lab
Product-tinycheckKaspersky TinyCheck
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2025-23268
Matching Score-4
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-4
Assigner-NVIDIA Corporation
CVSS Score-8||HIGH
EPSS-0.17% / 37.93%
||
7 Day CHG~0.00%
Published-17 Sep, 2025 | 22:02
Updated-08 Oct, 2025 | 17:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA Triton Inference Server contains a vulnerability in the DALI backend where an attacker may cause an improper input validation issue. A successful exploit of this vulnerability may lead to code execution.

Action-Not Available
Vendor-NVIDIA Corporation
Product-triton_inference_serverTriton Inference Server
CWE ID-CWE-20
Improper Input Validation
CVE-2013-2259
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.71% / 72.56%
||
7 Day CHG~0.00%
Published-04 Nov, 2019 | 16:32
Updated-06 Aug, 2024 | 15:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cryptocat before 2.0.22 has Arbitrary Code Execution on Firefox Conversation Overview

Action-Not Available
Vendor-cryptocat_projectCryptocat
Product-cryptocatCryptocat
CWE ID-CWE-20
Improper Input Validation
CVE-2022-24086
Matching Score-4
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-4
Assigner-Adobe Systems Incorporated
CVSS Score-9.8||CRITICAL
EPSS-93.74% / 99.86%
||
7 Day CHG~0.00%
Published-16 Feb, 2022 | 16:38
Updated-23 Oct, 2025 | 14:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-03-01||Apply updates per vendor instructions.
Adobe Commerce checkout improper input validation leads to remote code execution

Adobe Commerce versions 2.4.3-p1 (and earlier) and 2.3.7-p2 (and earlier) are affected by an improper input validation vulnerability during the checkout process. Exploitation of this issue does not require user interaction and could result in arbitrary code execution.

Action-Not Available
Vendor-Adobe Inc.
Product-magentocommerceMagento CommerceCommerce and Magento Open Source
CWE ID-CWE-20
Improper Input Validation
CVE-2017-12240
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-9.8||CRITICAL
EPSS-13.61% / 94.32%
||
7 Day CHG~0.00%
Published-28 Sep, 2017 | 07:00
Updated-21 Apr, 2026 | 18:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-03-24||Apply updates per vendor instructions.

