Vulnerabilities > Improper Input Validation

DATE CVE VULNERABILITY TITLE RISK
2017-05-02 CVE-2016-10243 Improper Input Validation vulnerability in multiple products
TeX Live allows remote attackers to execute arbitrary commands by leveraging inclusion of mpost in shell_escape_commands in the texmf.cnf config file.
network
low complexity
debian fedoraproject tug CWE-20
critical
9.8
2017-05-01 CVE-2017-8396 Improper Input Validation vulnerability in GNU Binutils 2.28
The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 1 because the existing reloc offset range tests didn't catch small negative offsets less than the size of the reloc field.
network
low complexity
gnu CWE-20
7.5
2017-04-30 CVE-2017-7721 Improper Input Validation vulnerability in Irfanview FPX and Irfanview
IrfanView version 4.44 (32bit) with FPX Plugin before 4.45 has an Access Violation and crash in processing a FlashPix (.FPX) file.
local
low complexity
irfanview CWE-20
7.8
2017-04-29 CVE-2017-7957 Improper Input Validation vulnerability in multiple products
XStream through 1.4.9, when a certain denyTypes workaround is not used, mishandles attempts to create an instance of the primitive type 'void' during unmarshalling, leading to a remote application crash, as demonstrated by an xstream.fromXML("<void/>") call.
network
low complexity
xstream-project debian CWE-20
7.5
2017-04-28 CVE-2017-2154 Improper Input Validation vulnerability in Justsystems products
Untrusted search path vulnerability in Hanako 2017, Hanako 2016, Hanako 2015, Hanako Pro 3, JUST Office 3 [Standard], JUST Office 3 [Eco Print Package], JUST Office 3 & Tri-De DataProtect Package, JUST Government 3, JUST Jump Class 2, JUST Frontier 3, JUST School 6 Premium, Hanako Police 5, JUST Police 3, Hanako 2017 trial version allows remote attackers to gain privileges via a Trojan horse DLL in an unspecified directory.
local
low complexity
justsystems CWE-20
7.8
2017-04-28 CVE-2017-2153 Improper Input Validation vulnerability in Seil products
SEIL/x86 Fuji 1.70 to 5.62, SEIL/BPV4 5.00 to 5.62, SEIL/X1 1.30 to 5.62, SEIL/X2 1.30 to 5.62, SEIL/B1 1.00 to 5.62 allows remote attackers to cause a denial of service via specially crafted IPv4 UDP packets.
network
low complexity
seil CWE-20
7.5
2017-04-28 CVE-2017-2100 Improper Input Validation vulnerability in IPA Appgoat 3.0.0/3.0.1
Hands-on Vulnerability Learning Tool "AppGoat" for Web Application V3.0.1 and earlier allows remote attackers to conduct DNS rebinding attacks via unspecified vectors.
network
low complexity
ipa CWE-20
6.3
2017-04-27 CVE-2017-8288 Improper Input Validation vulnerability in Gnome Gnome-Shell
gnome-shell 3.22 through 3.24.1 mishandles extensions that fail to reload, which can lead to leaving extensions enabled in the lock screen.
network
high complexity
gnome CWE-20
8.1
2017-04-26 CVE-2017-3162 Improper Input Validation vulnerability in Apache Hadoop
HDFS clients interact with a servlet on the DataNode to browse the HDFS namespace.
network
low complexity
apache CWE-20
7.3
2017-04-25 CVE-2017-8219 Improper Input Validation vulnerability in Tp-Link C20I Firmware and C2 Firmware
TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n allow DoSing the HTTP server via a crafted Cookie header to the /cgi/ansi URI.
network
low complexity
tp-link CWE-20
6.5