Vulnerabilities > Improper Input Validation
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-11-03 | CVE-2022-39376 | Improper Input Validation vulnerability in Glpi-Project Glpi GLPI stands for Gestionnaire Libre de Parc Informatique. | 6.5 |
2022-11-01 | CVE-2022-3656 | Improper Input Validation vulnerability in Google Chrome Insufficient data validation in File System in Google Chrome prior to 107.0.5304.62 allowed a remote attacker to bypass file system restrictions via a crafted HTML page. | 8.8 |
2022-11-01 | CVE-2022-3661 | Improper Input Validation vulnerability in Google Chrome Insufficient data validation in Extensions in Google Chrome prior to 107.0.5304.62 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted Chrome extension. | 4.3 |
2022-11-01 | CVE-2022-22658 | Improper Input Validation vulnerability in Apple Iphone OS An input validation issue was addressed with improved input validation. | 6.5 |
2022-11-01 | CVE-2022-3444 | Improper Input Validation vulnerability in Google Chrome Insufficient data validation in File System API in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to bypass File System restrictions via a crafted HTML page and malicious file. | 4.3 |
2022-10-27 | CVE-2022-0073 | Improper Input Validation vulnerability in Litespeedtech Openlitespeed Improper Input Validation vulnerability in LiteSpeed Technologies OpenLiteSpeed Web Server and LiteSpeed Web Server dashboards allows Command Injection. | 8.8 |
2022-10-26 | CVE-2022-20822 | Improper Input Validation vulnerability in Cisco Identity Services Engine 3.1/3.2 A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to read and delete files on an affected device. | 8.1 |
2022-10-25 | CVE-2022-33178 | Improper Input Validation vulnerability in Broadcom Fabric Operating System A vulnerability in the radius authentication system of Brocade Fabric OS before Brocade Fabric OS 9.0 could allow a remote attacker to execute arbitrary code on the Brocade switch. | 7.2 |
2022-10-24 | CVE-2021-44769 | Improper Input Validation vulnerability in Lannerinc Iac-Ast2500A Firmware 1.10.0 An improper input validation vulnerability in the TLS certificate generation function allows an attacker to cause a Denial-of-Service (DoS) condition which can only be reverted via a factory reset. | 6.5 |
2022-10-19 | CVE-2022-1414 | Improper Input Validation vulnerability in Redhat 3Scale API Management 2.0 3scale API Management 2 does not perform adequate sanitation for user input in multiple fields. | 8.8 |