The DHCP relay subsystem of Cisco IOS 12.2 through 15.6 and Cisco IOS XE Software contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code and gain full control of an affected system. The attacker could also cause an affected system to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to a buffer overflow condition in the DHCP relay subsystem of the affected software. An attacker could exploit this vulnerability by sending a crafted DHCP Version 4 (DHCPv4) packet to an affected system. A successful exploit could allow the attacker to execute arbitrary code and gain full control of the affected system or cause the affected system to reload, resulting in a DoS condition. Cisco Bug IDs: CSCsm45390, CSCuw77959.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-1100-lte_integrated_services_routerasr_901-6cz-ft-acatalyst_3650-8x24pd-lasr_1023catalyst_3650-48fq8800_8-slotcatalyst_3850-48p-ecatalyst_3850-12xs-easr_920-24sz-m_router111x_integrated_services_router8102-64hasr_9000catalyst_3650-8x24uq-ecatalyst_3650-8x24pd-ecatalyst_3650-24pd-ecatalyst_3850-48u1803_integrated_service_routercatalyst_3850-48p-scatalyst_3650-12x48uz-e1100-4gltena_integrated_services_routerasr_99061100-4p_integrated_services_routerasr_920-24tz-mcatalyst_3650-48tq-ecatalyst_3650-24pdcatalyst_3650-48ps-e8201catalyst_3650-48fd-scatalyst_3850-12s-s9800-80catalyst_3650-24ps-sioscatalyst_3850-48f-e1101_integrated_services_router1802_integrated_service_router1841_integrated_service_routerasr_901-6cz-f-a1100-6g_integrated_services_router8818asr_901s-2sg-f-ahcatalyst_3650-48fs-e1100-4g_integrated_services_router8218catalyst_3850-12x48uasr_1001-hxcatalyst_3650-48ts-scatalyst_3650-12x48uq-ecatalyst_3650-48pq-easr_9901asr_99108800_18-slotcatalyst_3850-24t-lasr_1004catalyst_3850-48xscatalyst_3650-48td-e1801_integrated_service_router8201-32fhasr_902asr_9006catalyst_3650-12x48fd-sasr_901-6cz-ft-dcatalyst_3850-48t-ecatalyst_3850-48u-s8804catalyst_3850-24xu-scatalyst_3650-48pd-scatalyst_3650-12x48ur-scatalyst_3650-48ts-lasr_1000-xasr_901s-3sg-f-ahcatalyst_3650-12x48urcatalyst_3650-48td-l1861_integrated_service_routercatalyst_3650-48fqm-lasr_920-4sz-a_rcatalyst_3850-24s-ecatalyst_3650-48pd-lcatalyst_3650-48ps-lasr_914catalyst_3650-48ts-easr_920-12sz-im_router8208asr_901-6cz-fs-dcatalyst_3650-48fq-sasr_1002-x_r8800_12-slotasr_1002-hx1120_integrated_services_routercatalyst_3850-48xs-ecatalyst_3650-24ps-l9800-lcatalyst_3850-24ucatalyst_3650-48fqm-scatalyst_3650-24ts-scatalyst_3650-12x48ur-lasr_920-4sz-dcatalyst_3650-12x48uzcatalyst_3650-24pd-scatalyst_3650-24ts-lcatalyst_3650-48pd-e8808catalyst_3850-48t-lcatalyst_3850-24xu-lcatalyst_3850-24xuasr_920-10sz-pd_routerasr_920-4sz-aasr_1001-x4221_integrated_services_router422_integrated_services_router1921_integrated_services_routerasr_1002asr_1001catalyst_3650-24td-sasr_9071100_integrated_services_routerasr_9904catalyst_3650-48fq-lasr_1006catalyst_3650-8x24uq-scatalyst_3650-24pdm-sasr_1009-xcatalyst_3850-24xscatalyst_3650-48tq-scatalyst_3850-12s-ecatalyst_3650-12x48uq-scatalyst_3650-24pdm-ecatalyst_3650-12x48uqcatalyst_3850-32xs-easr_901-6cz-fs-aasr_1001-x_rcatalyst_3650-12x48uq-lcatalyst_3850-24pw-sasr_1006-xcatalyst_3650catalyst_3650-24pdm-lasr_920-12cz-a_router1101-4p_integrated_services_routerasr_9010catalyst_3650-24pd-l1100-8p_integrated_services_routercatalyst_3850-16xs-e1111x_integrated_services_routerasr_901-12c-ft-dasr_900catalyst_3850-48xs-f-e8812asr_90011100-4gltegb_integrated_services_router1131_integrated_services_router1109-4p_integrated_services_routerasr_920-10sz-pd_rcatalyst_3650-48fs-sasr_9902catalyst_3650-48fqmcatalyst_3850-24u-lasr_1013catalyst_3650-24pdmcatalyst_3850-24p-sasr_920-24sz-m_rcatalyst_3650-48fs-lcatalyst_3850-48u-easr_920-12cz-dcatalyst_3650-24ts-e1812_integrated_service_router9800-clcatalyst_3850-24p-lcatalyst_3850-32xs-scatalyst_3650-8x24uq1109-2p_integrated_services_routerasr_9912catalyst_3850-48u-lcatalyst_3850-24xs-ecatalyst_3850-48pw-scatalyst_3650-12x48ur-easr_901-4c-ft-d8800_4-slotcatalyst_3650-24td-lcatalyst_3850asr_10008101-32fhcatalyst_3650-24td-ecatalyst_3850-48xs-sasr_920-24sz-m9800-40catalyst_3650-48fq-ecatalyst_3650-8x24uq-lasr_920-24sz-imasr_920-12cz-d_rcatalyst_3650-48fqm-easr_903asr_920u-12sz-im1941_integrated_services_routerasr_920-12sz-imcatalyst_3650-48tq-lasr_1000-esp100catalyst_3850-48xs-f-sasr_901s-2sg-f-dcatalyst_3650-12x48uz-lasr_920-12cz-d_routerasr_920-24tz-m_rcatalyst_3850-24t-e4000_integrated_services_routercatalyst_3850-nm-2-40g1000_integrated_services_routerasr_99031941w_integrated_services_router8831asr_901-4c-f-dcatalyst_3650-48fd-ecatalyst_3850-48f-lcatalyst_3850-12xs-s8212asr_9922catalyst_3650-48pq-sasr_1000-esp200-xcatalyst_3650-48fd-lasr_1002-hx_rasr_902u8202asr_920-4sz-d_rasr_1002-xcatalyst_3850-48f-sasr_901s-3sg-f-dcatalyst_3850-24t-scatalyst_3850-24xu-ecatalyst_3850-24p-easr_920-24sz-im_routerasr_901-6cz-f-dasr_920-24sz-im_rcatalyst_3850-48p-lcatalyst_3650-24ps-easr_920-12sz-im_r1111x-8p_integrated_services_routercatalyst_3650-8x24pd-sasr_920-10sz-pd1906c_integrated_services_routerasr_9000vasr_920-24tz-m_routercatalyst_3650-12x48fd-lcatalyst_3850-24s-s1109_integrated_services_router1905_integrated_services_routerasr_920-12cz-a_rasr_901s-4sg-f-dasr_1001-hx_rcatalyst_3650-12x48uz-scatalyst_3850-nm-8-10gcatalyst_3850-24u-sasr_901-12c-f-dasr_9920catalyst_3650-48pq-lcatalyst_3650-48ps-s8101-32hcatalyst_3850-16xs-s1160_integrated_services_routerasr_1000-esp100-xcatalyst_3850-24u-ecatalyst_3850-48t-scatalyst_3650-12x48fd-ecatalyst_3650-48td-sasr_920-4sz-d_routerasr_920-12cz-a1811_integrated_service_routerasr_920-4sz-a_routercatalyst_3850-24xs-sCisco IOS and IOS XEIOS and IOS XE Software
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-20
Improper Input Validation
CVE-2018-0349
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-9.8||CRITICAL
EPSS-1.18% / 78.98%
||
7 Day CHG~0.00%
Published-18 Jul, 2018 | 23:00
Updated-29 Nov, 2024 | 14:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Cisco SD-WAN Solution could allow an authenticated, remote attacker to overwrite arbitrary files on the underlying operating system of an affected device. The vulnerability is due to improper input validation of the request admin-tech command in the CLI of the affected software. An attacker could exploit this vulnerability by modifying the request admin-tech command in the CLI of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the underlying operating system of an affected device and escalate their privileges to the root user. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69852, CSCvi69856.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-vbond_orchestratorvedge_100mvedge-plusvedge-5000vsmart_controllervedge_100b_firmwarevedge_100wm_firmwarevedge-2000vmanage_network_managementvedge-100vedge_100bvedge-100_firmwarevedge-2000_firmwarevedge-provedge_100m_firmwarevedge-1000_firmwarevedge-5000_firmwarevedge-1000vedge_100wmCisco SD-WAN Solution unknown
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2017-12652
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.63% / 70.43%
||
7 Day CHG+0.10%
Published-10 Jul, 2019 | 14:10
Updated-09 Jun, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

