Vulnerabilities > Improper Input Validation
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-02-10 | CVE-2019-13322 | Improper Input Validation vulnerability in MI Browser This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Xiaomi Browser Prior to 10.4.0. | 8.8 |
2020-02-07 | CVE-2014-5091 | Improper Input Validation vulnerability in Status2K A vulnerability exits in Status2K 2.5 Server Monitoring Software via the multies parameter to includes/functions.php, which could let a malicious user execute arbitrary PHP code. | 9.8 |
2020-02-07 | CVE-2014-5087 | Improper Input Validation vulnerability in multiple products A vulnerability exists in Sphider Search Engine prior to 1.3.6 due to exec calls in admin/spiderfuncs.php, which could let a remote malicious user execute arbitrary code. | 9.8 |
2020-02-07 | CVE-2014-5468 | Improper Input Validation vulnerability in Getrailo Railo A File Inclusion vulnerability exists in Railo 4.2.1 and earlier via a specially-crafted URL request to the thumbnail.cfm to specify a malicious PNG file, which could let a remote malicious user obtain sensitive information or execute arbitrary code. | 8.8 |
2020-02-07 | CVE-2014-7224 | Improper Input Validation vulnerability in Google Android A Code Execution vulnerability exists in Android prior to 4.4.0 related to the addJavascriptInterface method and the accessibility and accessibilityTraversal objects, which could let a remote malicious user execute arbitrary code. | 8.8 |
2020-02-06 | CVE-2019-16152 | Improper Input Validation vulnerability in Fortinet Forticlient A Denial of service (DoS) vulnerability in FortiClient for Linux 6.2.1 and below may allow an user with low privilege to cause FortiClient processes running under root privilege crashes via sending specially crafted IPC client requests to the fctsched process due the nanomsg not been correctly validated. | 6.5 |
2020-02-05 | CVE-2011-0220 | Improper Input Validation vulnerability in Apple Bonjour Apple Bonjour before 2011 allows a crash via a crafted multicast DNS packet. | 5.5 |
2020-02-05 | CVE-2010-4815 | Improper Input Validation vulnerability in Coppermine-Gallery Coppermine Gallery Coppermine gallery before 1.4.26 has an input validation vulnerability that allows for code execution. | 9.8 |
2020-02-05 | CVE-2020-3111 | Improper Input Validation vulnerability in Cisco products A vulnerability in the Cisco Discovery Protocol implementation for the Cisco IP Phone could allow an unauthenticated, adjacent attacker to remotely execute code with root privileges or cause a reload of an affected IP phone. | 8.8 |
2020-02-05 | CVE-2020-3110 | Improper Input Validation vulnerability in Cisco products A vulnerability in the Cisco Discovery Protocol implementation for the Cisco Video Surveillance 8000 Series IP Cameras could allow an unauthenticated, adjacent attacker to execute code remotely or cause a reload of an affected IP Camera. | 8.8 |