Vulnerabilities > Improper Input Validation

DATE CVE VULNERABILITY TITLE RISK
2017-09-20 CVE-2017-14604 Improper Input Validation vulnerability in multiple products
GNOME Nautilus before 3.23.90 allows attackers to spoof a file type by using the .desktop file extension, as demonstrated by an attack in which a .desktop file's Name field ends in .pdf but this file's Exec field launches a malicious "sh -c" command.
network
low complexity
gnome debian CWE-20
6.5
2017-09-19 CVE-2017-6315 Improper Input Validation vulnerability in Sophos Astaro Security Gateway Firmware 7.500/7.506
Astaro Security Gateway (aka ASG) 7 allows remote attackers to execute arbitrary code via a crafted request to index.plx.
network
low complexity
sophos CWE-20
critical
9.8
2017-09-19 CVE-2017-10700 Improper Input Validation vulnerability in Qnap QTS 4.3.3.0229
In the medialibrary component in QNAP NAS 4.3.3.0229, an un-authenticated, remote attacker can execute arbitrary system commands as the root user of the NAS application.
network
low complexity
qnap CWE-20
critical
9.8
2017-09-19 CVE-2015-3419 Improper Input Validation vulnerability in Vbulletin
vBulletin 5.x through 5.1.6 allows remote authenticated users to bypass authorization checks and inject private messages into conversations via vectors related to an input validation failure.
network
low complexity
vbulletin CWE-20
6.5
2017-09-19 CVE-2014-5362 Improper Input Validation vulnerability in Landesk Management Suite 8.7/8.8/9.6
The admin interface in Landesk Management Suite 9.6 and earlier allows remote attackers to conduct remote file inclusion attacks involving ASPX pages from third-party sites via the d parameter to (1) ldms/sm_actionfrm.asp or (2) remote/frm_coremainfrm.aspx; or the (3) top parameter to remote/frm_splitfrm.aspx.
network
low complexity
landesk CWE-20
7.2
2017-09-18 CVE-2017-9333 Improper Input Validation vulnerability in Openwebif Project Openwebif 1.2.5
OpenWebif 1.2.5 allows remote code execution via a URL to the CallOPKG function in the IpkgController class in plugin/controllers/ipkg.py, when the URL refers to an attacker-controlled web site with a Trojan horse package.
network
low complexity
openwebif-project CWE-20
8.8
2017-09-17 CVE-2017-14520 Improper Input Validation vulnerability in Freedesktop Poppler 0.59.0
In Poppler 0.59.0, a floating point exception occurs in Splash::scaleImageYuXd() in Splash.cc, which may lead to a potential attack when handling malicious PDF files.
local
low complexity
freedesktop CWE-20
7.8
2017-09-17 CVE-2017-14518 Improper Input Validation vulnerability in Freedesktop Poppler 0.59.0
In Poppler 0.59.0, a floating point exception exists in the isImageInterpolationRequired() function in Splash.cc via a crafted PDF document.
local
low complexity
freedesktop CWE-20
7.8
2017-09-17 CVE-2017-14511 Improper Input Validation vulnerability in SAP E-Recruiting
An issue was discovered in SAP E-Recruiting (aka ERECRUIT) 605 through 617.
network
low complexity
sap CWE-20
7.5
2017-09-17 CVE-2017-14509 Improper Input Validation vulnerability in Sugarcrm
An issue was discovered in SugarCRM before 7.7.2.3, 7.8.x before 7.8.2.2, and 7.9.x before 7.9.2.0 (and Sugar Community Edition 6.5.26).
network
low complexity
sugarcrm CWE-20
8.8