Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE-494:Download of Code Without Integrity Check
Weakness ID:494
Version:v4.17
Weakness Name:Download of Code Without Integrity Check
Vulnerability Mapping:Allowed
Abstraction:Base
Structure:Simple
Status:Draft
Likelihood of Exploit:Medium
DetailsContent HistoryObserved CVE ExamplesReports
185Vulnerabilities found

CVE-2024-45321
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.52% / 66.39%
||
7 Day CHG~0.00%
Published-27 Aug, 2024 | 00:00
Updated-05 Dec, 2024 | 18:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The App::cpanminus package through 1.7047 for Perl downloads code via insecure HTTP, enabling code execution for network attackers.

Action-Not Available
Vendor-app\n/aperl
Product-\n/acpanminus
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2024-39819
Assigner-Zoom Video Communications, Inc.
ShareView Details
Assigner-Zoom Video Communications, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.14% / 33.70%
||
7 Day CHG~0.00%
Published-15 Jul, 2024 | 17:27
Updated-02 Oct, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Zoom Workplace Apps and SDK for Windows - Improper Privilege Management

Integrity check in the installer for some Zoom Workplace Apps and SDKs for Windows may allow an authenticated user to conduct a privilege escalation via local access.

Action-Not Available
Vendor-Zoom Communications, Inc.
Product-meeting_software_development_kitroomsworkplace_desktopZoom Workplace Apps and SDK for Windowszoom_meeting_sdk_for_windowszoom_rooms_app_for_windowsworkplace_desktop
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2023-41921
Assigner-National Cyber Security Centre Netherlands (NCSC-NL)
ShareView Details
Assigner-National Cyber Security Centre Netherlands (NCSC-NL)
CVSS Score-9.8||CRITICAL
EPSS-0.13% / 32.66%
||
7 Day CHG~0.00%
Published-02 Jul, 2024 | 07:42
Updated-02 Aug, 2024 | 19:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Download of Code Without Integrity Check in Kiloview P1/P2 devices

A vulnerability allows attackers to download source code or an executable from a remote location and execute the code without sufficiently verifying the origin and integrity of the code. This vulnerability can allow attackers to modify the firmware before uploading it to the system, thus achieving the modification of the target’s integrity to achieve an insecure state.

Action-Not Available
Vendor-Kiloviewkiloview
Product-P1/P2p2_4g_video_encoder_firmwarep1_4g_video_encoder_firmware
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2024-39348
Assigner-Synology Inc.
ShareView Details
Assigner-Synology Inc.
CVSS Score-7.5||HIGH
EPSS-0.62% / 69.55%
||
7 Day CHG~0.00%
Published-28 Jun, 2024 | 06:30
Updated-07 Aug, 2025 | 13:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Download of code without integrity check vulnerability in AirPrint functionality in Synology Router Manager (SRM) before 1.2.5-8227-11 and 1.3.1-9346-8 allows man-in-the-middle attackers to execute arbitrary code via unspecified vectors.

Action-Not Available
Vendor-Synology, Inc.
Product-router_managerSynology Router Manager (SRM)router_manager
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2024-30206
Assigner-Siemens
ShareView Details
Assigner-Siemens
CVSS Score-8.8||HIGH
EPSS-0.80% / 73.79%
||
7 Day CHG~0.00%
Published-14 May, 2024 | 10:02
Updated-02 Aug, 2024 | 01:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SIMATIC RTLS Locating Manager (6GT2780-0DA00) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-0DA10) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-0DA20) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-0DA30) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-1EA10) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-1EA20) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-1EA30) (All versions < V3.0.1.1). Affected SIMATIC RTLS Locating Manager Clients do not properly check the integrity of update files. This could allow an unauthenticated remote attacker to alter update files in transit and trick an authorized user into installing malicious code. A successful exploit requires the attacker to be able to modify the communication between server and client on the network.

Action-Not Available
Vendor-Siemens AG
Product-SIMATIC RTLS Locating Managersimatic_rtls_locating_manager
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2024-33118
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.18% / 39.07%
||
7 Day CHG~0.00%
Published-06 May, 2024 | 00:00
Updated-10 Jun, 2025 | 19:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

LuckyFrameWeb v3.5.2 was discovered to contain an arbitrary read vulnerability via the fileDownload method in class com.luckyframe.project.common.CommonController.

Action-Not Available
Vendor-luckyframen/aluckyframe
Product-luckyframewebn/aluckyframeweb
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2023-39474
Assigner-Zero Day Initiative
ShareView Details
Assigner-Zero Day Initiative
CVSS Score-8||HIGH
EPSS-1.05% / 77.23%
||
7 Day CHG~0.00%
Published-03 May, 2024 | 02:10
Updated-13 Mar, 2025 | 21:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Inductive Automation Ignition downloadLaunchClientJar Remote Code Execution Vulnerability

Inductive Automation Ignition downloadLaunchClientJar Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition. User interaction is required to exploit this vulnerability in that the target must connect to a malicious server. The specific flaw exists within the downloadLaunchClientJar function. The issue results from the lack of validating a remote JAR file prior to loading it. An attacker can leverage this vulnerability to execute code in the context of the current user. . Was ZDI-CAN-19915.

