Vulnerabilities > Improper Input Validation
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-09-20 | CVE-2017-14604 | Improper Input Validation vulnerability in multiple products GNOME Nautilus before 3.23.90 allows attackers to spoof a file type by using the .desktop file extension, as demonstrated by an attack in which a .desktop file's Name field ends in .pdf but this file's Exec field launches a malicious "sh -c" command. | 6.5 |
2017-09-19 | CVE-2017-6315 | Improper Input Validation vulnerability in Sophos Astaro Security Gateway Firmware 7.500/7.506 Astaro Security Gateway (aka ASG) 7 allows remote attackers to execute arbitrary code via a crafted request to index.plx. | 9.8 |
2017-09-19 | CVE-2017-10700 | Improper Input Validation vulnerability in Qnap QTS 4.3.3.0229 In the medialibrary component in QNAP NAS 4.3.3.0229, an un-authenticated, remote attacker can execute arbitrary system commands as the root user of the NAS application. | 9.8 |
2017-09-19 | CVE-2015-3419 | Improper Input Validation vulnerability in Vbulletin vBulletin 5.x through 5.1.6 allows remote authenticated users to bypass authorization checks and inject private messages into conversations via vectors related to an input validation failure. | 6.5 |
2017-09-19 | CVE-2014-5362 | Improper Input Validation vulnerability in Landesk Management Suite 8.7/8.8/9.6 The admin interface in Landesk Management Suite 9.6 and earlier allows remote attackers to conduct remote file inclusion attacks involving ASPX pages from third-party sites via the d parameter to (1) ldms/sm_actionfrm.asp or (2) remote/frm_coremainfrm.aspx; or the (3) top parameter to remote/frm_splitfrm.aspx. | 7.2 |
2017-09-18 | CVE-2017-9333 | Improper Input Validation vulnerability in Openwebif Project Openwebif 1.2.5 OpenWebif 1.2.5 allows remote code execution via a URL to the CallOPKG function in the IpkgController class in plugin/controllers/ipkg.py, when the URL refers to an attacker-controlled web site with a Trojan horse package. | 8.8 |
2017-09-17 | CVE-2017-14520 | Improper Input Validation vulnerability in Freedesktop Poppler 0.59.0 In Poppler 0.59.0, a floating point exception occurs in Splash::scaleImageYuXd() in Splash.cc, which may lead to a potential attack when handling malicious PDF files. | 7.8 |
2017-09-17 | CVE-2017-14518 | Improper Input Validation vulnerability in Freedesktop Poppler 0.59.0 In Poppler 0.59.0, a floating point exception exists in the isImageInterpolationRequired() function in Splash.cc via a crafted PDF document. | 7.8 |
2017-09-17 | CVE-2017-14511 | Improper Input Validation vulnerability in SAP E-Recruiting An issue was discovered in SAP E-Recruiting (aka ERECRUIT) 605 through 617. | 7.5 |
2017-09-17 | CVE-2017-14509 | Improper Input Validation vulnerability in Sugarcrm An issue was discovered in SugarCRM before 7.7.2.3, 7.8.x before 7.8.2.2, and 7.9.x before 7.9.2.0 (and Sugar Community Edition 6.5.26). | 8.8 |