Vulnerabilities > Improper Input Validation
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-12-18 | CVE-2020-7838 | Improper Input Validation vulnerability in Onstove Stove 0.0.4.10/0.0.4.71 A arbitrary code execution vulnerability exists in the way that the Stove client improperly validates input value. | 8.8 |
2020-12-17 | CVE-2020-12521 | Improper Input Validation vulnerability in Phoenixcontact Plcnext Firmware On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS a specially crafted LLDP packet may lead to a high system load in the PROFINET stack. | 6.5 |
2020-12-17 | CVE-2020-15293 | Improper Input Validation vulnerability in Bitdefender Hypervisor Introspection 1.132.2 Memory corruption in IntLixCrashDumpDmesg, IntLixTaskFetchCmdLine, IntLixFileReadDentry and IntLixFileGetPath due to insufficient guest-data input validation may lead to denial of service conditions. | 5.5 |
2020-12-17 | CVE-2020-15292 | Improper Input Validation vulnerability in Bitdefender Hypervisor Introspection 1.132.0 Lack of validation on data read from guest memory in IntPeGetDirectory, IntPeParseUnwindData, IntLogExceptionRecord, IntKsymExpandSymbol and IntLixTaskDumpTree may lead to out-of-bounds read or it could cause DoS due to integer-overflor (IntPeGetDirectory), TOCTOU (IntPeParseUnwindData) or insufficient validations. | 5.5 |
2020-12-15 | CVE-2020-25195 | Improper Input Validation vulnerability in Hosteng products The length of the input fields of Host Engineering H0-ECOM100, H2-ECOM100, and H4-ECOM100 modules are verified only on the client side when receiving input from the configuration web server, which may allow an attacker to bypass the check and send input to crash the device. | 7.5 |
2020-12-15 | CVE-2020-0368 | Improper Input Validation vulnerability in Google Android 11.0 In queryInternal of CallLogProvider.java, there is a possible permission bypass due to improper input validation. | 3.3 |
2020-12-11 | CVE-2020-17439 | Improper Input Validation vulnerability in UIP Project UIP 1.0 An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. | 8.3 |
2020-12-11 | CVE-2020-15375 | Improper Input Validation vulnerability in Broadcom Fabric Operating System Brocade Fabric OS versions before v9.0.0, v8.2.2c, v8.2.1e, v8.1.2k, v8.2.0_CBN3, v7.4.2g contain an improper input validation weakness in the command line interface when secccrypptocfg is invoked. | 6.7 |
2020-12-10 | CVE-2020-26270 | Improper Input Validation vulnerability in Google Tensorflow In affected versions of TensorFlow running an LSTM/GRU model where the LSTM/GRU layer receives an input with zero-length results in a CHECK failure when using the CUDA backend. | 3.3 |
2020-12-09 | CVE-2020-27614 | Improper Input Validation vulnerability in Anydesk AnyDesk for macOS versions 6.0.2 and older have a vulnerability in the XPC interface that does not properly validate client requests and allows local privilege escalation. | 7.8 |