Vulnerabilities > Use of Incorrectly-Resolved Name or Reference

DATE CVE VULNERABILITY TITLE RISK
2025-04-18 CVE-2025-30357 Use of Incorrectly-Resolved Name or Reference vulnerability in Namelessmc Nameless
NamelessMC is a free, easy to use & powerful website software for Minecraft servers.
network
low complexity
namelessmc CWE-706
6.8
2025-03-10 CVE-2025-24813 Use of Incorrectly-Resolved Name or Reference vulnerability in multiple products
Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98. If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads - attacker knowledge of the names of security sensitive files being uploaded - the security sensitive files also being uploaded via partial PUT If all of the following were true, a malicious user was able to perform remote code execution: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - application was using Tomcat's file based session persistence with the default storage location - application included a library that may be leveraged in a deserialization attack Users are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.
network
low complexity
apache debian CWE-706
critical
9.8
2024-11-30 CVE-2024-53739 Use of Incorrectly-Resolved Name or Reference vulnerability in Coolplugins Cryptocurrency Widgets for Elementor
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Cool Plugins Cryptocurrency Widgets For Elementor allows PHP Local File Inclusion.This issue affects Cryptocurrency Widgets For Elementor: from n/a through 1.6.4.
network
low complexity
coolplugins CWE-706
critical
9.8
2024-06-06 CVE-2024-37150 Use of Incorrectly-Resolved Name or Reference vulnerability in Deno 1.44.0
An issue in `.npmrc` support in Deno 1.44.0 was discovered where Deno would send `.npmrc` credentials for the scope to the tarball URL when the registry provided URLs for a tarball on a different domain.
network
low complexity
deno CWE-706
6.5
2024-05-21 CVE-2021-47261 Use of Incorrectly-Resolved Name or Reference vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: IB/mlx5: Fix initializing CQ fragments buffer The function init_cq_frag_buf() can be called to initialize the current CQ fragments buffer cq->buf, or the temporary cq->resize_buf that is filled during CQ resize operation. However, the offending commit started to use function get_cqe() for getting the CQEs, the issue with this change is that get_cqe() always returns CQEs from cq->buf, which leads us to initialize the wrong buffer, and in case of enlarging the CQ we try to access elements beyond the size of the current cq->buf and eventually hit a kernel panic. [exception RIP: init_cq_frag_buf+103] [ffff9f799ddcbcd8] mlx5_ib_resize_cq at ffffffffc0835d60 [mlx5_ib] [ffff9f799ddcbdb0] ib_resize_cq at ffffffffc05270df [ib_core] [ffff9f799ddcbdc0] llt_rdma_setup_qp at ffffffffc0a6a712 [llt] [ffff9f799ddcbe10] llt_rdma_cc_event_action at ffffffffc0a6b411 [llt] [ffff9f799ddcbe98] llt_rdma_client_conn_thread at ffffffffc0a6bb75 [llt] [ffff9f799ddcbec8] kthread at ffffffffa66c5da1 [ffff9f799ddcbf50] ret_from_fork_nospec_begin at ffffffffa6d95ddd Fix it by getting the needed CQE by calling mlx5_frag_buf_get_wqe() that takes the correct source buffer as a parameter.
local
low complexity
linux CWE-706
7.8
2024-05-21 CVE-2021-47276 Use of Incorrectly-Resolved Name or Reference vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: ftrace: Do not blindly read the ip address in ftrace_bug() It was reported that a bug on arm64 caused a bad ip address to be used for updating into a nop in ftrace_init(), but the error path (rightfully) returned -EINVAL and not -EFAULT, as the bug caused more than one error to occur.
local
low complexity
linux CWE-706
5.5
2024-03-01 CVE-2024-27295 Use of Incorrectly-Resolved Name or Reference vulnerability in Monospace Directus
Directus is a real-time API and App dashboard for managing SQL database content.
network
low complexity
monospace CWE-706
8.2
2023-06-01 CVE-2023-34092 Use of Incorrectly-Resolved Name or Reference vulnerability in Vitejs Vite
Vite provides frontend tooling.
network
low complexity
vitejs CWE-706
7.5
2023-03-30 CVE-2023-28643 Use of Incorrectly-Resolved Name or Reference vulnerability in Nextcloud Server 24.0.0/25.0.0/25.0.2
Nextcloud server is an open source home cloud implementation.
network
low complexity
nextcloud CWE-706
8.8
2023-03-03 CVE-2023-27561 Use of Incorrectly-Resolved Name or Reference vulnerability in multiple products
runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go.
local
high complexity
linuxfoundation redhat debian CWE-706
7.0