Vulnerabilities > Improper Input Validation

DATE CVE VULNERABILITY TITLE RISK
2017-09-15 CVE-2017-14489 Improper Input Validation vulnerability in Linux Kernel
The iscsi_if_rx function in drivers/scsi/scsi_transport_iscsi.c in the Linux kernel through 4.13.2 allows local users to cause a denial of service (panic) by leveraging incorrect length validation.
local
low complexity
linux CWE-20
5.5
2017-09-13 CVE-2017-1556 Improper Input Validation vulnerability in IBM API Connect 5.0.7.0/5.0.7.1/5.0.7.2
IBM API Connect 5.0.7.0 through 5.0.7.2 is vulnerable to a regular expression attack that could allow an authenticated attacker to use a regex and cause the system to slow or hang.
network
low complexity
ibm CWE-20
6.5
2017-09-13 CVE-2017-14430 Improper Input Validation vulnerability in Dlink Dir-850L Firmware
D-Link DIR-850L REV.
network
low complexity
dlink CWE-20
7.5
2017-09-13 CVE-2017-8754 Improper Input Validation vulnerability in Microsoft Edge
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to trick a user into loading a page containing malicious content, due to the way that the Edge Content Security Policy (CSP) validates certain specially crafted documents, aka "Microsoft Edge Security Feature Bypass Vulnerability".
network
high complexity
microsoft CWE-20
4.2
2017-09-13 CVE-2017-8723 Improper Input Validation vulnerability in Microsoft Edge
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to trick a user into loading a page containing malicious content, due to the way that the Edge Content Security Policy (CSP) validates certain specially crafted documents, aka "Microsoft Edge Security Feature Bypass Vulnerability".
network
low complexity
microsoft CWE-20
4.3
2017-09-13 CVE-2017-8714 Improper Input Validation vulnerability in Microsoft products
The Windows Hyper-V component on Microsoft Windows 8.1, Windows Server 2012 Gold and R2,, Windows 10 1607, and Windows Server 2016 allows a remote code execution vulnerability when it fails to properly validate input from an authenticated user on a guest operating system, aka "Remote Desktop Virtual Host Remote Code Execution Vulnerability".
local
high complexity
microsoft CWE-20
7.8
2017-09-13 CVE-2017-8704 Improper Input Validation vulnerability in Microsoft Windows 10 and Windows Server 2016
The Windows Hyper-V component on Microsoft Windows 10 1607 and Windows Server 2016 allows a denial of service vulnerability when it fails to properly validate input from an authenticated user on a guest operating system, aka "Hyper-V Denial of Service Vulnerability".
local
high complexity
microsoft CWE-20
5.3
2017-09-13 CVE-2017-8699 Improper Input Validation vulnerability in Microsoft products
Windows Shell in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to run arbitrary code in the context of the current user, due to the way that Windows Shell validates file copy destinations, aka "Windows Shell Remote Code Execution Vulnerability".
local
high complexity
microsoft CWE-20
7.0
2017-09-13 CVE-2017-8682 Improper Input Validation vulnerability in Microsoft products
Windows graphics on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, Windows Server 2016, Microsoft Office Word Viewer, Microsoft Office 2007 Service Pack 3 , and Microsoft Office 2010 Service Pack 2 allows an attacker to execute remote code by the way it handles embedded fonts, aka "Win32k Graphics Remote Code Execution Vulnerability".
network
low complexity
microsoft CWE-20
8.8
2017-09-12 CVE-2017-1519 Improper Input Validation vulnerability in IBM DB2 and DB2 Connect
IBM DB2 10.5 and 11.1 contains a denial of service vulnerability.
network
high complexity
ibm CWE-20
5.9