Vulnerabilities > Improper Input Validation

DATE CVE VULNERABILITY TITLE RISK
2021-03-12 CVE-2021-21726 Improper Input Validation vulnerability in ZTE products
Some ZTE products have an input verification vulnerability in the diagnostic function interface.
local
low complexity
zte CWE-20
2.3
2021-03-10 CVE-2021-0377 Improper Input Validation vulnerability in Google Android 11.0
In DeltaPerformer::Write of delta_performer.cc, there is a possible use of untrusted input due to improper input validation.
local
low complexity
google CWE-20
5.5
2021-03-10 CVE-2021-20671 Improper Input Validation vulnerability in Weseek Growi 4.2.2
Invalid file validation on the upload feature in GROWI versions v4.2.2 allows a remote attacker with administrative privilege to overwrite the files on the server, which may lead to arbitrary code execution.
network
low complexity
weseek CWE-20
7.2
2021-03-08 CVE-2021-21506 Improper Input Validation vulnerability in Dell EMC Powerscale Onefs 8.1.2/8.2.2/9.1.0
PowerScale OneFS 8.1.2,8.2.2 and 9.1.0 contains an improper input sanitization issue in its API handler.
network
low complexity
dell CWE-20
8.8
2021-03-08 CVE-2021-26788 Improper Input Validation vulnerability in Oryx-Embedded Cyclonetcp
Oryx Embedded CycloneTCP 1.7.6 to 2.0.0, fixed in 2.0.2, is affected by incorrect input validation, which may cause a denial of service (DoS).
network
low complexity
oryx-embedded CWE-20
7.5
2021-03-04 CVE-2021-25339 Improper Input Validation vulnerability in Google Android 10.0/11.0
Improper address validation in HArx in Samsung mobile devices prior to SMR Mar-2021 Release 1 allows an attacker, given a compromised kernel, to corrupt EL2 memory.
low complexity
google CWE-20
5.2
2021-03-04 CVE-2021-25334 Improper Input Validation vulnerability in Google Android 10.0/11.0/9.0
Improper input check in wallpaper service in Samsung mobile devices prior to SMR Feb-2021 Release 1 allows untrusted application to cause permanent denial of service.
local
low complexity
google CWE-20
5.5
2021-03-04 CVE-2021-23131 Improper Input Validation vulnerability in Joomla Joomla!
An issue was discovered in Joomla! 3.2.0 through 3.9.24.
network
low complexity
joomla CWE-20
7.5
2021-03-03 CVE-2021-27923 Improper Input Validation vulnerability in multiple products
Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICO container, and thus an attempted memory allocation can be very large.
network
low complexity
python fedoraproject CWE-20
7.5
2021-03-03 CVE-2021-27922 Improper Input Validation vulnerability in multiple products
Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICNS container, and thus an attempted memory allocation can be very large.
network
low complexity
python fedoraproject CWE-20
7.5