Register Login
  • SaaS Solutions
    • Vulnerability Intelligence
    • Vulnerability Management
  • Pricing
  • Vulnerabilities
  • Reports
  • Blog
  • Contact Us
  1. Main
  2. Vulnerability Database
  3. CWE List

CWE-254 - Security Features

Latest vulnerabilities for CWE-254

Multiple vulnerabilities in Dell Secure Connect Gateway 2025-05-19
High Yes Public exploit
Dell RecoverPoint for Virtual Machines update for third-party components 2025-05-19
Critical Yes Public exploit
Dell APEX Cloud Platform for Red Hat OpenShift update for third-party components 2025-05-19
High Yes Public exploit
Access control rules bypass in Arista EOS 2025-05-17
Medium Yes
Security features bypass in Spring Framework 2025-05-16
Low Yes
Multiple vulnerabilities in IBM watsonx Assistant Cartridge and IBM watsonx Orchestrate with watsonx Assistant Cartridge 2025-05-15
Low Yes
IBM Cloud Pak for Data System 1.0 update for Psf Requests 2025-05-09
Low Yes
IBM Maximo Application Suite - Monitor Component update for VMware Tanzu Spring Framework 2025-05-06
Medium Yes
Multiple vulnerabilities in IBM Cloud Pak for Data System 1.0 2025-05-06
Low Yes
Multiple vulnerabilities in IBM watsonx 2025-05-02
Medium Yes Public exploit

References

Description of CWE-254 on Mitre website

Stay Connected

  • Twitter
  • Facebook
  • Linkedin
  • Official YouTube channel of Cybersecurity Help s.r.o.
  • RSS
Security Services
  • Actionable & Personalized Vulnerability Intelligence
  • On-Demand Security Consulting
  • Pricing
IT-Consulting
  • IT Infrastructure Outsourcing Services
  • Web Applications Support & Deployment
  • On-Demand Consulting
Partner Links
  • SSL/TLS Security Test by ImmuniWeb
  • Web Server Security Test by ImmuniWeb
Blog
  • Japan passes cybersecurity law granting powers for preemptive defense
  • Ransomware gangs use new Skitnet malware for stealthy network exploitation
  • US SEC hacker gets 14 months in prison
  • Sophisticated Lampion malware campaign targeting Portuguese orgs
  • Cyber Security Week in Review: May 16, 2025
  • Read all articles →
Contacts | Terms of use | Privacy Policy

© 2025 Cybersecurity Help s.r.o.