CWE-345: CWE-345
Yearly Trend
Top Affected Vendors
All CWE-345 CVEs (118)
This vulnerability allows local attackers with low-privileged code execution to escalate privileges on Visteon Infotainment systems by exploiting insu...
Nov 22, 2024This vulnerability allows a local attacker on Windows systems to escalate privileges by exploiting insufficient data validation in Google Chrome's ins...
Aug 21, 2024AudioCodes VoIP desk phones through version 3.4.4.1000 have insufficient firmware validation that only uses simple checksums. This allows attackers wh...
Aug 11, 2023This CVE describes a command injection vulnerability in Xiaomi Router AX3600 firmware that allows attackers to execute arbitrary code on affected devi...
Mar 10, 2022This vulnerability in AMD's Platform Security Processor (PSP) boot ROM allows attackers to execute arbitrary code when encrypted firmware images are l...
Nov 16, 2021CVE-2021-29239 is a vulnerability in CODESYS Development System 3 where malicious documents or files embedded in libraries are displayed or executed w...
May 3, 2021This CVE addresses a cache poisoning vulnerability in Moodle that could allow attackers to manipulate locally cached data. The vulnerability affects M...
Nov 7, 2024This vulnerability allows attackers to embed malicious VBA scripts in Rockwell Automation project files (RSP/RSS). When a legitimate user opens an inf...
Oct 14, 2024This CVE allows attackers with Kubernetes API access to bypass Cilium network policies by updating pod labels with non-existent construct names. It af...
Sep 27, 2023OpenClaw versions before 2026.2.2 fail to validate Telegram webhook secrets, allowing unauthenticated attackers to send forged Telegram updates. This ...
Mar 5, 2026OpenClaw versions 2026.1.30 and below have an authentication bypass vulnerability in Telegram webhook mode. When channels.telegram.webhookSecret is no...
Feb 19, 2026Authlib versions before 1.6.4 fail to properly validate JWS tokens with unknown critical header parameters, violating RFC 7515 requirements. Attackers...
Sep 22, 2025This vulnerability in PowerDNS Recursor allows attackers to spoof DNS responses for ECS-enabled queries more effectively than standard queries. It aff...
Jul 21, 2025This vulnerability allows attackers to replace the FRP client binary with malicious code during download, as Gradio lacks integrity verification. User...
Oct 10, 2024This vulnerability allows attackers to gain elevated privileges on Windows systems by exploiting the Print Spooler service. Attackers could execute ar...
Aug 13, 2024This CVE involves the removal of GLOBALTRUST root certificates from the certifi Python package due to compliance issues. Systems using affected certif...
Jul 5, 2024This vulnerability in MIT Kerberos 5 allows attackers to modify the plaintext Extra Count field in GSS krb5 wrap tokens, causing applications to recei...
Jun 28, 2024CVE-2024-30250 is a security bypass vulnerability in Astro-Shield that allows attackers to inject malicious cross-origin resources by adding valid int...
Apr 4, 2024CVE-2023-38552 is a security bypass vulnerability in Node.js's experimental policy mechanism that allows attackers to forge checksums and disable inte...
Oct 18, 2023This vulnerability affects systems using certifi Python package versions before 2023.07.22, which included compromised e-Tugra root certificates. Atta...
Jul 25, 2023This CVE describes an integrity vulnerability in SwagPayPal's JavaScript-based PayPal checkout methods where the payment amount and item list sent to ...
Feb 3, 2023CVE-2015-5236 is a Same Origin Policy bypass vulnerability in IcedTea-Web that allows malicious websites to spoof the codebase attribute in Java apple...
Jul 7, 2022CVE-2021-4031 is an insufficient verification vulnerability in Syltek applications that allows attackers to bypass payment systems by forging requests...
Mar 18, 2022CVE-2020-19769 is an insufficient verification vulnerability in the BurnMe() function of Rob The Bank 1.0 that allows attackers to steal tokens from u...
Sep 7, 2021The Luca contact tracing app server (versions through 1.1.14) allows attackers to insert fake COVID-19 exposure records because phone number data lack...
Jun 4, 2021This vulnerability allows attackers to perform Local File Inclusion (LFI) attacks in Piwigo's LocalFilesEditor extension. By manipulating the 'file' p...
