Vulnerabilities > Improper Input Validation

DATE CVE VULNERABILITY TITLE RISK
2020-02-12 CVE-2013-5106 Improper Input Validation vulnerability in Python-Mode Project Python-Mode 20121219
A Code Execution vulnerability exists in select.py when using python-mode 2012-12-19.
network
low complexity
python-mode-project CWE-20
8.8
2020-02-12 CVE-2020-6192 Improper Input Validation vulnerability in SAP Landscape Management 3.0
SAP Landscape Management, version 3.0, allows an attacker with admin privileges to execute malicious commands with root privileges in SAP Host Agent via SAP Landscape Management.
network
low complexity
sap CWE-20
7.2
2020-02-12 CVE-2020-6191 Improper Input Validation vulnerability in SAP Landscape Management 3.0
SAP Landscape Management, version 3.0, allows an attacker with admin privileges to execute malicious executables with root privileges in SAP Host Agent via SAP Landscape Management due to Missing Input Validation.
network
low complexity
sap CWE-20
7.2
2020-02-12 CVE-2020-6177 Improper Input Validation vulnerability in SAP Mobile Platform 3.0
SAP Mobile Platform, version 3.0, does not sufficiently validate an XML document accepted from an untrusted source which could lead to partial denial of service.
network
low complexity
sap CWE-20
4.3
2020-02-12 CVE-2019-19192 Improper Input Validation vulnerability in ST Bluenrg-2 and Wb55
The Bluetooth Low Energy implementation on STMicroelectronics BLE Stack through 1.3.1 for STM32WB5x devices does not properly handle consecutive Attribute Protocol (ATT) requests on reception, allowing attackers in radio range to cause an event deadlock or crash via crafted packets.
low complexity
st CWE-20
6.5
2020-02-12 CVE-2020-7957 Improper Input Validation vulnerability in multiple products
The IMAP and LMTP components in Dovecot 2.3.9 before 2.3.9.3 mishandle snippet generation when many characters must be read to compute the snippet and a trailing > character exists.
network
low complexity
dovecot fedoraproject CWE-20
5.3
2020-02-12 CVE-2020-8815 Improper Input Validation vulnerability in Iktm Bearftp
Improper connection handling in the base connection handler in IKTeam BearFTP before v0.3.1 allows a remote attacker to achieve denial of service via a Slowloris approach by sending a large volume of small packets.
network
low complexity
iktm CWE-20
7.5
2020-02-12 CVE-2020-2110 Improper Input Validation vulnerability in Jenkins Script Security
Sandbox protection in Jenkins Script Security Plugin 1.69 and earlier could be circumvented during the script compilation phase by applying AST transforming annotations to imports or by using them inside of other annotations.
network
low complexity
jenkins CWE-20
8.8
2020-02-12 CVE-2020-2109 Improper Input Validation vulnerability in Jenkins Pipeline: Groovy
Sandbox protection in Jenkins Pipeline: Groovy Plugin 2.78 and earlier can be circumvented through default parameter expressions in CPS-transformed methods.
network
low complexity
jenkins CWE-20
8.8
2020-02-12 CVE-2014-9390 Improper Input Validation vulnerability in multiple products
Git before 1.8.5.6, 1.9.x before 1.9.5, 2.0.x before 2.0.5, 2.1.x before 2.1.4, and 2.2.x before 2.2.1 on Windows and OS X; Mercurial before 3.2.3 on Windows and OS X; Apple Xcode before 6.2 beta 3; mine all versions before 08-12-2014; libgit2 all versions up to 0.21.2; Egit all versions before 08-12-2014; and JGit all versions before 08-12-2014 allow remote Git servers to execute arbitrary commands via a tree containing a crafted .git/config file with (1) an ignorable Unicode codepoint, (2) a git~1/config representation, or (3) mixed case that is improperly handled on a case-insensitive filesystem.
network
low complexity
git-scm mercurial apple eclipse libgit2 CWE-20
critical
9.8