CWE-668: CWE-668
Yearly Trend
Top Affected Vendors
All CWE-668 CVEs (82)
This critical vulnerability in Ksenia Security Lares 4.0 Home Automation version 1.6 exposes the alarm system PIN in server responses after authentica...
Dec 30, 2025This critical authentication bypass vulnerability in WIPOTEC GmbH ComScale allows unauthenticated attackers to log in as any user without requiring a ...
Oct 18, 2023CVE-2022-24074 is a critical vulnerability in Whale Browser's default Whale Bridge extension that allows compromised rendering processes to send arbit...
Mar 17, 2022CVE-2022-25643 is a privilege escalation vulnerability in seatd-launch (part of seatd 0.6.x) that allows local users to delete arbitrary files with ro...
Feb 24, 2022This vulnerability in Mutare Voice (EVM) allows unauthenticated attackers to include local files via getfile.asp, which can be escalated to remote cod...
Feb 16, 2021This vulnerability allows non-secure applications to exfiltrate intermediate register values from secure workloads, potentially exposing sensitive dat...
Jan 13, 2026CVE-2022-27818 is a vulnerability in SWHKD 1.1.5 where the software unsafely uses the /tmp/swhkd.sock pathname, allowing local attackers to cause info...
Apr 7, 2022CVE-2021-42640 is an Insecure Direct Object Reference (IDOR) vulnerability in PrinterLogic Web Stack that allows unauthenticated attackers to reassign...
Feb 2, 2022This vulnerability allows unauthenticated remote attackers to read, modify, or delete activity feed entries in Siemens SiPass integrated and Siveillan...
Dec 14, 2021Winston 1.5.4 devices have a misconfigured Cross-Origin Resource Sharing (CORS) policy that accepts requests from any origin, allowing attackers to ma...
Oct 28, 2020A vulnerability in PCP's default pmproxy configuration exposes the Redis server backend to the local network, allowing remote command execution with R...
Mar 28, 2024This vulnerability in EcoStruxure Control Expert allows remote code execution when authenticated users click malicious links. Attackers can exploit we...
Apr 18, 2023This vulnerability allows authenticated non-admin users with local access to SAP Host Agent ports to execute arbitrary operating system commands with ...
Feb 14, 2023CVE-2021-36710 is a privilege escalation vulnerability in ToaruOS where improper memory management allows userland processes to map kernel structures....
Jun 8, 2022This vulnerability in Jenkins Debian Package Builder Plugin allows attackers who control Jenkins agent processes to execute arbitrary operating system...
Jan 12, 2022CVE-2023-3270 is an information disclosure vulnerability in the SICK ICR890-4 industrial camera system, allowing unauthenticated remote attackers to a...
Jul 10, 2023This vulnerability in Qualcomm Snapdragon chipsets allows information disclosure when devices accept AMSDU frames with mismatched destination and sour...
Oct 20, 2021This vulnerability in restund TURN server allows attackers to relay traffic to localhost services by manipulating TURN channel requests. Attackers can...
Jun 11, 2021This vulnerability allows non-privileged user processes to make improper GPU system calls to access the graphics buffers of parent processes. This aff...
Nov 18, 2024This vulnerability in Fortinet FortiClient for Windows allows attackers to escalate privileges via the MSI installer by controlling file names or path...
May 11, 2022This vulnerability in openshift-gitops-operator allows namespaces deploying ArgoCD CR instances to create rogue PrometheusRules that affect the entire...
Jan 28, 2025This vulnerability allows a local high-privileged attacker to escape container isolation and execute arbitrary operating system commands on the underl...
Feb 1, 2023This vulnerability in Android's Visual Voice Mail (VVM) application allows attackers with temporary control of an app having READ_SMS permission to st...
Feb 25, 2022This vulnerability in some Intel DTT software installers allows authenticated local users to access resources they shouldn't, potentially enabling pri...
May 16, 2024This vulnerability in Univention Corporate Server (UCS) monitoring scripts exposes the LDAP machine account password in plaintext in the process list....
Oct 31, 2023A stack layout mismatch in the RISC-V architecture's ftrace implementation in the Linux kernel causes a kernel warning and potential instability when ...
