Vulnerabilities > Improper Input Validation
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-05-26 | CVE-2020-12389 | Improper Input Validation vulnerability in Mozilla Firefox The Firefox content processes did not sufficiently lockdown access control which could result in a sandbox escape. | 10.0 |
2020-05-26 | CVE-2020-12388 | Improper Input Validation vulnerability in Mozilla Firefox The Firefox content processes did not sufficiently lockdown access control which could result in a sandbox escape. | 10.0 |
2020-05-25 | CVE-2020-5537 | Improper Input Validation vulnerability in Cybozu Desktop Cybozu Desktop for Windows 2.0.23 to 2.2.40 allows remote code execution via unspecified vectors. | 9.8 |
2020-05-22 | CVE-2020-3314 | Improper Input Validation vulnerability in Cisco Advanced Malware Protection for Endpoints A vulnerability in the file scan process of Cisco AMP for Endpoints Mac Connector Software could cause the scan engine to crash during the scan of local files, resulting in a restart of the AMP Connector and a denial of service (DoS) condition of the Cisco AMP for Endpoints service. | 6.1 |
2020-05-22 | CVE-2020-3272 | Improper Input Validation vulnerability in Cisco Prime Network Registrar A vulnerability in the DHCP server of Cisco Prime Network Registrar could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. | 7.5 |
2020-05-21 | CVE-2020-1195 | Improper Input Validation vulnerability in Microsoft Edge An elevation of privilege vulnerability exists in Microsoft Edge (Chromium-based) when the Feedback extension improperly validates input, aka 'Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability'. | 5.9 |
2020-05-21 | CVE-2020-1173 | Improper Input Validation vulnerability in Microsoft Power BI Report Server A spoofing vulnerability exists in Microsoft Power BI Report Server in the way it validates the content-type of uploaded attachments, aka 'Microsoft Power BI Report Server Spoofing Vulnerability'. | 6.8 |
2020-05-21 | CVE-2020-1084 | Improper Input Validation vulnerability in Microsoft products A Denial Of Service vulnerability exists when Connected User Experiences and Telemetry Service fails to validate certain function values.An attacker who successfully exploited this vulnerability could deny dependent security feature functionality.To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application.The security update addresses the vulnerability by correcting how the Connected User Experiences and Telemetry Service validates certain function values., aka 'Connected User Experiences and Telemetry Service Denial of Service Vulnerability'. | 5.5 |
2020-05-21 | CVE-2020-1081 | Improper Input Validation vulnerability in Microsoft products An elevation of privilege vulnerability exists when the Windows Printer Service improperly validates file paths while loading printer drivers, aka 'Windows Printer Service Elevation of Privilege Vulnerability'. | 7.8 |
2020-05-21 | CVE-2020-10738 | Improper Input Validation vulnerability in Moodle A flaw was found in Moodle versions 3.8 before 3.8.3, 3.7 before 3.7.6, 3.6 before 3.6.10, 3.5 before 3.5.12 and earlier unsupported versions. | 8.8 |