Vulnerabilities > Improper Input Validation
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-12-17 | CVE-2020-15292 | Improper Input Validation vulnerability in Bitdefender Hypervisor Introspection 1.132.0 Lack of validation on data read from guest memory in IntPeGetDirectory, IntPeParseUnwindData, IntLogExceptionRecord, IntKsymExpandSymbol and IntLixTaskDumpTree may lead to out-of-bounds read or it could cause DoS due to integer-overflor (IntPeGetDirectory), TOCTOU (IntPeParseUnwindData) or insufficient validations. | 5.5 |
2020-12-15 | CVE-2020-25195 | Improper Input Validation vulnerability in Hosteng products The length of the input fields of Host Engineering H0-ECOM100, H2-ECOM100, and H4-ECOM100 modules are verified only on the client side when receiving input from the configuration web server, which may allow an attacker to bypass the check and send input to crash the device. | 7.5 |
2020-12-15 | CVE-2020-0368 | Improper Input Validation vulnerability in Google Android 11.0 In queryInternal of CallLogProvider.java, there is a possible permission bypass due to improper input validation. | 3.3 |
2020-12-11 | CVE-2020-17439 | Improper Input Validation vulnerability in UIP Project UIP 1.0 An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. | 8.3 |
2020-12-11 | CVE-2020-15375 | Improper Input Validation vulnerability in Broadcom Fabric Operating System Brocade Fabric OS versions before v9.0.0, v8.2.2c, v8.2.1e, v8.1.2k, v8.2.0_CBN3, v7.4.2g contain an improper input validation weakness in the command line interface when secccrypptocfg is invoked. | 6.7 |
2020-12-10 | CVE-2020-26270 | Improper Input Validation vulnerability in Google Tensorflow In affected versions of TensorFlow running an LSTM/GRU model where the LSTM/GRU layer receives an input with zero-length results in a CHECK failure when using the CUDA backend. | 3.3 |
2020-12-09 | CVE-2020-27614 | Improper Input Validation vulnerability in Anydesk AnyDesk for macOS versions 6.0.2 and older have a vulnerability in the XPC interface that does not properly validate client requests and allows local privilege escalation. | 7.8 |
2020-12-08 | CVE-2020-9977 | Improper Input Validation vulnerability in Apple mac OS X A validation issue existed in the entitlement verification. | 5.5 |
2020-12-03 | CVE-2020-5680 | Improper Input Validation vulnerability in Ec-Cube Improper input validation vulnerability in EC-CUBE versions from 3.0.5 to 3.0.18 allows a remote attacker to cause a denial-of-service (DoS) condition via unspecified vector. | 7.5 |
2020-11-24 | CVE-2020-26890 | Improper Input Validation vulnerability in multiple products Matrix Synapse before 1.20.0 erroneously permits non-standard NaN, Infinity, and -Infinity JSON values in fields of m.room.member events, allowing remote attackers to execute a denial of service attack against the federation and common Matrix clients. | 7.5 |