Vulnerabilities > Improper Input Validation
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-02-09 | CVE-2023-21446 | Improper Input Validation vulnerability in Samsung Android 11.0/12.0 Improper input validation in MyFiles prior to version 12.2.09 in Android R(11), 13.1.03.501 in Android S( 12) and 14.1.00.422 in Android T(13) allows local attacker to access data of MyFiles. | 5.5 |
2023-02-08 | CVE-2022-38778 | Improper Input Validation vulnerability in multiple products A flaw (CVE-2022-38900) was discovered in one of Kibana’s third party dependencies, that could allow an authenticated user to perform a request that crashes the Kibana server process. | 6.5 |
2023-02-08 | CVE-2022-34350 | Improper Input Validation vulnerability in IBM API Connect IBM API Connect 10.0.0.0 through 10.0.5.0, 10.0.1.0 through 10.0.1.7, and 2018.4.1.0 through 2018.4.1.20 is vulnerable to External Service Interaction attack, caused by improper validation of user-supplied input. | 7.5 |
2023-02-06 | CVE-2023-20606 | Improper Input Validation vulnerability in Google Android 12.0/12.1 In apusys, there is a possible out of bounds read due to a missing bounds check. | 4.4 |
2023-02-06 | CVE-2023-20612 | Improper Input Validation vulnerability in Google Android 11.0/12.0/13.0 In ril, there is a possible out of bounds write due to a missing bounds check. | 6.7 |
2023-02-06 | CVE-2023-20613 | Improper Input Validation vulnerability in Google Android 11.0/12.0/13.0 In ril, there is a possible out of bounds write due to a missing bounds check. | 6.7 |
2023-02-01 | CVE-2022-32482 | Improper Input Validation vulnerability in Dell products Dell BIOS contains an improper input validation vulnerability. | 5.1 |
2023-02-01 | CVE-2022-34443 | Improper Input Validation vulnerability in Dell Rugged Control Center Dell Rugged Control Center, versions prior to 4.5, contain an Improper Input Validation in the Service EndPoint. | 7.8 |
2023-01-26 | CVE-2023-0284 | Improper Input Validation vulnerability in multiple products Improper Input Validation of LDAP user IDs in Tribe29 Checkmk allows attackers that can control LDAP user IDs to manipulate files on the server. | 8.1 |
2023-01-26 | CVE-2023-24493 | Improper Input Validation vulnerability in Tenable Tenable.Sc A formula injection vulnerability exists in Tenable.sc due to improper validation of user-supplied input before returning it to users. | 5.7 |