Vulnerabilities > Improper Input Validation

DATE CVE VULNERABILITY TITLE RISK
2020-05-26 CVE-2020-12389 Improper Input Validation vulnerability in Mozilla Firefox
The Firefox content processes did not sufficiently lockdown access control which could result in a sandbox escape.
network
low complexity
mozilla CWE-20
critical
10.0
2020-05-26 CVE-2020-12388 Improper Input Validation vulnerability in Mozilla Firefox
The Firefox content processes did not sufficiently lockdown access control which could result in a sandbox escape.
network
low complexity
mozilla CWE-20
critical
10.0
2020-05-25 CVE-2020-5537 Improper Input Validation vulnerability in Cybozu Desktop
Cybozu Desktop for Windows 2.0.23 to 2.2.40 allows remote code execution via unspecified vectors.
network
low complexity
cybozu CWE-20
critical
9.8
2020-05-22 CVE-2020-3314 Improper Input Validation vulnerability in Cisco Advanced Malware Protection for Endpoints
A vulnerability in the file scan process of Cisco AMP for Endpoints Mac Connector Software could cause the scan engine to crash during the scan of local files, resulting in a restart of the AMP Connector and a denial of service (DoS) condition of the Cisco AMP for Endpoints service.
local
low complexity
cisco CWE-20
6.1
2020-05-22 CVE-2020-3272 Improper Input Validation vulnerability in Cisco Prime Network Registrar
A vulnerability in the DHCP server of Cisco Prime Network Registrar could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
network
low complexity
cisco CWE-20
7.5
2020-05-21 CVE-2020-1195 Improper Input Validation vulnerability in Microsoft Edge
An elevation of privilege vulnerability exists in Microsoft Edge (Chromium-based) when the Feedback extension improperly validates input, aka 'Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability'.
network
high complexity
microsoft CWE-20
5.9
2020-05-21 CVE-2020-1173 Improper Input Validation vulnerability in Microsoft Power BI Report Server
A spoofing vulnerability exists in Microsoft Power BI Report Server in the way it validates the content-type of uploaded attachments, aka 'Microsoft Power BI Report Server Spoofing Vulnerability'.
network
low complexity
microsoft CWE-20
6.8
2020-05-21 CVE-2020-1084 Improper Input Validation vulnerability in Microsoft products
A Denial Of Service vulnerability exists when Connected User Experiences and Telemetry Service fails to validate certain function values.An attacker who successfully exploited this vulnerability could deny dependent security feature functionality.To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application.The security update addresses the vulnerability by correcting how the Connected User Experiences and Telemetry Service validates certain function values., aka 'Connected User Experiences and Telemetry Service Denial of Service Vulnerability'.
local
low complexity
microsoft CWE-20
5.5
2020-05-21 CVE-2020-1081 Improper Input Validation vulnerability in Microsoft products
An elevation of privilege vulnerability exists when the Windows Printer Service improperly validates file paths while loading printer drivers, aka 'Windows Printer Service Elevation of Privilege Vulnerability'.
local
low complexity
microsoft CWE-20
7.8
2020-05-21 CVE-2020-10738 Improper Input Validation vulnerability in Moodle
A flaw was found in Moodle versions 3.8 before 3.8.3, 3.7 before 3.7.6, 3.6 before 3.6.10, 3.5 before 3.5.12 and earlier unsupported versions.
network
low complexity
moodle CWE-20
8.8