Action-Not Available
Vendor-inductiveautomationInductive Automationinductiveautomation
Product-ignitionIgnitionignition
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2024-28878
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.6||CRITICAL
EPSS-0.09% / 25.63%
||
7 Day CHG~0.00%
Published-12 Apr, 2024 | 15:21
Updated-26 Aug, 2024 | 18:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IOSIX IO-1020 Micro ELD Download of Code Without Integrity Check

IO-1020 Micro ELD downloads source code or an executable from an adjacent location and executes the code without sufficiently verifying the origin or integrity of the code.

Action-Not Available
Vendor-IOSiXiosix
Product-IO-1020 Micro ELDio-1020_micro_eld
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2024-28850
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-8.2||HIGH
EPSS-0.03% / 6.77%
||
7 Day CHG~0.00%
Published-25 Mar, 2024 | 18:57
Updated-05 Dec, 2025 | 19:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WP Crontrol possible RCE when combined with a pre-condition

WP Crontrol controls the cron events on WordPress websites. WP Crontrol includes a feature that allows administrative users to create events in the WP-Cron system that store and execute PHP code subject to the restrictive security permissions documented here. While there is no known vulnerability in this feature on its own, there exists potential for this feature to be vulnerable to RCE if it were specifically targeted via vulnerability chaining that exploited a separate SQLi (or similar) vulnerability. This is exploitable on a site if one of the below preconditions are met, the site is vulnerable to a writeable SQLi vulnerability in any plugin, theme, or WordPress core, the site's database is compromised at the hosting level, the site is vulnerable to a method of updating arbitrary options in the wp_options table, or the site is vulnerable to a method of triggering an arbitrary action, filter, or function with control of the parameters. As a hardening measure, WP Crontrol version 1.16.2 ships with a new feature that prevents tampering of the code stored in a PHP cron event.

Action-Not Available
Vendor-johnbillionjohnbillion
Product-wp_crontrolwp-crontrol
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2024-30205
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.1||HIGH
EPSS-0.03% / 8.83%
||
7 Day CHG~0.00%
Published-25 Mar, 2024 | 00:00
Updated-01 May, 2025 | 14:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Emacs before 29.3, Org mode considers contents of remote files to be trusted. This affects Org Mode before 9.6.23.

Action-Not Available
Vendor-n/aGNUDebian GNU/Linux
Product-emacsdebian_linuxorg_moden/a
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2024-27438
Assigner-Apache Software Foundation
ShareView Details
Assigner-Apache Software Foundation
CVSS Score-9.8||CRITICAL
EPSS-3.45% / 87.25%
||
7 Day CHG~0.00%
Published-21 Mar, 2024 | 09:39
Updated-17 Jun, 2025 | 13:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache Doris: Downloading arbitrary remote jar files resulting in remote command execution

Download of Code Without Integrity Check vulnerability in Apache Doris. The jdbc driver files used for JDBC catalog is not checked and may resulting in remote command execution. Once the attacker is authorized to create a JDBC catalog, he/she can use arbitrary driver jar file with unchecked code snippet. This code snippet will be run when catalog is initializing without any check. This issue affects Apache Doris: from 1.2.0 through 2.0.4. Users are recommended to upgrade to version 2.0.5 or 2.1.x, which fixes the issue.

Action-Not Available
Vendor-The Apache Software Foundation
Product-dorisApache Dorisdoris
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2023-47353
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-0.17% / 38.53%
||
7 Day CHG~0.00%
Published-06 Feb, 2024 | 00:00
Updated-08 May, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in the com.oneed.dvr.service.DownloadFirmwareService component of IMOU GO v1.0.11 allows attackers to force the download of arbitrary files.

Action-Not Available
Vendor-imoulifen/a
Product-imou_gon/a
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2023-46144
Assigner-CERT@VDE
ShareView Details
Assigner-CERT@VDE
CVSS Score-6.5||MEDIUM
EPSS-0.05% / 14.40%
||
7 Day CHG~0.00%
Published-14 Dec, 2023 | 14:08
Updated-01 Oct, 2024 | 07:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
PHOENIX CONTACT: PLCnext Control prone to download of code without integrity check

A download of code without integrity check vulnerability in PLCnext products allows an remote attacker with low privileges to compromise integrity on the affected engineering station and the connected devices.

