Vulnerabilities > Improper Input Validation
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-08-13 | CVE-2020-0555 | Improper Input Validation vulnerability in Intel products Improper input validation for some Intel(R) Wireless Bluetooth(R) products may allow an authenticated user to potentially enable escalation of privilege via local access. | 7.8 |
2020-08-13 | CVE-2020-8742 | Improper Input Validation vulnerability in Intel products Improper input validation in the firmware for Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access. | 6.7 |
2020-08-13 | CVE-2020-8721 | Improper Input Validation vulnerability in Intel products Improper input validation for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access. | 8.2 |
2020-08-13 | CVE-2020-8717 | Improper Input Validation vulnerability in Intel products Improper input validation in a subsystem for some Intel Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable denial of service via local access. | 5.5 |
2020-08-10 | CVE-2020-17479 | Improper Input Validation vulnerability in Json Pattern Validator Project Json Pattern Validator jpv (aka Json Pattern Validator) before 2.2.2 does not properly validate input, as demonstrated by a corrupted array. | 9.8 |
2020-08-07 | CVE-2020-16227 | Improper Input Validation vulnerability in Deltaww Tpeditor Delta Electronics TPEditor Versions 1.97 and prior. | 7.8 |
2020-08-06 | CVE-2020-16215 | Improper Input Validation vulnerability in Advantech Webaccess/Hmi Designer 2.1/2.1.9.31 Advantech WebAccess HMI Designer, Versions 2.1.9.31 and prior. | 7.8 |
2020-08-06 | CVE-2020-7459 | Improper Input Validation vulnerability in Freebsd 11.3/11.4/12.1 In FreeBSD 12.1-STABLE before r362166, 12.1-RELEASE before p8, 11.4-STABLE before r362167, 11.4-RELEASE before p2, and 11.3-RELEASE before p12, missing length validation code common to mulitple USB network drivers allows a malicious USB device to write beyond the end of an allocated network packet buffer. | 6.8 |
2020-08-05 | CVE-2020-8607 | Improper Input Validation vulnerability in Trendmicro products An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. | 6.7 |
2020-08-03 | CVE-2020-5771 | Improper Input Validation vulnerability in Teltonika-Networks Trb245 Firmware 00.02.04.01 Improper Input Validation in Teltonika firmware TRB2_R_00.02.04.01 allows a remote, authenticated attacker to gain root privileges by uploading a malicious backup archive. | 7.5 |