Vulnerabilities > Improper Input Validation
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-03-12 | CVE-2021-21726 | Improper Input Validation vulnerability in ZTE products Some ZTE products have an input verification vulnerability in the diagnostic function interface. | 2.3 |
2021-03-10 | CVE-2021-0377 | Improper Input Validation vulnerability in Google Android 11.0 In DeltaPerformer::Write of delta_performer.cc, there is a possible use of untrusted input due to improper input validation. | 5.5 |
2021-03-10 | CVE-2021-20671 | Improper Input Validation vulnerability in Weseek Growi 4.2.2 Invalid file validation on the upload feature in GROWI versions v4.2.2 allows a remote attacker with administrative privilege to overwrite the files on the server, which may lead to arbitrary code execution. | 7.2 |
2021-03-08 | CVE-2021-21506 | Improper Input Validation vulnerability in Dell EMC Powerscale Onefs 8.1.2/8.2.2/9.1.0 PowerScale OneFS 8.1.2,8.2.2 and 9.1.0 contains an improper input sanitization issue in its API handler. | 8.8 |
2021-03-08 | CVE-2021-26788 | Improper Input Validation vulnerability in Oryx-Embedded Cyclonetcp Oryx Embedded CycloneTCP 1.7.6 to 2.0.0, fixed in 2.0.2, is affected by incorrect input validation, which may cause a denial of service (DoS). | 7.5 |
2021-03-04 | CVE-2021-25339 | Improper Input Validation vulnerability in Google Android 10.0/11.0 Improper address validation in HArx in Samsung mobile devices prior to SMR Mar-2021 Release 1 allows an attacker, given a compromised kernel, to corrupt EL2 memory. | 5.2 |
2021-03-04 | CVE-2021-25334 | Improper Input Validation vulnerability in Google Android 10.0/11.0/9.0 Improper input check in wallpaper service in Samsung mobile devices prior to SMR Feb-2021 Release 1 allows untrusted application to cause permanent denial of service. | 5.5 |
2021-03-04 | CVE-2021-23131 | Improper Input Validation vulnerability in Joomla Joomla! An issue was discovered in Joomla! 3.2.0 through 3.9.24. | 7.5 |
2021-03-03 | CVE-2021-27923 | Improper Input Validation vulnerability in multiple products Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICO container, and thus an attempted memory allocation can be very large. | 7.5 |
2021-03-03 | CVE-2021-27922 | Improper Input Validation vulnerability in multiple products Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICNS container, and thus an attempted memory allocation can be very large. | 7.5 |