Vulnerabilities > Improper Input Validation

DATE CVE VULNERABILITY TITLE RISK
2020-10-06 CVE-2020-24807 Improper Input Validation vulnerability in Socket.Io-File Project Socket.Io-File
The socket.io-file package through 2.0.31 for Node.js relies on client-side validation of file types, which allows remote attackers to execute arbitrary code by uploading an executable file via a modified JSON name field.
local
low complexity
socket-io-file-project CWE-20
7.8
2020-10-02 CVE-2020-5986 Improper Input Validation vulnerability in Nvidia Virtual GPU Manager
NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin, in which an input data size is not validated, which may lead to tampering or denial of service.
local
low complexity
nvidia CWE-20
5.5
2020-10-02 CVE-2020-5985 Improper Input Validation vulnerability in Nvidia Virtual GPU Manager
NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin, in which an input data length is not validated, which may lead to tampering or denial of service.
local
low complexity
nvidia CWE-20
7.1
2020-09-30 CVE-2020-15731 Improper Input Validation vulnerability in Bitdefender Engines 7.84063/7.84892/7.84897
An improper Input Validation vulnerability in the code handling file renaming and recovery in Bitdefender Engines allows an attacker to write an arbitrary file in a location hardcoded in a specially-crafted malicious file name.
local
low complexity
bitdefender CWE-20
3.6
2020-09-29 CVE-2020-4607 Improper Input Validation vulnerability in IBM Security Verify Privilege Vault Remote On-Premises 1.3.2
IBM Security Secret Server (IBM Security Verify Privilege Vault Remote 1.2 ) could allow a local user to bypass security restrictions due to improper input validation.
local
low complexity
ibm CWE-20
7.8
2020-09-25 CVE-2020-15199 Improper Input Validation vulnerability in Google Tensorflow 2.3.0
In Tensorflow before version 2.3.1, the `RaggedCountSparseOutput` does not validate that the input arguments form a valid ragged tensor.
network
high complexity
google CWE-20
5.9
2020-09-25 CVE-2020-15192 Improper Input Validation vulnerability in multiple products
In Tensorflow before versions 2.2.1 and 2.3.1, if a user passes a list of strings to `dlpack.to_dlpack` there is a memory leak following an expected validation failure.
network
low complexity
google opensuse CWE-20
4.3
2020-09-25 CVE-2019-7178 Improper Input Validation vulnerability in Pexip Infinity
Pexip Infinity before 20.1 allows privilege escalation by restoring a system backup.
network
low complexity
pexip CWE-20
7.2
2020-09-25 CVE-2020-24692 Improper Input Validation vulnerability in Mitel Micontact Center Business
The Ignite portal in Mitel MiContact Center Business before 9.3.0.0 could allow an attacker to execute arbitrary scripts due to insufficient input validation, aka XSS.
local
low complexity
mitel CWE-20
7.1
2020-09-25 CVE-2020-24615 Improper Input Validation vulnerability in Pexip Infinity
Pexip Infinity before 24.1 has Improper Input Validation, leading to temporary denial of service via SIP.
network
low complexity
pexip CWE-20
5.3