Action-Not Available
Vendor-Phoenix Contact GmbH & Co. KG
Product-axc_f_2152axc_f_1152_firmwareplcnext_engineeraxc_f_2152_firmwarerfc_4072s_firmwarerfc_4072sepc_1522_firmwarebpc_9102sepc_1522bpc_9102s_firmwarerfc_4072r_firmwareaxc_f_1152epc_1502_firmwareaxc_f_3152epc_1502axc_f_3152_firmwarerfc_4072rEPC 1522RFC 4072SAXC F 1152AXC F 2152RFC 4072REPC 1502PLCnext EngineerBPC 9102SAXC F 3152
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2023-46143
Assigner-CERT@VDE
ShareView Details
Assigner-CERT@VDE
CVSS Score-7.5||HIGH
EPSS-0.24% / 47.47%
||
7 Day CHG~0.00%
Published-14 Dec, 2023 | 14:06
Updated-22 May, 2025 | 17:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Phoenix Contact: Classic line industrial controllers prone to inadequate integrity check of PLC

Download of Code Without Integrity Check vulnerability in PHOENIX CONTACT classic line PLCs allows an unauthenticated remote attacker to modify some or all applications on a PLC.

Action-Not Available
Vendor-Phoenix Contact GmbH & Co. KG
Product-rfc_470s_pn_3tx_firmwareconfig\+pc_worx_rt_basic_firmwareilc1x1rfc_470s_pn_3txpc_worx_rt_basicpc_worx_srtrfc_460r_pn_3txautomationworx_software_suitepc_worxpc_worx_expressaxc_1050_xc_firmwareilc1x0ilc_3xx_firmwarerfc_430_eth-ibfc_350_pci_ethaxc_3050_firmwareilc1x1_firmwareilc_3xxrfc_480s_pn_4txaxc_1050_xcrfc_460r_pn_3tx_firmwareaxc_1050rfc_430_eth-ib_firmwareilc1x0_firmwarerfc_450_eth-ib_firmwarerfc_450_eth-ibrfc_480s_pn_4tx_firmwareaxc_3050axc_1050_firmwarefc_350_pci_eth_firmwarePC WORX RT BASICAutomation Worx Software SuiteRFC 450 ETH-IBRFC 430 ETH-IBAXC 3050RFC 460R PN 3TXRFC 480S PN 4TXPC WorxFC 350 PCI ETHILC1x0RFC 470S PN 3TXAXC 1050 XCILC 3xxPC WORX SRTAXC 1050PC Worx ExpressILC1x1Config+
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2023-5592
Assigner-CERT@VDE
ShareView Details
Assigner-CERT@VDE
CVSS Score-7.5||HIGH
EPSS-0.14% / 34.73%
||
7 Day CHG~0.00%
Published-14 Dec, 2023 | 14:04
Updated-02 Aug, 2024 | 08:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Phoenix Contact: ProConOs prone to Download of Code Without Integrity Check

Download of Code Without Integrity Check vulnerability in PHOENIX CONTACT MULTIPROG, PHOENIX CONTACT ProConOS eCLR (SDK) allows an unauthenticated remote attacker to download and execute applications without integrity checks on the device which may result in a complete loss of integrity.

Action-Not Available
Vendor-Phoenix Contact GmbH & Co. KG
Product-multiprogproconos_eclrMULTIPROGProConOS eCLR (SDK)
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2023-5630
Assigner-Schneider Electric
ShareView Details
Assigner-Schneider Electric
CVSS Score-6.5||MEDIUM
EPSS-0.10% / 27.06%
||
7 Day CHG~0.00%
Published-14 Dec, 2023 | 04:49
Updated-02 Aug, 2024 | 08:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A CWE-494: Download of Code Without Integrity Check vulnerability exists that could allow a privileged user to install an untrusted firmware.

Action-Not Available
Vendor-
Product-eb45e_firmwareeh45e_firmwareeh45eqh450_firmwareqh150eh450qh450jr900_firmwareer45ejr240er450_firmwareqb150qp150qp150_firmwareeb450er45e_firmwareeb450_firmwareqp450_firmwareqr450qb450_firmwareqr150qp450jr900qh150_firmwareeb45eqr450_firmwareqb150_firmwareeh450_firmwarejr240_firmwareqr150_firmwareer450qb450Trio Q-Series Ethernet Data RadioTrio E-Series Ethernet Data RadioTrio J-Series Ethernet Data Radio
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2023-45842
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-8.1||HIGH
EPSS-0.09% / 25.46%
||
7 Day CHG~0.00%
Published-05 Dec, 2023 | 11:30
Updated-04 Nov, 2025 | 20:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple data integrity vulnerabilities exist in the package hash checking functionality of Buildroot 2023.08.1 and Buildroot dev commit 622698d7847. A specially crafted man-in-the-middle attack can lead to arbitrary command execution in the builder.This vulnerability is related to the `mxsldr` package.

