CWE-358: CWE-358
Yearly Trend
Top Affected Vendors
All CWE-358 CVEs (28)
CVE-2022-25152 is a critical vulnerability in the ITarian platform that allows authenticated users to bypass mandatory approval processes and execute ...
Jun 9, 2022The OPTIONS method vulnerability in Yokogawa FAST/TOOLS web servers exposes HTTP method information that could aid attackers in reconnaissance and sub...
Feb 9, 2026This vulnerability in Whale Browser allows attackers to escape iframe sandbox restrictions in dual-tab environments, potentially enabling cross-origin...
Oct 16, 2025This vulnerability in Whale browser allows attackers to escape iframe sandbox restrictions in sidebar environments, potentially executing malicious co...
Dec 30, 2025This vulnerability allows attackers to bypass disabled Identity Provider (IdP) checks in Keycloak's JWT authorization grant flow. An attacker with a d...
Feb 9, 2026This vulnerability in Zoom for Windows allows a malicious user to manipulate protected memory buffers, potentially compromising the integrity of the Z...
Jun 13, 2023This is a macOS kernel privilege escalation vulnerability that allows a malicious application to execute arbitrary code with kernel-level privileges. ...
May 14, 2024This vulnerability in Weave Desktop v7.78.10 allows a local attacker to execute arbitrary code by exploiting the nwjs framework component with a craft...
Apr 12, 2024This vulnerability allows attackers to bypass Content Security Policy (CSP) protections in Whale browser by exploiting a specific scheme in dual-tab e...
Oct 16, 2025CVE-2025-59147 is a detection bypass vulnerability in Suricata where crafted traffic with multiple SYN packets containing different sequence numbers w...
Oct 1, 2025This vulnerability in iOS/iPadOS prevents devices from properly locking, allowing unauthorized physical access to unlocked devices. It affects users o...
Oct 25, 2023This vulnerability involves improper security checks in a call module, allowing attackers to bypass intended restrictions. Successful exploitation cou...
Nov 28, 2025This vulnerability in Intel Xeon 6 processors allows a privileged user to bypass security checks in DDRIO configuration when using Intel SGX or TDX te...
Aug 12, 2025This CVE describes a stack-based buffer overflow vulnerability in FortiSandbox's profile parser that allows authenticated attackers to execute arbitra...
Mar 24, 2025This vulnerability in Google Chrome allows attackers to bypass navigation restrictions through a crafted HTML page, potentially redirecting users to m...
Jul 16, 2024A content sniffing vulnerability in Yokogawa's FAST/TOOLS software allows attackers to execute malicious scripts by exploiting unspecified MIME types....
Feb 9, 2026This vulnerability in Yokogawa FAST/TOOLS involves insecure response header settings that could allow attackers to redirect users to malicious website...
Feb 9, 2026This vulnerability involves improper security checks in Huawei's card module, allowing attackers to potentially disrupt system availability. It affect...
Dec 8, 2025This vulnerability allows remote unauthenticated attackers to bypass DNS filtering protections on Fortinet devices when Apple devices are used. It aff...
Jul 8, 2025A permissions bypass vulnerability in macOS allows USB accessories connected during boot to circumvent USB Restricted Mode security controls. This aff...
Sep 15, 2025This vulnerability affects Fortinet's antivirus engine in FortiOS and FortiClient, causing delayed detection of malicious files within malformed RAR a...
Mar 17, 2025IBM WebSphere Application Server versions 9.0 and 8.5 have a security weakness in system administration security settings that could allow attackers t...
Feb 17, 2026This vulnerability in BullWall Ransomware Containment allows authenticated attackers to bypass detection by encrypting a single file when detection th...
Dec 18, 2025This vulnerability allows attackers to spoof BLE connection responses to devices running vulnerable Zephyr RTOS versions. By sending unsolicited conne...
Sep 19, 2025This CVE describes an injection vulnerability in Fortinet's SSL-VPN web user interface that could allow remote unauthenticated attackers to perform ph...
Nov 12, 2024This vulnerability in Google Chrome's FedCM (Federated Credential Management) implementation allows attackers to spoof UI elements through specific us...
Aug 6, 2024HCL Unica Platform has a misconfigured Content Security Policy (CSP) that could allow attackers to load malicious resources in users' browsers. This c...
Oct 12, 2025FAST/TOOLS industrial control system software lacks HSTS configuration, allowing attackers to perform MITM attacks and intercept web communications. T...
Feb 9, 2026About CWE-358 (CWE-358)
Our database tracks 28 CVEs classified as CWE-358, with 4 rated critical and 9 rated high severity. The average CVSS score for CWE-358 vulnerabilities is 6.6.
External reference: View CWE-358 on MITRE CWE →
Monitor CWE-358 Vulnerabilities
Get alerted when new CWE-358 CVEs affect your infrastructure.
Start Monitoring Free