CWE-354: CWE-354
Yearly Trend
Top Affected Vendors
All CWE-354 CVEs (35)
This vulnerability allows attackers to bypass integrity checks and install unauthorized firmware on Sharp Display Solutions projectors. Attackers coul...
Dec 22, 2025This vulnerability in LiteSpeed QUIC (LSQUIC) Library involves mishandled DCID (Destination Connection ID) validation, allowing attackers to potential...
Feb 9, 2024This vulnerability in the Ruby JWE library allows attackers to brute-force authentication tags in encrypted JWEs, potentially leading to loss of confi...
Aug 8, 2025CVE-2024-3596 allows a local attacker to forge RADIUS protocol responses by exploiting MD5 collisions, enabling them to modify authentication outcomes...
Jul 9, 2024This vulnerability in some Xiaomi devices allows attackers to achieve privilege escalation by exploiting insufficient parameter validation in third-pa...
Apr 21, 2022This vulnerability allows authenticated administrators on F5 BIG-IP systems running in Appliance mode to bypass security restrictions due to a missing...
May 5, 2022This vulnerability allows attackers to upload malicious firmware to Snap One OvrC Pro devices due to insufficient signature validation. Only MD5 hash ...
May 22, 2023This vulnerability in the containers/image library allows attackers to trigger authenticated registry accesses on behalf of victims, potentially leadi...
May 14, 2024This vulnerability in Jenkins Pipeline: Groovy Plugin allows attackers with Item/Build permission to rebuild previous builds using unapproved Jenkinsf...
Nov 13, 2024This vulnerability in go-tuf allows attackers to perform rollback attacks, causing clients to install older, potentially vulnerable software versions ...
May 5, 2022This CVE describes an ASAR integrity bypass vulnerability in Electron that allows attackers to modify application files and potentially execute arbitr...
Jul 1, 2025This vulnerability allows a local attacker to execute arbitrary code on systems with the TOTOLINK A600UB Bluetooth Wireless Adapter driver installer. ...
Nov 15, 2024This vulnerability in IBM Security Secret Server (IBM Security Verify Privilege Manager 10.8.2) allows a local user to execute arbitrary code due to i...
Jun 25, 2021The Hoppscotch Browser Extension vulnerability allows any website to send messages to the extension and receive responses, bypassing CORS restrictions...
May 14, 2024A logic flaw in httpsig-hyper versions before 0.0.23 causes digest verification to always succeed regardless of actual digest values, allowing message...
Feb 19, 2026This vulnerability allows remote attackers to cause denial of service (DoS) in FRRouting and Pica8 PICOS systems by sending specially crafted BGP upda...
Aug 29, 2023This vulnerability affects Siemens SCALANCE industrial network switches with OSPF enabled. An unauthenticated remote attacker can send specially craft...
Jun 14, 2022This vulnerability in MediaTek WIFI Firmware allows remote attackers to cause a system crash (denial of service) without authentication or user intera...
Jun 6, 2022This vulnerability in Zoom Client for MacOS allows attackers to downgrade users to older, less secure versions during the update process. It affects M...
Apr 28, 2022CVE-2022-22253 is an integrity check validation vulnerability in Huawei's DFX module that could allow attackers to compromise system stability. This a...
Apr 11, 2022This vulnerability in Listary allows attackers to intercept software updates via man-in-the-middle (MITM) attacks due to insecure HTTP connections and...
Dec 14, 2021This vulnerability in Huawei smartphones allows attackers to bypass integrity checks, potentially causing system resets. It affects Huawei smartphone ...
Aug 2, 2021This vulnerability in Zoom Rooms for Windows allows authenticated local users to escalate their privileges on the system. Attackers with standard user...
Jul 11, 2023This vulnerability allows attackers with administrative privileges to execute arbitrary operating system commands on affected NEC Aterm routers by sen...
Apr 26, 2021TensorFlow is vulnerable to shape validation flaws in multiple operations, allowing attackers to trigger undefined behavior including crashes or poten...
Nov 5, 2021This vulnerability in Huawei products allows attackers to physically install malware due to insufficient integrity checks in a specific module. Exploi...
Dec 27, 2024This vulnerability allows physical attackers to bypass disk encryption on Diebold Nixdorf ATMs by manipulating the /etc/mtab file during the Pre-Boot ...
Aug 8, 2024This vulnerability allows authenticated attackers with Read/Write system maintenance permissions to install corrupted firmware images on FortiNDR devi...
Mar 14, 2025This vulnerability allows attackers to intercept SSH traffic and drop specific packets, potentially downgrading or disabling security features in Apac...
Aug 12, 2024NVIDIA DGX Spark GB10 systems contain a vulnerability in SROOT firmware where improper integrity validation could allow attackers to access sensitive ...
Nov 25, 2025The Contact Form 7 WordPress plugin has an order replay vulnerability that allows unauthenticated attackers to reuse a single Stripe PaymentIntent for...
Apr 16, 2025A data integrity vulnerability in go-git versions before 5.16.5 fails to properly verify checksums for .pack and .idx files, potentially allowing corr...
Feb 9, 2026This vulnerability allows attackers to bypass firmware downgrade protection on affected Lexmark printers, potentially enabling them to install older, ...
Jan 17, 2025An improper validation vulnerability in Zscaler Client Connector on macOS allows attackers to cause denial of service by crashing the client binary, w...
May 2, 2024A locally authenticated non-admin user can bypass security controls in Palo Alto Networks Prisma Browser by exploiting insufficient input validation. ...
Nov 14, 2025About CWE-354 (CWE-354)
Our database tracks 35 CVEs classified as CWE-354, with 4 rated critical and 21 rated high severity. The average CVSS score for CWE-354 vulnerabilities is 7.3.
External reference: View CWE-354 on MITRE CWE →
Monitor CWE-354 Vulnerabilities
Get alerted when new CWE-354 CVEs affect your infrastructure.
Start Monitoring Free