libpng before 1.6.32 does not properly check the length of chunks against the user limit.

Action-Not Available
Vendor-libpngn/aNetApp, Inc.
Product-active_iq_unified_managerlibpngn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2021-22767
Matching Score-4
Assigner-Schneider Electric
ShareView Details
Matching Score-4
Assigner-Schneider Electric
CVSS Score-9.8||CRITICAL
EPSS-0.79% / 74.05%
||
7 Day CHG~0.00%
Published-11 Jun, 2021 | 15:40
Updated-03 Aug, 2024 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A CWE-20: Improper Input Validation vulnerability exists in PowerLogic EGX100 (Versions 3.0.0 and newer) and PowerLogic EGX300 (All Versions) that could cause denial of service or remote code execution via a specially crafted HTTP packet.This CVE ID is unique from CVE-2021-2276

Action-Not Available
Vendor-n/a
Product-powerlogic_egx300_firmwarepowerlogic_egx100powerlogic_egx100_firmwarepowerlogic_egx300PowerLogic EGX100 (Versions 3.0.0 and newer) and PowerLogic EGX300 (All Versions)
CWE ID-CWE-20
Improper Input Validation
CVE-2021-22444
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-9.8||CRITICAL
EPSS-0.24% / 46.45%
||
7 Day CHG~0.00%
Published-02 Aug, 2021 | 17:00
Updated-03 Aug, 2024 | 18:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause code injection.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-magic_uiemuiMagic UIEMUI
CWE ID-CWE-20
Improper Input Validation
CVE-2025-22137
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.18% / 39.70%
||
7 Day CHG~0.00%
Published-08 Jan, 2025 | 16:08
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Arbitrary File Overwrite via HTTP POST in Pingvin Share

Pingvin Share is a self-hosted file sharing platform and an alternative for WeTransfer. This vulnerability allows an authenticated or unauthenticated (if anonymous shares are allowed) user to overwrite arbitrary files on the server, including sensitive system files, via HTTP POST requests. The issue has been patched in version 1.4.0.

