Vulnerabilities > Improper Input Validation

DATE CVE VULNERABILITY TITLE RISK
2021-03-04 CVE-2021-25339 Improper Input Validation vulnerability in Google Android 10.0/11.0
Improper address validation in HArx in Samsung mobile devices prior to SMR Mar-2021 Release 1 allows an attacker, given a compromised kernel, to corrupt EL2 memory.
low complexity
google CWE-20
5.2
2021-03-04 CVE-2021-25334 Improper Input Validation vulnerability in Google Android 10.0/11.0/9.0
Improper input check in wallpaper service in Samsung mobile devices prior to SMR Feb-2021 Release 1 allows untrusted application to cause permanent denial of service.
local
low complexity
google CWE-20
5.5
2021-03-04 CVE-2021-23131 Improper Input Validation vulnerability in Joomla Joomla!
An issue was discovered in Joomla! 3.2.0 through 3.9.24.
network
low complexity
joomla CWE-20
7.5
2021-03-03 CVE-2021-27923 Improper Input Validation vulnerability in multiple products
Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICO container, and thus an attempted memory allocation can be very large.
network
low complexity
python fedoraproject CWE-20
7.5
2021-03-03 CVE-2021-27922 Improper Input Validation vulnerability in multiple products
Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICNS container, and thus an attempted memory allocation can be very large.
network
low complexity
python fedoraproject CWE-20
7.5
2021-03-03 CVE-2021-27921 Improper Input Validation vulnerability in multiple products
Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for a BLP container, and thus an attempted memory allocation can be very large.
network
low complexity
python fedoraproject CWE-20
7.5
2021-03-01 CVE-2018-25004 Improper Input Validation vulnerability in Mongodb
A user authorized to performing a specific type of query may trigger a denial of service by issuing a generic explain command on a find query.
network
low complexity
mongodb CWE-20
4.9
2021-02-26 CVE-2021-0404 Improper Input Validation vulnerability in Google Android 11.0
In mobile_log_d, there is a possible information disclosure due to improper input validation.
local
low complexity
google CWE-20
4.4
2021-02-22 CVE-2020-11194 Improper Input Validation vulnerability in Qualcomm products
Possible out of bound access in TA while processing a command from NS side due to improper length check of response buffer in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking
local
low complexity
qualcomm CWE-20
7.8
2021-02-17 CVE-2020-7849 Improper Input Validation vulnerability in Uprism Curix 1.3.6
A vulnerability of uPrism.io CURIX(Video conferecing solution) could allow an unauthenticated attacker to execute arbitrary code.
network
low complexity
uprism CWE-20
8.8