Action-Not Available
Vendor-buildrootBuildroot
Product-buildrootBuildroot
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2023-45841
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-8.1||HIGH
EPSS-0.09% / 25.46%
||
7 Day CHG~0.00%
Published-05 Dec, 2023 | 11:30
Updated-04 Nov, 2025 | 20:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple data integrity vulnerabilities exist in the package hash checking functionality of Buildroot 2023.08.1 and Buildroot dev commit 622698d7847. A specially crafted man-in-the-middle attack can lead to arbitrary command execution in the builder.This vulnerability is related to the `versal-firmware` package.

Action-Not Available
Vendor-buildrootBuildroot
Product-buildrootBuildroot
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2023-45840
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-8.1||HIGH
EPSS-0.09% / 25.46%
||
7 Day CHG~0.00%
Published-05 Dec, 2023 | 11:30
Updated-04 Nov, 2025 | 20:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple data integrity vulnerabilities exist in the package hash checking functionality of Buildroot 2023.08.1 and Buildroot dev commit 622698d7847. A specially crafted man-in-the-middle attack can lead to arbitrary command execution in the builder.This vulnerability is related to the `riscv64-elf-toolchain` package.

Action-Not Available
Vendor-buildrootBuildroot
Product-buildrootBuildroot
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2023-45839
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-8.1||HIGH
EPSS-0.09% / 25.46%
||
7 Day CHG~0.00%
Published-05 Dec, 2023 | 11:30
Updated-04 Nov, 2025 | 20:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple data integrity vulnerabilities exist in the package hash checking functionality of Buildroot 2023.08.1 and Buildroot dev commit 622698d7847. A specially crafted man-in-the-middle attack can lead to arbitrary command execution in the builder.This vulnerability is related to the `aufs-util` package.

Action-Not Available
Vendor-buildrootBuildroot
Product-buildrootBuildroot
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2023-45838
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-8.1||HIGH
EPSS-0.12% / 31.39%
||
7 Day CHG~0.00%
Published-05 Dec, 2023 | 11:30
Updated-04 Nov, 2025 | 20:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple data integrity vulnerabilities exist in the package hash checking functionality of Buildroot 2023.08.1 and Buildroot dev commit 622698d7847. A specially crafted man-in-the-middle attack can lead to arbitrary command execution in the builder.This vulnerability is related to the `aufs` package.

Action-Not Available
Vendor-buildrootBuildroot
Product-buildrootBuildroot
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2023-43608
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-8.1||HIGH
EPSS-0.12% / 31.39%
||
7 Day CHG~0.00%
Published-05 Dec, 2023 | 11:30
Updated-04 Nov, 2025 | 20:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A data integrity vulnerability exists in the BR_NO_CHECK_HASH_FOR functionality of Buildroot 2023.08.1 and dev commit 622698d7847. A specially crafted man-in-the-middle attack can lead to arbitrary command execution in the builder.

Action-Not Available
Vendor-buildrootBuildroot
Product-buildrootBuildroot
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2023-46887
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.17% / 38.10%
||
7 Day CHG~0.00%
Published-29 Nov, 2023 | 00:00
Updated-04 Apr, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Dreamer CMS before 4.0.1, the backend attachment management office has an Arbitrary File Download vulnerability.

Action-Not Available
Vendor-iteachyoun/a
Product-dreamer_cmsn/a
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2023-5984
Assigner-Schneider Electric
ShareView Details
Assigner-Schneider Electric
CVSS Score-7.2||HIGH
EPSS-0.04% / 13.12%
||
7 Day CHG~0.00%
Published-15 Nov, 2023 | 03:30
Updated-30 Sep, 2025 | 14:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A CWE-494 Download of Code Without Integrity Check vulnerability exists that could allow modified firmware to be uploaded when an authorized admin user begins a firmware update procedure which could result in full control over the device.

Action-Not Available
Vendor-Schneider Electric SE
Product-ion8650_firmwareion8800ion8650ion8800_firmwareION8650ION8800
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2023-45799
Assigner-KrCERT/CC
ShareView Details
Assigner-KrCERT/CC
CVSS Score-7.2||HIGH
EPSS-0.05% / 15.94%
||
7 Day CHG~0.00%
Published-30 Oct, 2023 | 06:17
Updated-06 Sep, 2024 | 20:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MLSoft TCO!stream Remote Code Execution Vulnerability

In MLSoft TCO!stream versions 8.0.22.1115 and below, a vulnerability exists due to insufficient permission validation. This allows an attacker to make the victim download and execute arbitrary files.

