Register
Login
Toggle navigation
SaaS Solutions
Vulnerability Intelligence
Vulnerability Management
Pricing
Vulnerabilities
Reports
Blog
Contact Us
Main
Vulnerability Database
CWE List
CWE-349 - Acceptance of Extraneous Untrusted Data With Trusted Data
Description
The product, when processing trusted data, accepts any untrusted data that is also included with the trusted data, treating the untrusted data as if it were trusted.
Latest vulnerabilities for CWE-349
Security restrictions bypass in IntelliJ IDEA
2025-12-17
Medium
Yes
Multiple vulnerabilities in Netcool Operations Insight
2025-11-24
Critical
Yes
Public exploit
Multiple vulnerabilities in IBM QRadar SIEM
2025-09-15
High
Yes
DNS cache poisoning in PowerDNS Recursor
2025-07-21
Medium
Yes
DNS cache poisoning in Unbound
2025-07-21
Medium
Yes
Multiple vulnerabilities in Microsoft BitLocker
2025-07-09
Low
Yes
Acceptance of Extraneous Untrusted Data With Trusted Data in Cisco Webex Meetings
2025-05-22
Medium
Yes
Security Feature Bypass in Microsoft UrlMon
2025-05-13
High
Yes
Multiple vulnerabilities in Microsoft Word
2025-04-09
High
Yes
Multiple vulnerabilities in IBM QRadar Pre-Validation App
2024-11-25
Medium
Yes
Public exploit
References
Description of CWE-349 on Mitre website