The product receives input that is expected to be of a certain type, but it does not validate or incorrectly validates that the input is actually of the expected type.
123 vulnerabilities with CWE-1287
CVE-2024-47262
MEDIUM
AXIS OS - RCE
CVSS 5.3
CVE-2024-56908
MEDIUM
Perfex Crm <3.2.1 - Auth Bypass
CVSS 6.8
CVE-2024-12756
HIGH
Avaya Spaces - Info Disclosure
CVSS 7.3
CVE-2024-8125
MEDIUM
OpenText Content Management <24.4 - Parameter Injection
CVE-2024-48858
HIGH
QNX SDP <8.0-7.1-7.0 - DoS
CVSS 7.5
CVE-2024-5594
CRITICAL
OpenVPN <2.6.11 - Code Injection
CVSS 9.1
CVE-2024-8058
HIGH
FileZ <unknown - Info Disclosure
CVSS 7.6
CVE-2024-54083
MEDIUM
Mattermost <10.1.2-9.5.12 - DoS
CVSS 6.5
CVE-2024-51551
CRITICAL
ASPECT <3.07.02 - Info Disclosure
CVSS 10.0
CVE-2024-51550
CRITICAL
ABB ASPECT Enterprise, NEXUS Series, and MATRIX Series <3.08.02 <3 - Data Validation
CVSS 10.0
CVE-2024-51546
HIGH
ABB ASPECT Enterprise, NEXUS Series, MATRIX Series <3.08.02 - Credentials Disclosure
CVSS 7.5
CVE-2024-9404
HIGH
Moxa Cmd - DoS
CVSS 7.5
CVE-2024-8403
HIGH
Mitsubishi Electric MELSEC iQ-F Series - DoS
CVSS 7.5
CVE-2024-43426
HIGH
pdfTeX - Info Disclosure
CVSS 7.5
CVE-2024-20494
HIGH
Cisco ASA/FTD - DoS
CVSS 8.6
CVE-2024-20408
HIGH
Cisco ASA/FTD - RCE
CVSS 7.7
CVE-2024-47504
HIGH
Juniper Networks Junos OS - DoS
CVSS 7.5
CVE-2024-1578
MEDIUM
rf IDEAS MiCard PLUS Ci/MiCard PLUS BLE - Info Disclosure
CVSS 5.3
CVE-2024-3175
MEDIUM
Google Chrome <120.0.6099.62 - Privilege Escalation
CVSS 6.3
CVE-2024-4879
CRITICAL
KEV
ServiceNow - RCE
CVSS 9.8
CVE-2024-6298
CRITICAL
ABB ASPECT Enterprise, NEXUS Series, MATRIX Series <3.08.01 - Unauthorized File Access
CVSS 10.0
CVE-2024-35213
CRITICAL
QNX SDP <7.1 - DoS
CVSS 9.0
CVE-2024-30395
HIGH
Juniper Junos < 21.2 - Denial of Service
CVSS 7.5
CVE-2024-31948
MEDIUM
FRR <9.1 - DoS
CVSS 6.5
CVE-2023-29126
MEDIUM
Waybox Enel X - Code Injection
CVSS 4.2
Details
Vulnerabilities
123