Action-Not Available
Vendor-mlsoftMLSoft
Product-tco\!streamTCO!stream
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2023-45821
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.04% / 10.51%
||
7 Day CHG~0.00%
Published-19 Oct, 2023 | 20:53
Updated-12 Sep, 2024 | 17:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect Docker Hub registry check in Artifact Hub

Artifact Hub is a web-based application that enables finding, installing, and publishing packages and configurations for CNCF projects. During a security audit of Artifact Hub's code base a security researcher identified a bug in which the `registryIsDockerHub` function was only checking that the registry domain had the `docker.io` suffix. Artifact Hub allows providing some Docker credentials that are used to increase the rate limit applied when interacting with the Docker Hub registry API to read publicly available content. Due to the incorrect check described above, it'd be possible to hijack those credentials by purchasing a domain which ends with `docker.io` and deploying a fake OCI registry on it. <https://artifacthub.io/> uses some credentials that only have permissions to read public content available in the Docker Hub. However, even though credentials for private repositories (disabled on `artifacthub.io`) are handled in a different way, other Artifact Hub deployments could have been using them for a different purpose. This issue has been resolved in version `1.16.0`. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Action-Not Available
Vendor-artifacthubartifacthub
Product-hubhub
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2023-37220
Assigner-Israel National Cyber Directorate (INCD)
ShareView Details
Assigner-Israel National Cyber Directorate (INCD)
CVSS Score-7.2||HIGH
EPSS-0.05% / 14.82%
||
7 Day CHG~0.00%
Published-03 Sep, 2023 | 13:47
Updated-01 Oct, 2024 | 13:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Synel Terminals - CWE-494: Download of Code Without Integrity Check

Synel Terminals - CWE-494: Download of Code Without Integrity Check

Action-Not Available
Vendor-synelSynelsynel
Product-biolite-n2_firmwaresy-785sy-7500_firmwaresy-910_firmwaresy-777_firmwaresy-755sy-777sy-751_firmwaresy-755_firmwaresy-745synergy_5_firmwaresynergybioentry-w2_firmwaresy-715_firmwaresynergy\/x_firmwaresynergy_touchsynergy\/xsy-785_firmwarebioentry-w2sy-711sy-745_firmwaresy-910sy-765_firmwaresy-780_firmwarebioentry_p2synergy_firmwaresynergy_10sy-715biolite-n2bioentry_p2_firmwaresynergy\/asy-711_firmwaresynergy_10_firmwaresynergy\/a_firmwaresy110_face_firmwaresy-780sy-751sy-765sy110_facesy-7500synergy_touch_firmwaresynergy_5Terminalsterminals
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2023-4041
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-9.8||CRITICAL
EPSS-0.03% / 10.11%
||
7 Day CHG~0.00%
Published-23 Aug, 2023 | 04:09
Updated-03 Oct, 2024 | 14:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Second Stage Gecko Bootloader GBL Parser Buffer Overrun Vulnerability

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'), Out-of-bounds Write, Download of Code Without Integrity Check vulnerability in Silicon Labs Gecko Bootloader on ARM (Firmware Update File Parser modules) allows Code Injection, Authentication Bypass.This issue affects "Standalone" and "Application" versions of Gecko Bootloader.

Action-Not Available
Vendor-silabsSilicon Labssilabs
Product-gecko_bootloaderGecko Bootloadergecko_bootloader
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-913
Improper Control of Dynamically-Managed Code Resources
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2023-40254
Assigner-KrCERT/CC
ShareView Details
Assigner-KrCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.04% / 12.33%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 06:08
Updated-10 Oct, 2024 | 14:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Download of Code Without Integrity Check vulnerability in Genians Genian NAC V4.0, Genians Genian NAC V5.0, Genians Genian NAC Suite V5.0, Genians Genian ZTNA allows Malicious Software Update.This issue affects Genian NAC V4.0: from V4.0.0 through V4.0.155; Genian NAC V5.0: from V5.0.0 through V5.0.42 (Revision 117460); Genian NAC Suite V5.0: from V5.0.0 through V5.0.54; Genian ZTNA: from V6.0.0 through V6.0.15.

Action-Not Available
Vendor-geniansGeniansgenians
Product-genian_nacgenian_ztnaGenian ZTNAGenian NAC V5.0Genian NAC V4.0Genian NAC Suite V5.0genian_nac
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2023-37864
Assigner-CERT@VDE
ShareView Details
Assigner-CERT@VDE
CVSS Score-7.2||HIGH
EPSS-0.26% / 49.11%
||
7 Day CHG+0.02%
Published-09 Aug, 2023 | 06:35
Updated-10 Oct, 2024 | 17:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
PHOENIX CONTACT: WP 6xxx Web panels prone to download code without integrity check

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with SNMPv2 write privileges may use an a special SNMP request to gain full access to the device.

