Vulnerabilities > Improper Input Validation

DATE CVE VULNERABILITY TITLE RISK
2019-12-18 CVE-2019-7292 Improper Input Validation vulnerability in Apple products
A validation issue was addressed with improved logic.
network
low complexity
apple CWE-20
6.5
2019-12-17 CVE-2014-8179 Improper Input Validation vulnerability in multiple products
Docker Engine before 1.8.3 and CS Docker Engine before 1.6.2-CS7 does not properly validate and extract the manifest object from its JSON representation during a pull, which allows attackers to inject new attributes in a JSON object and bypass pull-by-digest validation.
network
low complexity
docker opensuse CWE-20
7.5
2019-12-17 CVE-2014-8178 Improper Input Validation vulnerability in multiple products
Docker Engine before 1.8.3 and CS Docker Engine before 1.6.2-CS7 do not use a globally unique identifier to store image layers, which makes it easier for attackers to poison the image cache via a crafted image in pull or push commands.
local
low complexity
docker opensuse CWE-20
5.5
2019-12-16 CVE-2019-14609 Improper Input Validation vulnerability in Intel products
Improper input validation in firmware for Intel(R) NUC(R) may allow a privileged user to potentially enable escalation of privilege via local access.
local
low complexity
intel CWE-20
6.7
2019-12-13 CVE-2019-5260 Improper Input Validation vulnerability in Huawei View 20 Firmware and Y9 2019 Firmware
Huawei smartphones HUAWEI Y9 2019 and Honor View 20 have a denial of service vulnerability.
low complexity
huawei CWE-20
6.5
2019-12-12 CVE-2019-13932 Improper Input Validation vulnerability in Siemens XHQ 6.0.0.0
A vulnerability has been identified in XHQ (All versions < V6.0.0.2).
network
low complexity
siemens CWE-20
critical
9.1
2019-12-11 CVE-2014-0091 Improper Input Validation vulnerability in Theforeman Foreman
Foreman has improper input validation which could lead to partial Denial of Service
network
low complexity
theforeman CWE-20
5.3
2019-12-11 CVE-2013-4245 Improper Input Validation vulnerability in multiple products
Orca has arbitrary code execution due to insecure Python module load
local
low complexity
gnome debian CWE-20
7.3
2019-12-10 CVE-2019-1484 Improper Input Validation vulnerability in Microsoft products
A remote code execution vulnerability exists when Microsoft Windows OLE fails to properly validate user input, aka 'Windows OLE Remote Code Execution Vulnerability'.
local
low complexity
microsoft CWE-20
7.8
2019-12-10 CVE-2019-1471 Improper Input Validation vulnerability in Microsoft products
A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system, aka 'Windows Hyper-V Remote Code Execution Vulnerability'.
local
low complexity
microsoft CWE-20
8.2