Action-Not Available
Vendor-stonith404
Product-pingvin-share
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-434
Unrestricted Upload of File with Dangerous Type
CVE-2020-36195
Matching Score-4
Assigner-QNAP Systems, Inc.
ShareView Details
Matching Score-4
Assigner-QNAP Systems, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.46% / 64.18%
||
7 Day CHG~0.00%
Published-17 Apr, 2021 | 03:50
Updated-16 Sep, 2024 | 17:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SQL Injection Vulnerability in Multimedia Console and the Media Streaming Add-On

An SQL injection vulnerability has been reported to affect QNAP NAS running Multimedia Console or the Media Streaming add-on. If exploited, the vulnerability allows remote attackers to obtain application information. QNAP has already fixed this vulnerability in the following versions of Multimedia Console and the Media Streaming add-on. QTS 4.3.3: Media Streaming add-on 430.1.8.10 and later QTS 4.3.6: Media Streaming add-on 430.1.8.8 and later QTS 4.4.x and later: Multimedia Console 1.3.4 and later We have also fixed this vulnerability in the following versions of QTS 4.3.3 and QTS 4.3.6, respectively: QTS 4.3.3.1624 Build 20210416 or later QTS 4.3.6.1620 Build 20210322 or later

Action-Not Available
Vendor-QNAP Systems, Inc.
Product-multimedia_consoleqtsmedia_streaming_add-onQTSMultimedia ConsoleMedia Streaming add-on
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CWE ID-CWE-943
Improper Neutralization of Special Elements in Data Query Logic
CWE ID-CWE-20
Improper Input Validation
CVE-2017-1002157
Matching Score-4
Assigner-Fedora Project
ShareView Details
Matching Score-4
Assigner-Fedora Project
CVSS Score-9.8||CRITICAL
EPSS-1.37% / 80.43%
||
7 Day CHG~0.00%
Published-10 Jan, 2019 | 21:00
Updated-16 Sep, 2024 | 16:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

modulemd 1.3.1 and earlier uses an unsafe function for processing externally provided data, leading to remote code execution.

Action-Not Available
Vendor-Fedora ModularityRed Hat, Inc.
Product-modulemdmodulemd
CWE ID-CWE-242
Use of Inherently Dangerous Function
CWE ID-CWE-20
Improper Input Validation
CVE-2012-1301
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-3.16% / 87.07%
||
7 Day CHG~0.00%
Published-13 Apr, 2017 | 17:00
Updated-13 May, 2026 | 00:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The FeedProxy.aspx script in Umbraco 4.7.0 allows remote attackers to proxy requests on their behalf via the "url" parameter.

Action-Not Available
Vendor-n/aUmbraco A/S (Umbraco)
Product-umbraco_cmsn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2020-35169
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-9.1||CRITICAL
EPSS-0.24% / 47.52%
||
7 Day CHG~0.00%
Published-11 Jul, 2022 | 19:26
Updated-16 Sep, 2024 | 17:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell BSAFE Crypto-C Micro Edition, versions before 4.1.5, and Dell BSAFE Micro Edition Suite, versions before 4.5.2, contain an Improper Input Validation Vulnerability.

Action-Not Available
Vendor-Oracle CorporationDell Inc.
Product-http_serverweblogic_server_proxy_plug-inbsafe_crypto-c-micro-editiondatabasebsafe_micro-edition-suitesecurity_serviceDell BSAFE Crypto-C Micro Edition
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CWE ID-CWE-20
Improper Input Validation
CVE-2020-28870
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-1.47% / 81.10%
||
7 Day CHG~0.00%
Published-10 Feb, 2021 | 00:19
Updated-04 Aug, 2024 | 16:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In InoERP 0.7.2, an unauthorized attacker can execute arbitrary code on the server side due to lack of validations in /modules/sys/form_personalization/json_fp.php.

Action-Not Available
Vendor-inoideasn/a
Product-inoerpn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CWE ID-CWE-20
Improper Input Validation
  • Previous
  • 1
  • 2
  • 3
  • 4
  • ...
  • 10
  • 11
  • Next
Details not found