Vulnerabilities > Improper Input Validation
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-08-05 | CVE-2022-2417 | Improper Input Validation vulnerability in Gitlab Insufficient validation in GitLab CE/EE affecting all versions from 12.10 prior to 15.0.5, 15.1 prior to 15.1.4, and 15.2 prior to 15.2.1 allows an authenticated and authorised user to import a project that includes branch names which are 40 hexadecimal characters, which could be abused in supply chain attacks where a victim pinned to a specific Git commit of the project. | 4.5 |
2022-08-02 | CVE-2022-29154 | Improper Input Validation vulnerability in multiple products An issue was discovered in rsync before 3.2.5 that allows malicious remote servers to write arbitrary files inside the directories of connecting peers. | 7.4 |
2022-08-01 | CVE-2022-31321 | Improper Input Validation vulnerability in Boltcms Bolt The foldername parameter in Bolt 5.1.7 was discovered to have incorrect input validation, allowing attackers to perform directory enumeration or cause a Denial of Service (DoS) via a crafted input. | 9.1 |
2022-08-01 | CVE-2022-34164 | Improper Input Validation vulnerability in IBM Cics TX 11.1 IBM CICS TX 11.1 could allow a local user to impersonate another legitimate user due to improper input validation. | 5.5 |
2022-08-01 | CVE-2022-27255 | Improper Input Validation vulnerability in Realtek Ecos Msdk Firmware and Ecos Rsdk Firmware In Realtek eCos RSDK 1.5.7p1 and MSDK 4.9.4p1, the SIP ALG function that rewrites SDP data has a stack-based buffer overflow. | 9.8 |
2022-07-28 | CVE-2022-37010 | Improper Input Validation vulnerability in Jetbrains Intellij Idea In JetBrains IntelliJ IDEA before 2022.2 email address validation in the "Git User Name Is Not Defined" dialog was missed | 3.3 |
2022-07-28 | CVE-2022-2479 | Improper Input Validation vulnerability in Google Chrome Insufficient validation of untrusted input in File in Google Chrome on Android prior to 103.0.5060.134 allowed an attacker who convinced a user to install a malicious app to obtain potentially sensitive information from internal file directories via a crafted HTML page. | 4.3 |
2022-07-27 | CVE-2020-6998 | Improper Input Validation vulnerability in Rockwellautomation products The connection establishment algorithm found in Rockwell Automation CompactLogix 5370 and ControlLogix 5570 versions 33 and prior does not sufficiently manage its control flow during execution, creating an infinite loop. | 8.6 |
2022-07-26 | CVE-2022-1500 | Improper Input Validation vulnerability in Google Chrome Insufficient data validation in Dev Tools in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to bypass content security policy via a crafted HTML page. | 6.5 |
2022-07-25 | CVE-2022-35649 | Improper Input Validation vulnerability in multiple products The vulnerability was found in Moodle, occurs due to improper input validation when parsing PostScript code. | 9.8 |