Apr 26, 2021This vulnerability allows a local attacker to bypass file protection mechanisms in Samsung Android devices by exploiting insufficient verification of ...
Feb 9, 2023This vulnerability allows unauthenticated remote attackers to conduct cross-site WebSocket hijacking attacks against Cisco IOS XE devices with web UI ...
Mar 24, 2021This vulnerability allows authentication bypass in Red Hat Enterprise Application Platform 8 when using OIDC with multi-tenant applications. An attack...
Apr 10, 2024This vulnerability allows local attackers or those who can bypass CORS restrictions to escalate privileges to the level of the Arduino Create Agent se...
Oct 18, 2023The Belkin AX1800 router firmware update handler has insufficient verification of data authenticity, allowing attackers to remotely deliver malicious ...
Aug 24, 2025This vulnerability allows remote attackers to execute arbitrary code on HanwhaVision camera devices during Wave server installation via command inject...
Nov 13, 2023Altenergy Power Control Software C1.2.5 contains a remote code execution vulnerability in the /models/management_model.php component due to insufficie...
May 11, 2023CVE-2022-30272 allows attackers to upload malicious firmware to Motorola ACE1000 RTUs due to lack of cryptographic authentication. This affects organi...
Jul 26, 2022This vulnerability in eprosima Fast DDS allows expired Permissions Certificate Authorities (PermissionsCA) to be accepted as valid due to insufficient...
Feb 11, 2025This vulnerability in Kyverno allows attackers who compromise image registries to control which image diggets Kyverno users receive, potentially deliv...
Nov 14, 2023This vulnerability in Open vSwitch allows ICMPv6 Neighbor Advertisement packets to bypass OpenFlow rules between virtual machines. A local attacker ca...
Oct 6, 2023This vulnerability allows attackers to modify the configured server list in BIG-IP Edge Client for Windows and macOS, potentially redirecting client c...
Aug 2, 2023This vulnerability allows physically present attackers to bypass authentication on Pioneer DMH-WT7600NEX in-car multimedia systems by exploiting insuf...
Jun 25, 2025This vulnerability in gitoxide's gix-path component allows limited Windows users to escalate privileges by placing a malicious git.exe in a hard-coded...
Jul 18, 2024This vulnerability allows attackers with command execution capabilities to bypass kernel code signing protections and execute arbitrary native code on...
Dec 3, 2024This vulnerability in Tenda G1 routers allows attackers to upload malicious firmware due to insufficient authentication checks in the firmware update ...
Aug 14, 2025This vulnerability in Tenda AC15 routers allows attackers to bypass firmware update authentication checks, potentially enabling malicious firmware ins...
Aug 14, 2025This vulnerability in D-Link DIR-619L routers allows attackers to upload malicious firmware due to insufficient verification of firmware authenticity....
Aug 14, 2025This vulnerability in Diebold Nixdorf Vynamic Security Suite allows physical attackers to bypass disk encryption by manipulating hard disk contents du...
Aug 8, 2024This vulnerability in the Python cryptography package allows attackers to provide specially crafted public keys from small-order subgroups, bypassing ...
Feb 10, 2026This Bluetooth vulnerability in Android allows attackers to bypass permission checks and access sensitive information when users interact with mislead...
Aug 26, 2025This vulnerability in Zoom Workplace Apps allows unprivileged users to cause denial of service attacks by exploiting insufficient data authenticity ve...
Mar 11, 2025CVE-2025-1944 is a ZIP archive manipulation vulnerability in picklescan versions before 0.0.23 that allows malicious PyTorch model files to bypass sec...
Mar 10, 2025Thunderbird email client displays incorrect sender addresses when emails use invalid group name syntax in the From field. This allows attackers to spo...
Feb 4, 2025About CWE-345 (CWE-345)
Our database tracks 118 CVEs classified as CWE-345, with 27 rated critical and 61 rated high severity. The average CVSS score for CWE-345 vulnerabilities is 7.8.
External reference: View CWE-345 on MITRE CWE →
Monitor CWE-345 Vulnerabilities
Get alerted when new CWE-345 CVEs affect your infrastructure.
Start Monitoring Free