Vulnerabilities (CVE)

Filtered by vendor Netease Subscribe
Total 9 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2012-1385 2 Google, Netease 2 Android, Netease Weibohd 2024-11-21 10.0 HIGH N/A
Unspecified vulnerability in the NetEase WeiboHD (com.netease.wbhd) application 1.0.0 for Android has unknown impact and attack vectors.
CVE-2012-1384 2 Google, Netease 2 Android, Netease Pmail 2024-11-21 10.0 HIGH N/A
Unspecified vulnerability in the NetEase Pmail (com.netease.rpmms) application 0.5.0 and 0.5.2 for Android has unknown impact and attack vectors.
CVE-2012-1383 2 Google, Netease 2 Android, Netease Reader 2024-11-21 10.0 HIGH N/A
Unspecified vulnerability in the NetEase Reader (com.netease.pris) application 1.1.2 and 1.2.0 for Android has unknown impact and attack vectors.
CVE-2012-1382 2 Google, Netease 2 Android, Youdao Dictionary 2024-11-21 10.0 HIGH N/A
Unspecified vulnerability in the Youdao Dictionary (com.youdao.dict) application 1.6.1, 2.0.1(2), and 3.0.0(1) for Android has unknown impact and attack vectors.
CVE-2012-1381 2 Google, Netease 2 Android, Netease Cloudalbum 2024-11-21 10.0 HIGH N/A
Unspecified vulnerability in the NetEase CloudAlbum (com.netease.cloudalbum) application 2.0.0 and 2.2.0 for Android has unknown impact and attack vectors.
CVE-2012-1380 2 Google, Netease 2 Android, Neteaseweibo 2024-11-21 10.0 HIGH N/A
Unspecified vulnerability in the NetEaseWeibo (com.netease.wb) application 1.2.1 and 1.2.2 for Android has unknown impact and attack vectors.
CVE-2023-47454 1 Netease 1 Cloudmusic 2024-02-05 N/A 7.8 HIGH
An Untrusted search path vulnerability in NetEase CloudMusic 2.10.4 for Windows allows local users to gain escalated privileges through the urlmon.dll file in the current working directory.
CVE-2020-7620 1 Netease 1 Pomelo-monitor 2024-02-04 7.5 HIGH 9.8 CRITICAL
pomelo-monitor through 0.3.7 is vulnerable to Command Injection.It allows injection of arbitrary commands as part of 'pomelo-monitor' params.
CVE-2019-18954 1 Netease 1 Pomelo 2024-02-04 5.0 MEDIUM 5.3 MEDIUM
Pomelo v2.2.5 allows external control of critical state data. A malicious user input can corrupt arbitrary methods and attributes in template/game-server/app/servers/connector/handler/entryHandler.js because certain internal attributes can be overwritten via a conflicting name. Hence, a malicious attacker can manipulate internal attributes by adding additional attributes to user input.