Vulnerabilities > Improper Input Validation
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-03-20 | CVE-2016-4927 | Improper Input Validation vulnerability in Juniper Junos Space Insufficient validation of SSH keys in Junos Space before 15.2R2 allows man-in-the-middle (MITM) type of attacks while a Space device is communicating with managed devices. | 8.1 |
2017-03-20 | CVE-2016-6816 | Improper Input Validation vulnerability in Apache Tomcat The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. | 7.1 |
2017-03-20 | CVE-2017-6837 | Improper Input Validation vulnerability in Audiofile 0.3.6 WAVE.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via vectors related to a large number of coefficients. | 5.5 |
2017-03-20 | CVE-2014-9851 | Improper Input Validation vulnerability in multiple products ImageMagick 6.8.9.9 allows remote attackers to cause a denial of service (application crash). | 7.5 |
2017-03-17 | CVE-2017-3881 | Improper Input Validation vulnerability in Cisco IOS A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. | 9.8 |
2017-03-17 | CVE-2017-3875 | Improper Input Validation vulnerability in Cisco Nx-Os An Access-Control Filtering Mechanisms Bypass vulnerability in certain access-control filtering mechanisms on Cisco Nexus 7000 Series Switches could allow an unauthenticated, remote attacker to bypass defined traffic configured within an access control list (ACL) on the affected system. | 5.3 |
2017-03-17 | CVE-2014-8705 | Improper Input Validation vulnerability in Wondercms 2014 PHP remote file inclusion vulnerability in editInplace.php in Wonder CMS 2014 allows remote attackers to execute arbitrary PHP code via a URL in the hook parameter. | 9.8 |
2017-03-17 | CVE-2017-6961 | Improper Input Validation vulnerability in Apng2Gif Project Apng2Gif 1.7 An issue was discovered in apng2gif 1.7. | 5.5 |
2017-03-17 | CVE-2017-6955 | Improper Input Validation vulnerability in Teleogistic Invite Anyone An issue was discovered in by-email/by-email.php in the Invite Anyone plugin before 1.3.15 for WordPress. | 5.3 |
2017-03-17 | CVE-2017-0148 | Improper Input Validation vulnerability in multiple products The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0144, CVE-2017-0145, and CVE-2017-0146. | 8.1 |