Action-Not Available
Vendor-Phoenix Contact GmbH & Co. KG
Product-wp_6185-whpswp_6121-wxps_firmwarewp_6070-wvpswp_6156-whps_firmwarewp_6185-whps_firmwarewp_6101-wxpswp_6121-wxpswp_6156-whpswp_6215-whpswp_6215-whps_firmwarewp_6070-wvps_firmwarewp_6101-wxps_firmwareWP 6101-WXPSWP 6156-WHPSWP 6070-WVPSWP 6185-WHPSWP 6215-WHPSWP 6121-WXPSwp_6185-whpswp_6070-wvpswp_6215-whpswp_6156-whpswp_6101-wxpswp_6121-wxps
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2023-29401
Assigner-Go Project
ShareView Details
Assigner-Go Project
CVSS Score-4.3||MEDIUM
EPSS-0.38% / 59.16%
||
7 Day CHG~0.00%
Published-08 Jun, 2023 | 20:27
Updated-06 Jan, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper handling of filenames in Content-Disposition HTTP header in github.com/gin-gonic/gin

The filename parameter of the Context.FileAttachment function is not properly sanitized. A maliciously crafted filename can cause the Content-Disposition header to be sent with an unexpected filename value or otherwise modify the Content-Disposition header. For example, a filename of "setup.bat&quot;;x=.txt" will be sent as a file named "setup.bat". If the FileAttachment function is called with names provided by an untrusted source, this may permit an attacker to cause a file to be served with a name different than provided. Maliciously crafted attachment file name can modify the Content-Disposition header.

Action-Not Available
Vendor-gin-gonicgithub.com/gin-gonic/gin
Product-gingithub.com/gin-gonic/gin
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2023-28317
Assigner-HackerOne
ShareView Details
Assigner-HackerOne
CVSS Score-5.3||MEDIUM
EPSS-0.08% / 24.70%
||
7 Day CHG~0.00%
Published-09 May, 2023 | 00:00
Updated-28 Jan, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been discovered in Rocket.Chat, where editing messages can change the original timestamp, causing the UI to display messages in an incorrect order.

Action-Not Available
Vendor-rocket.chatn/a
Product-rocket.chatRocket.Chat
CWE ID-CWE-285
Improper Authorization
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2023-24503
Assigner-Israel National Cyber Directorate (INCD)
ShareView Details
Assigner-Israel National Cyber Directorate (INCD)
CVSS Score-7.5||HIGH
EPSS-0.03% / 8.98%
||
7 Day CHG~0.00%
Published-17 Apr, 2023 | 00:00
Updated-06 Feb, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Electra Smart Kit for Split AC – Adjacent attacker may cause the unit to load unauthorized FW

Electra Central AC unit – Adjacent attacker may cause the unit to load unauthorized FW.

Action-Not Available
Vendor-electra-airElectra
Product-smart_kit_for_split_acOSK201
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2023-24500
Assigner-Israel National Cyber Directorate (INCD)
ShareView Details
Assigner-Israel National Cyber Directorate (INCD)
CVSS Score-7.5||HIGH
EPSS-0.03% / 8.98%
||
7 Day CHG~0.00%
Published-17 Apr, 2023 | 00:00
Updated-06 Feb, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Electra Central AC unit – Adjacent attacker may cause the unit to load unauthorized FW

Electra Central AC unit – Adjacent attacker may cause the unit to load unauthorized FW.

Action-Not Available
Vendor-electra-airElectra
Product-central_ac_unit_firmwarecentral_ac_unitElectra Central AC unit
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2023-22635
Assigner-Fortinet, Inc.
ShareView Details
Assigner-Fortinet, Inc.
CVSS Score-6.9||MEDIUM
EPSS-0.05% / 14.54%
||
7 Day CHG~0.00%
Published-11 Apr, 2023 | 16:05
Updated-23 Oct, 2024 | 14:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A download of code without Integrity check vulnerability [CWE-494] in FortiClientMac version 7.0.0 through 7.0.7, 6.4 all versions, 6.2 all versions, 6.0 all versions, 5.6 all versions, 5.4 all versions, 5.2 all versions, 5.0 all versions and 4.0 all versions may allow a local attacker to escalate their privileges via modifying the installer upon upgrade.

Action-Not Available
Vendor-Fortinet, Inc.
Product-forticlientFortiClientMac
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2023-27025
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.12% / 30.50%
||
7 Day CHG~0.00%
Published-02 Apr, 2023 | 00:00
Updated-18 Feb, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An arbitrary file download vulnerability in the background management module of RuoYi v4.7.6 and below allows attackers to download arbitrary files in the server.

Action-Not Available
Vendor-n/aRuoyi
Product-ruoyin/a
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2023-28818
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.07% / 21.85%
||
7 Day CHG~0.00%
Published-24 Mar, 2023 | 00:00
Updated-19 Feb, 2025 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Veritas NetBackup IT Analytics 11 before 11.2.0. The application upgrade process included unsigned files that could be exploited and result in a customer installing unauthentic components. A malicious actor could install rogue Collector executable files (aptare.jar or upgrademanager.zip) on the Portal server, which might then be downloaded and installed on collectors.

Action-Not Available
Vendor-n/aVeritas Technologies LLC
Product-netbackup_it_analyticsaptare_it_analyticsn/a
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2023-27574
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.10% / 28.08%
||
7 Day CHG~0.00%
Published-03 Mar, 2023 | 00:00
Updated-06 Mar, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ShadowsocksX-NG 1.10.0 signs with com.apple.security.get-task-allow entitlements because of CODE_SIGNING_INJECT_BASE_ENTITLEMENTS.

