Vulnerabilities > Improper Input Validation

DATE CVE VULNERABILITY TITLE RISK
2022-08-05 CVE-2022-2417 Improper Input Validation vulnerability in Gitlab
Insufficient validation in GitLab CE/EE affecting all versions from 12.10 prior to 15.0.5, 15.1 prior to 15.1.4, and 15.2 prior to 15.2.1 allows an authenticated and authorised user to import a project that includes branch names which are 40 hexadecimal characters, which could be abused in supply chain attacks where a victim pinned to a specific Git commit of the project.
network
low complexity
gitlab CWE-20
4.5
2022-08-02 CVE-2022-29154 Improper Input Validation vulnerability in multiple products
An issue was discovered in rsync before 3.2.5 that allows malicious remote servers to write arbitrary files inside the directories of connecting peers.
network
high complexity
samba fedoraproject CWE-20
7.4
2022-08-01 CVE-2022-31321 Improper Input Validation vulnerability in Boltcms Bolt
The foldername parameter in Bolt 5.1.7 was discovered to have incorrect input validation, allowing attackers to perform directory enumeration or cause a Denial of Service (DoS) via a crafted input.
network
low complexity
boltcms CWE-20
critical
9.1
2022-08-01 CVE-2022-34164 Improper Input Validation vulnerability in IBM Cics TX 11.1
IBM CICS TX 11.1 could allow a local user to impersonate another legitimate user due to improper input validation.
local
low complexity
ibm CWE-20
5.5
2022-08-01 CVE-2022-27255 Improper Input Validation vulnerability in Realtek Ecos Msdk Firmware and Ecos Rsdk Firmware
In Realtek eCos RSDK 1.5.7p1 and MSDK 4.9.4p1, the SIP ALG function that rewrites SDP data has a stack-based buffer overflow.
network
low complexity
realtek CWE-20
critical
9.8
2022-07-28 CVE-2022-37010 Improper Input Validation vulnerability in Jetbrains Intellij Idea
In JetBrains IntelliJ IDEA before 2022.2 email address validation in the "Git User Name Is Not Defined" dialog was missed
local
low complexity
jetbrains CWE-20
3.3
2022-07-28 CVE-2022-2479 Improper Input Validation vulnerability in Google Chrome
Insufficient validation of untrusted input in File in Google Chrome on Android prior to 103.0.5060.134 allowed an attacker who convinced a user to install a malicious app to obtain potentially sensitive information from internal file directories via a crafted HTML page.
network
low complexity
google CWE-20
4.3
2022-07-27 CVE-2020-6998 Improper Input Validation vulnerability in Rockwellautomation products
The connection establishment algorithm found in Rockwell Automation CompactLogix 5370 and ControlLogix 5570 versions 33 and prior does not sufficiently manage its control flow during execution, creating an infinite loop.
network
low complexity
rockwellautomation CWE-20
8.6
2022-07-26 CVE-2022-1500 Improper Input Validation vulnerability in Google Chrome
Insufficient data validation in Dev Tools in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to bypass content security policy via a crafted HTML page.
network
low complexity
google CWE-20
6.5
2022-07-25 CVE-2022-35649 Improper Input Validation vulnerability in multiple products
The vulnerability was found in Moodle, occurs due to improper input validation when parsing PostScript code.
network
low complexity
moodle fedoraproject CWE-20
critical
9.8