Vulnerabilities > Improper Input Validation

DATE CVE VULNERABILITY TITLE RISK
2017-07-06 CVE-2017-0665 Improper Input Validation vulnerability in Google Android
A elevation of privilege vulnerability in the Android framework.
local
low complexity
google CWE-20
7.8
2017-07-06 CVE-2017-9524 Improper Input Validation vulnerability in multiple products
The qemu-nbd server in QEMU (aka Quick Emulator), when built with the Network Block Device (NBD) Server support, allows remote attackers to cause a denial of service (segmentation fault and server crash) by leveraging failure to ensure that all initialization occurs before talking to a client in the nbd_negotiate function.
network
low complexity
qemu debian CWE-20
7.5
2017-07-06 CVE-2017-1236 Improper Input Validation vulnerability in IBM Websphere MQ 9.0.2
IBM WebSphere MQ 9.0.2 could allow an authenticated user to potentially cause a denial of service by saving an incorrect channel status inquiry.
network
low complexity
ibm CWE-20
6.5
2017-07-05 CVE-2017-10923 Improper Input Validation vulnerability in XEN
Xen through 4.8.x does not validate a vCPU array index upon the sending of an SGI, which allows guest OS users to cause a denial of service (hypervisor crash), aka XSA-225.
network
low complexity
xen CWE-20
6.5
2017-07-05 CVE-2017-10918 Improper Input Validation vulnerability in XEN
Xen through 4.8.x does not validate memory allocations during certain P2M operations, which allows guest OS users to obtain privileged host OS access, aka XSA-222.
network
low complexity
xen CWE-20
critical
10.0
2017-07-04 CVE-2017-6721 Improper Input Validation vulnerability in Cisco Wide Area Application Services 6.3(1)
A vulnerability in the ingress processing of fragmented TCP packets by Cisco Wide Area Application Services (WAAS) could allow an unauthenticated, remote attacker to cause the WAASNET process to restart unexpectedly, causing a denial of service (DoS) condition.
network
low complexity
cisco CWE-20
5.3
2017-07-04 CVE-2017-6719 Improper Input Validation vulnerability in Cisco IOS XR 6.0.2/6.0.2.01
A vulnerability in the CLI of Cisco IOS XR Software could allow an authenticated, local attacker to execute arbitrary commands on the host operating system with root privileges, aka Command Injection.
local
low complexity
cisco CWE-20
6.7
2017-07-04 CVE-2017-6718 Improper Input Validation vulnerability in Cisco IOS XR 6.0.2/6.0.2.01
A vulnerability in the CLI of Cisco IOS XR Software could allow an authenticated, local attacker to elevate privileges to the root level.
local
low complexity
cisco CWE-20
6.7
2017-07-03 CVE-2017-5944 Improper Input Validation vulnerability in Bestpractical Request Tracker
The dashboard subscription interface in Request Tracker (RT) 4.x before 4.0.25, 4.2.x before 4.2.14, and 4.4.x before 4.4.2 might allow remote authenticated users with certain privileges to execute arbitrary code via a crafted saved search name.
network
low complexity
bestpractical CWE-20
8.8
2017-06-30 CVE-2017-2298 Improper Input Validation vulnerability in Puppet Mcollective-Sshkey-Security 0.5.0
The mcollective-sshkey-security plugin before 0.5.1 for Puppet uses a server-specified identifier as part of a path where a file is written.
network
low complexity
puppet CWE-20
6.5