Action-Not Available
Vendor-shadowsocksn/a
Product-shadowsocksx-ngn/a
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2023-23110
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.4||HIGH
EPSS-1.30% / 79.46%
||
7 Day CHG~0.00%
Published-02 Feb, 2023 | 00:00
Updated-26 Mar, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An exploitable firmware modification vulnerability was discovered in certain Netgear products. The data integrity of the uploaded firmware image is ensured with a fixed checksum number. Therefore, an attacker can conduct a MITM attack to modify the user-uploaded firmware image and bypass the checksum verification. This affects WNR612v2 Wireless Routers 1.0.0.3 and earlier, DGN1000v3 Modem Router 1.0.0.22 and earlier, D6100 WiFi DSL Modem Routers 1.0.0.63 and earlier, WNR1000v2 Wireless Routers 1.1.2.60 and earlier, XAVN2001v2 Wireless-N Extenders 0.4.0.7 and earlier, WNR2200 Wireless Routers 1.0.1.102 and earlier, WNR2500 Wireless Routers 1.0.0.34 and earlier, R8900 Smart WiFi Routers 1.0.3.6 and earlier, and R9000 Smart WiFi Routers 1.0.3.6 and earlier.

Action-Not Available
Vendor-n/aNETGEAR, Inc.
Product-xavn2001v2wnr2500wnr1000v2_firmwarer9000_firmwared6100r9000dgn1000v3_firmwarewnr2500_firmwarewnr612v2_firmwarexavn2001v2_firmwarewnr2200_firmwarewnr2200wnr1000v2wnr612v2r8900_firmwarer8900dgn1000v3d6100_firmwaren/a
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2020-22658
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.19% / 40.97%
||
7 Day CHG~0.00%
Published-20 Jan, 2023 | 00:00
Updated-03 Apr, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to switch completely to unauthorized image to be Boot as primary verified image.

Action-Not Available
Vendor-ruckuswirelessn/a
Product-zonedirector_3000zonedirector_1200_firmwaret300_firmwarescg200_firmwarer600sz-100_firmwarevszvsz_firmwarer310_firmwarer600_firmwarer500_firmwarezonedirector_1100r500zonedirector_5000t301szonedirector_1100_firmwaret301s_firmwarer310zonedirector_3000_firmwarezonedirector_5000_firmwaret300scg200sz-300_firmwaresz-100zonedirector_1200t301n_firmwaresz-300t301nn/a
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2020-22654
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.19% / 40.97%
||
7 Day CHG~0.00%
Published-20 Jan, 2023 | 00:00
Updated-03 Apr, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to bypass firmware image bad md5 checksum failed error.

Action-Not Available
Vendor-ruckuswirelessn/a
Product-zonedirector_3000zonedirector_1200_firmwaret300_firmwarescg200_firmwarer600sz-100_firmwarevszvsz_firmwarer310_firmwarer600_firmwarer500_firmwarezonedirector_1100r500zonedirector_5000t301szonedirector_1100_firmwaret301s_firmwarer310zonedirector_3000_firmwarezonedirector_5000_firmwaret300scg200sz-300_firmwaresz-100zonedirector_1200t301n_firmwaresz-300t301nn/a
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2022-24117
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.11% / 30.32%
||
7 Day CHG~0.00%
Published-26 Dec, 2022 | 00:00
Updated-12 Apr, 2025 | 00:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Certain General Electric Renewable Energy products download firmware without an integrity check. This affects iNET and iNET II before 8.3.0, SD before 6.4.7, TD220X before 2.0.16, and TD220MAX before 1.2.6.

Action-Not Available
Vendor-gen/a
Product-inet_900_firmwaresd4sd9td220x_firmwaresd9_firmwareinet_ii_900sd1sd1_firmwaretd220maxinet_ii_900_firmwaresd2_firmwareinet_900sd4_firmwaretd220max_firmwaresd2td220xn/a
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2022-46430
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-4.8||MEDIUM
EPSS-0.18% / 39.95%
||
7 Day CHG~0.00%
Published-20 Dec, 2022 | 00:00
Updated-16 Apr, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TP-Link TL-WR740N V1 and V2 v3.12.4 and earlier allows authenticated attackers to execute arbitrary code or cause a Denial of Service (DoS) via uploading a crafted firmware image during the firmware update process.

Action-Not Available
Vendor-n/aTP-Link Systems Inc.
Product-tl-wr740n_v2_firmwaretl-wr740n_v1tl-wr741nd_v2tl-wr740n_v2tl-wr740n_v1_firmwaretl-wr741nd_v2_firmwaretl-wr741nd_v1tl-wr741nd_v1_firmwaren/a
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2022-46428
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-4.8||MEDIUM
EPSS-0.18% / 39.95%
||
7 Day CHG~0.00%
Published-20 Dec, 2022 | 00:00
Updated-16 Apr, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TP-Link TL-WR1043ND V1 3.13.15 and earlier allows authenticated attackers to execute arbitrary code or cause a Denial of Service (DoS) via uploading a crafted firmware image during the firmware update process.

