Vulnerabilities > Improper Input Validation

DATE CVE VULNERABILITY TITLE RISK
2020-02-10 CVE-2019-13322 Improper Input Validation vulnerability in MI Browser
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Xiaomi Browser Prior to 10.4.0.
network
low complexity
mi CWE-20
8.8
2020-02-07 CVE-2014-5091 Improper Input Validation vulnerability in Status2K
A vulnerability exits in Status2K 2.5 Server Monitoring Software via the multies parameter to includes/functions.php, which could let a malicious user execute arbitrary PHP code.
network
low complexity
status2k CWE-20
critical
9.8
2020-02-07 CVE-2014-5087 Improper Input Validation vulnerability in multiple products
A vulnerability exists in Sphider Search Engine prior to 1.3.6 due to exec calls in admin/spiderfuncs.php, which could let a remote malicious user execute arbitrary code.
network
low complexity
sphider sphider-plus sphiderpro CWE-20
critical
9.8
2020-02-07 CVE-2014-5468 Improper Input Validation vulnerability in Getrailo Railo
A File Inclusion vulnerability exists in Railo 4.2.1 and earlier via a specially-crafted URL request to the thumbnail.cfm to specify a malicious PNG file, which could let a remote malicious user obtain sensitive information or execute arbitrary code.
network
low complexity
getrailo CWE-20
8.8
2020-02-07 CVE-2014-7224 Improper Input Validation vulnerability in Google Android
A Code Execution vulnerability exists in Android prior to 4.4.0 related to the addJavascriptInterface method and the accessibility and accessibilityTraversal objects, which could let a remote malicious user execute arbitrary code.
network
low complexity
google CWE-20
8.8
2020-02-06 CVE-2019-16152 Improper Input Validation vulnerability in Fortinet Forticlient
A Denial of service (DoS) vulnerability in FortiClient for Linux 6.2.1 and below may allow an user with low privilege to cause FortiClient processes running under root privilege crashes via sending specially crafted IPC client requests to the fctsched process due the nanomsg not been correctly validated.
network
low complexity
fortinet CWE-20
6.5
2020-02-05 CVE-2011-0220 Improper Input Validation vulnerability in Apple Bonjour
Apple Bonjour before 2011 allows a crash via a crafted multicast DNS packet.
local
low complexity
apple CWE-20
5.5
2020-02-05 CVE-2010-4815 Improper Input Validation vulnerability in Coppermine-Gallery Coppermine Gallery
Coppermine gallery before 1.4.26 has an input validation vulnerability that allows for code execution.
network
low complexity
coppermine-gallery CWE-20
critical
9.8
2020-02-05 CVE-2020-3111 Improper Input Validation vulnerability in Cisco products
A vulnerability in the Cisco Discovery Protocol implementation for the Cisco IP Phone could allow an unauthenticated, adjacent attacker to remotely execute code with root privileges or cause a reload of an affected IP phone.
low complexity
cisco CWE-20
8.8
2020-02-05 CVE-2020-3110 Improper Input Validation vulnerability in Cisco products
A vulnerability in the Cisco Discovery Protocol implementation for the Cisco Video Surveillance 8000 Series IP Cameras could allow an unauthenticated, adjacent attacker to execute code remotely or cause a reload of an affected IP Camera.
low complexity
cisco CWE-20
8.8