CWE-1284: CWE-1284
Yearly Trend
Top Affected Vendors
All CWE-1284 CVEs (83)
This vulnerability in IBM Db2 allows authenticated users to cause denial of service by submitting specially crafted queries that trigger improper neut...
Jan 30, 2026IBM Db2 databases are vulnerable to denial of service attacks when processing specially crafted queries due to insufficient input validation. This aff...
Jan 30, 2026This vulnerability in IBM Db2 allows a local user to cause a denial of service by exploiting improper neutralization of special elements in data query...
Jan 30, 2026This vulnerability in IBM Db2 allows a local user to cause a denial of service by exploiting improper neutralization of special elements in data query...
Jan 30, 2026This vulnerability in IBM Db2 allows authenticated users to cause a denial of service by excessively using a global variable. It affects IBM Db2 for L...
Jan 30, 2026This vulnerability allows attackers to trigger a buffer overflow in Filebeat's Syslog parser or Libbeat Dissect processor, causing the Filebeat proces...
Dec 18, 2025This vulnerability in IBM Controller and Cognos Controller allows authenticated users to cause denial of service by sending specially crafted input th...
Dec 8, 2025This vulnerability in MongoDB Server allows oversized BSON documents to bypass initial size validation in time series processing, causing an assertion...
Nov 25, 2025This vulnerability in IBM Cloud Pak for Business Automation allows authenticated users to cause denial of service by sending specially crafted input t...
Nov 3, 2025Authenticated users in GitLab can create tokens with excessively large names, causing disruption to token listing and administrative operations. This ...
Sep 12, 2025This vulnerability allows unauthenticated users to access unpublished page previews in Mautic via predictable URLs. This could expose draft content or...
May 28, 2025IBM InfoSphere Information Server 11.7 contains an improper input validation vulnerability in its GUI component. Authenticated users can cause the GUI...
Dec 12, 2024This vulnerability in The Events Calendar BookIt WordPress plugin allows attackers to manipulate hidden form fields to bypass price validation. It aff...
May 17, 2024This vulnerability allows authenticated users in SailPoint's Identity Security Cloud to access job processing metadata from other tenants, potentially...
May 15, 2024A length validation vulnerability in multiple Samsung Exynos mobile processors allows attackers to trigger denial of service conditions. This affects ...
Jul 9, 2024This vulnerability allows remote unauthenticated attackers to send specially crafted packets to TCP port 683 on Mitsubishi Electric CNC Series control...
Oct 17, 2024A vulnerability in the Linux kernel's DAMON (Data Access MONitor) subsystem allows kernel panic when invalid memory migration requests are made. This ...
Sep 5, 2025This vulnerability in IBM Cloud Pak for Business Automation allows authenticated users to cause denial of service or data corruption by sending improp...
Feb 3, 2026This vulnerability in IBM Db2 allows authenticated users to cause a denial of service by exploiting improper input sanitization in the RPSCAN feature'...
Jan 30, 2026This vulnerability in openrsync allows a client to crash the rsync server by sending specially crafted data with a zero-length block. The server fails...
Dec 15, 2025This vulnerability in the Bonus for Woo WordPress plugin allows attackers to bypass access controls by manipulating input quantities. It affects all W...
Sep 5, 2025This vulnerability affects Arista EOS devices with 802.1X authentication configured. During Accelerated Software Upgrade (ASU) restarts, only the firs...
Mar 4, 2025This vulnerability in AMD processors allows a privileged attacker to bypass SEV-SNP memory integrity protections by exploiting improper handling of in...
Feb 11, 2025This vulnerability allows attackers with existing system privileges to send malformed commands to Power Management Firmware, potentially disrupting te...
Aug 13, 2024A buffer length validation vulnerability in GoBGP's MRT packet parsing allows attackers to cause denial of service or potentially execute arbitrary co...
Apr 21, 2025This vulnerability in SourceCodester Food Ordering Management System 1.0 allows attackers to manipulate payment calculations by exploiting improper va...
Sep 7, 2024This vulnerability in zlib's crc32_combine64 and crc32_combine_gen64 functions allows an attacker to cause denial of service via CPU consumption due t...
Feb 18, 2026CVE-2026-0925 is an improper input validation vulnerability in Tanium Discover that could allow attackers to manipulate data inputs. This affects orga...
Jan 26, 2026This vulnerability in Mitsubishi Electric MELSEC iQ-R Series PLCs allows unauthenticated attackers to read sensitive device data and control programs,...
Feb 5, 2026This vulnerability allows remote attackers with valid player sessions to crash PocketMine-MP game servers by sending malicious inventory transaction r...
Dec 31, 2025This vulnerability allows non-secure processors to impersonate secure processors when making PSCI requests in AMD Versal Adaptive SoC's Trusted Firmwa...
Nov 23, 2025This vulnerability in AMD Trusted Firmware (TF-A) fails to properly validate the security state of calling processors, potentially allowing non-secure...
Nov 23, 2025N-central versions before 2025.4 can generate session IDs for unauthenticated users, potentially allowing attackers to bypass authentication mechanism...
Nov 12, 2025About CWE-1284 (CWE-1284)
Our database tracks 83 CVEs classified as CWE-1284, with 6 rated critical and 41 rated high severity. The average CVSS score for CWE-1284 vulnerabilities is 7.0.
External reference: View CWE-1284 on MITRE CWE →
Monitor CWE-1284 Vulnerabilities
Get alerted when new CWE-1284 CVEs affect your infrastructure.
Start Monitoring Free