Action-Not Available
Vendor-n/aTP-Link Systems Inc.
Product-tl-wr1043nd_v1tl-wr1043nd_v1_firmwaren/a
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2022-46423
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-0.46% / 63.43%
||
7 Day CHG~0.00%
Published-20 Dec, 2022 | 00:00
Updated-17 Apr, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An exploitable firmware modification vulnerability was discovered on the Netgear WNR2000v1 router. An attacker can conduct a MITM (Man-in-the-Middle) attack to modify the user-uploaded firmware image and bypass the CRC check, allowing attackers to execute arbitrary code or cause a Denial of Service (DoS). This affects v1.2.3.7 and earlier.

Action-Not Available
Vendor-n/aNETGEAR, Inc.
Product-wnr2000wnr2000_firmwaren/a
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2022-4261
Assigner-Rapid7, Inc.
ShareView Details
Assigner-Rapid7, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.10% / 26.99%
||
7 Day CHG~0.00%
Published-07 Dec, 2022 | 00:00
Updated-14 Apr, 2025 | 17:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rapid7 Nexpose Update Validation Issue

Rapid7 Nexpose and InsightVM versions prior to 6.6.172 failed to reliably validate the authenticity of update contents. This failure could allow an attacker to provide a malicious update and alter the functionality of Rapid7 Nexpose. The attacker would need some pre-existing mechanism to provide a malicious update, either through a social engineering effort, privileged access to replace downloaded updates in transit, or by performing an Attacker-in-the-Middle attack on the update service itself.

Action-Not Available
Vendor-Rapid7 LLC
Product-insightvmnexposeInsightVMNexpose
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2022-40799
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-40.34% / 97.25%
||
7 Day CHG-6.72%
Published-29 Nov, 2022 | 00:00
Updated-03 Nov, 2025 | 18:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2025-08-26||Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Data Integrity Failure in 'Backup Config' in D-Link DNR-322L <= 2.60B15 allows an authenticated attacker to execute OS level commands on the device.

Action-Not Available
Vendor-n/aD-Link Corporation
Product-dnr-322ldnr-322l_firmwaren/aDNR-322L
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2022-45442
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-8.8||HIGH
EPSS-0.28% / 50.93%
||
7 Day CHG~0.00%
Published-28 Nov, 2022 | 00:00
Updated-04 Nov, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Sinatra vulnerable to Reflected File Download attack

Sinatra is a domain-specific language for creating web applications in Ruby. An issue was discovered in Sinatra 2.0 before 2.2.3 and 3.0 before 3.0.4. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a response when the filename is derived from user-supplied input. Version 2.2.3 and 3.0.4 contain patches for this issue.

Action-Not Available
Vendor-sinatrarbsinatraDebian GNU/Linux
Product-debian_linuxsinatrasinatra
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2022-37908
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-5.8||MEDIUM
EPSS-0.09% / 25.85%
||
7 Day CHG~0.00%
Published-03 Nov, 2022 | 19:29
Updated-02 May, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An authenticated attacker can impact the integrity of the ArubaOS bootloader on 7xxx series controllers. Successful exploitation can compromise the hardware chain of trust on the impacted controller.

Action-Not Available
Vendor-Hewlett Packard Enterprise (HPE)Aruba Networks
Product-700872207240xm721070057205arubaos7280702470107030sd-wanAruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2022-38199
Assigner-Environmental Systems Research Institute, Inc.
ShareView Details
Assigner-Environmental Systems Research Institute, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.20% / 41.78%
||
7 Day CHG~0.00%
Published-25 Oct, 2022 | 16:31
Updated-10 Apr, 2025 | 14:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
BUG-000144172 - Remote file download issue in ArcGIS Server

A remote file download issue can occur in some capabilities of Esri ArcGIS Server web services that may in some edge cases allow a remote, unauthenticated attacker to induce an unsuspecting victim to launch a process in the victim's PATH environment. Current browsers provide users with warnings against running unsigned executables downloaded from the internet.

Action-Not Available
Vendor-Environmental Systems Research Institute, Inc. ("Esri")
Product-arcgis_serverArcGIS Server
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2022-31324
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.29% / 52.06%
||
7 Day CHG~0.00%
Published-13 Sep, 2022 | 22:00
Updated-03 Aug, 2024 | 07:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An arbitrary file download vulnerability in the downloadAction() function of Penta Security Systems Inc WAPPLES v6.0 r3 4.10-hotfix1 allows attackers to download arbitrary files via a crafted POST request.

Action-Not Available
Vendor-pentasecurityn/a
Product-wapplesn/a
CWE ID-CWE-494
Download of Code Without Integrity Check
  • Previous
  • 1
  • 2
  • 3
  • 4
  • Next