Apr 16, 2025This vulnerability allows a local attacker with low privileges to read and modify any user's files in the working directory of affected CODESYS produc...
Jun 4, 2024This vulnerability in Hyundai's Gen5W_L in-vehicle infotainment system allows attackers to extract AES encryption keys from memory, enabling them to c...
Apr 27, 2023Spring Boot versions before 2.2.11.RELEASE are vulnerable to temporary directory hijacking in the createTempDir method. This allows attackers to manip...
Mar 30, 2022Splashtop Remote Client (Business Edition) creates temporary files with insecure permissions, allowing local attackers to write arbitrary files to sys...
Feb 15, 2022This vulnerability in Huawei smartphones allows local attackers to manipulate system settings externally, potentially leading to kernel code execution...
Aug 10, 2021This vulnerability in HarmonyOS allows local attackers to bypass the application trustlist mechanism by externally controlling system settings. Attack...
Aug 3, 2021CVE-2021-33669 is an insecure temporary file vulnerability in SAP Mobile SDK Certificate Provider that allows local unprivileged attackers to exploit ...
Jun 9, 2021CVE-2021-31154 is a local privilege escalation vulnerability in the 'please' command-line tool versions before 0.4. It uses predictable temporary file...
May 27, 2021Apache Helix Front (UI) contains a hard-coded secret that allows attackers to forge authentication cookies and spoof user sessions. This affects all v...
Aug 20, 2024The WP STAGING WordPress Backup plugin before version 3.2.0 allows unauthorized access to cache files during the cloning process. This vulnerability c...
Jan 29, 2024CVE-2023-42716 is a missing permission check vulnerability in telephony services that could allow remote attackers to access sensitive information wit...
Dec 4, 2023This vulnerability allows unauthenticated attackers to execute database operations and system tasks via a websocket interface in Vocera Report Server ...
Jul 25, 2023This vulnerability in Archer Platform allows authenticated attackers to access sensitive information by crafting specific URLs. It affects Archer Plat...
Jul 14, 2023This vulnerability in Issabel PBX allows remote attackers to access sensitive information through the modules directory without authentication. It aff...
Jul 13, 2023Unauthenticated HTTP endpoints in SICK ICR890-4 industrial cameras allow remote attackers to retrieve sensitive device information without credentials...
Jul 10, 2023This vulnerability allows attackers to modify the immutable name and type of clusters in Apache InLong, potentially enabling unauthorized configuratio...
May 22, 2023This CVE describes a hard-coded credentials vulnerability in multiple Buffalo network switch models that allows attackers to access debug functions. A...
Apr 11, 2023CVE-2023-22892 is an information disclosure vulnerability in SmartBear Zephyr Enterprise that allows unauthenticated attackers to read arbitrary files...
Mar 8, 2023This vulnerability in Development IL ecdh library allows attackers to send invalid elliptic curve points as public keys and derive the shared secret. ...
Feb 24, 2023This vulnerability in Epiphany (GNOME Web browser) allows malicious websites to trick users into exfiltrating saved passwords. The browser's autofill ...
Feb 20, 2023This vulnerability allows unauthenticated attackers to access sensitive configuration files on Wavlink WN530HG4 routers, exposing administrator userna...
Jul 20, 2022This vulnerability in SAP Business One integration with SAP HANA allows attackers to access HANA cockpit's data volume containing sensitive informatio...
Jul 12, 2022This vulnerability in WeBank FATE's hetero_decision_tree_guest.py allows attackers to read sensitive information during federated machine learning tra...
Jun 16, 2022This vulnerability in WAVLINK WN535 G3 routers allows attackers to execute commands via the live_mfg.shtml endpoint, potentially exposing sensitive ro...
Jun 14, 2022About CWE-668 (CWE-668)
Our database tracks 82 CVEs classified as CWE-668, with 10 rated critical and 66 rated high severity. The average CVSS score for CWE-668 vulnerabilities is 7.8.
External reference: View CWE-668 on MITRE CWE →
Monitor CWE-668 Vulnerabilities
Get alerted when new CWE-668 CVEs affect your infrastructure.
Start Monitoring Free