Vulnerabilities > Improper Input Validation

DATE CVE VULNERABILITY TITLE RISK
2020-12-18 CVE-2020-7838 Improper Input Validation vulnerability in Onstove Stove 0.0.4.10/0.0.4.71
A arbitrary code execution vulnerability exists in the way that the Stove client improperly validates input value.
network
low complexity
onstove CWE-20
8.8
2020-12-17 CVE-2020-12521 Improper Input Validation vulnerability in Phoenixcontact Plcnext Firmware
On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS a specially crafted LLDP packet may lead to a high system load in the PROFINET stack.
low complexity
phoenixcontact CWE-20
6.5
2020-12-17 CVE-2020-15293 Improper Input Validation vulnerability in Bitdefender Hypervisor Introspection 1.132.2
Memory corruption in IntLixCrashDumpDmesg, IntLixTaskFetchCmdLine, IntLixFileReadDentry and IntLixFileGetPath due to insufficient guest-data input validation may lead to denial of service conditions.
local
low complexity
bitdefender CWE-20
5.5
2020-12-17 CVE-2020-15292 Improper Input Validation vulnerability in Bitdefender Hypervisor Introspection 1.132.0
Lack of validation on data read from guest memory in IntPeGetDirectory, IntPeParseUnwindData, IntLogExceptionRecord, IntKsymExpandSymbol and IntLixTaskDumpTree may lead to out-of-bounds read or it could cause DoS due to integer-overflor (IntPeGetDirectory), TOCTOU (IntPeParseUnwindData) or insufficient validations.
local
low complexity
bitdefender CWE-20
5.5
2020-12-15 CVE-2020-25195 Improper Input Validation vulnerability in Hosteng products
The length of the input fields of Host Engineering H0-ECOM100, H2-ECOM100, and H4-ECOM100 modules are verified only on the client side when receiving input from the configuration web server, which may allow an attacker to bypass the check and send input to crash the device.
network
low complexity
hosteng CWE-20
7.5
2020-12-15 CVE-2020-0368 Improper Input Validation vulnerability in Google Android 11.0
In queryInternal of CallLogProvider.java, there is a possible permission bypass due to improper input validation.
local
low complexity
google CWE-20
3.3
2020-12-11 CVE-2020-17439 Improper Input Validation vulnerability in UIP Project UIP 1.0
An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products.
network
low complexity
uip-project CWE-20
8.3
2020-12-11 CVE-2020-15375 Improper Input Validation vulnerability in Broadcom Fabric Operating System
Brocade Fabric OS versions before v9.0.0, v8.2.2c, v8.2.1e, v8.1.2k, v8.2.0_CBN3, v7.4.2g contain an improper input validation weakness in the command line interface when secccrypptocfg is invoked.
local
low complexity
broadcom CWE-20
6.7
2020-12-10 CVE-2020-26270 Improper Input Validation vulnerability in Google Tensorflow
In affected versions of TensorFlow running an LSTM/GRU model where the LSTM/GRU layer receives an input with zero-length results in a CHECK failure when using the CUDA backend.
local
low complexity
google CWE-20
3.3
2020-12-09 CVE-2020-27614 Improper Input Validation vulnerability in Anydesk
AnyDesk for macOS versions 6.0.2 and older have a vulnerability in the XPC interface that does not properly validate client requests and allows local privilege escalation.
local
low complexity
anydesk CWE-20
7.8