Vulnerabilities > Improper Input Validation
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2019-12-18 | CVE-2019-7292 | Improper Input Validation vulnerability in Apple products A validation issue was addressed with improved logic. | 6.5 |
2019-12-17 | CVE-2014-8179 | Improper Input Validation vulnerability in multiple products Docker Engine before 1.8.3 and CS Docker Engine before 1.6.2-CS7 does not properly validate and extract the manifest object from its JSON representation during a pull, which allows attackers to inject new attributes in a JSON object and bypass pull-by-digest validation. | 7.5 |
2019-12-17 | CVE-2014-8178 | Improper Input Validation vulnerability in multiple products Docker Engine before 1.8.3 and CS Docker Engine before 1.6.2-CS7 do not use a globally unique identifier to store image layers, which makes it easier for attackers to poison the image cache via a crafted image in pull or push commands. | 5.5 |
2019-12-16 | CVE-2019-14609 | Improper Input Validation vulnerability in Intel products Improper input validation in firmware for Intel(R) NUC(R) may allow a privileged user to potentially enable escalation of privilege via local access. | 6.7 |
2019-12-13 | CVE-2019-5260 | Improper Input Validation vulnerability in Huawei View 20 Firmware and Y9 2019 Firmware Huawei smartphones HUAWEI Y9 2019 and Honor View 20 have a denial of service vulnerability. | 6.5 |
2019-12-12 | CVE-2019-13932 | Improper Input Validation vulnerability in Siemens XHQ 6.0.0.0 A vulnerability has been identified in XHQ (All versions < V6.0.0.2). | 9.1 |
2019-12-11 | CVE-2014-0091 | Improper Input Validation vulnerability in Theforeman Foreman Foreman has improper input validation which could lead to partial Denial of Service | 5.3 |
2019-12-11 | CVE-2013-4245 | Improper Input Validation vulnerability in multiple products Orca has arbitrary code execution due to insecure Python module load | 7.3 |
2019-12-10 | CVE-2019-1484 | Improper Input Validation vulnerability in Microsoft products A remote code execution vulnerability exists when Microsoft Windows OLE fails to properly validate user input, aka 'Windows OLE Remote Code Execution Vulnerability'. | 7.8 |
2019-12-10 | CVE-2019-1471 | Improper Input Validation vulnerability in Microsoft products A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system, aka 'Windows Hyper-V Remote Code Execution Vulnerability'. | 8.2 |