Vulnerabilities > Improper Input Validation
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-08-08 | CVE-2023-21647 | Improper Input Validation vulnerability in Qualcomm products Information disclosure in Bluetooth when an GATT packet is received due to improper input validation. | 6.5 |
2023-08-07 | CVE-2023-27373 | Improper Input Validation vulnerability in Insyde Insydeh2O An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. | 5.5 |
2023-07-29 | CVE-2022-4911 | Improper Input Validation vulnerability in Google Chrome Insufficient data validation in DevTools in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to bypass content security policy via a crafted HTML page. | 6.5 |
2023-07-29 | CVE-2022-4925 | Improper Input Validation vulnerability in Google Chrome Insufficient validation of untrusted input in QUIC in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to perform header splitting via malicious network traffic. | 6.5 |
2023-07-26 | CVE-2022-43713 | Improper Input Validation vulnerability in Gxsoftware Xperiencentral Interactive Forms (IAF) in GX Software XperienCentral versions 10.33.1 until 10.35.0 was vulnerable to invalid data input because form validation could be bypassed. | 7.5 |
2023-07-26 | CVE-2022-2502 | Improper Input Validation vulnerability in Hitachienergy Rtu500 Firmware A vulnerability exists in the HCI IEC 60870-5-104 function included in certain versions of the RTU500 series product. | 7.5 |
2023-07-19 | CVE-2022-43908 | Improper Input Validation vulnerability in IBM Security Guardium 11.3 IBM Security Guardium 11.3 could allow an authenticated user to cause a denial of service due to improper input validation. | 6.5 |
2023-07-13 | CVE-2023-21251 | Improper Input Validation vulnerability in Google Android In onCreate of ConfirmDialog.java, there is a possible way to connect to VNP bypassing user's consent due to improper input validation. | 7.3 |
2023-07-12 | CVE-2023-37948 | Improper Input Validation vulnerability in Jenkins Cloud Infrastructure Compute Jenkins Oracle Cloud Infrastructure Compute Plugin 1.0.16 and earlier does not validate SSH host keys when connecting OCI clouds, enabling man-in-the-middle attacks. | 3.7 |
2023-07-06 | CVE-2023-37241 | Improper Input Validation vulnerability in Huawei Emui and Harmonyos Input verification vulnerability in the WMS API. | 7.5 |