Vulnerabilities > Improper Input Validation

DATE CVE VULNERABILITY TITLE RISK
2017-02-07 CVE-2016-2781 Improper Input Validation vulnerability in GNU Coreutils
chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.
local
low complexity
gnu CWE-20
6.5
2017-02-06 CVE-2016-5102 Improper Input Validation vulnerability in Libtiff
Buffer overflow in the readgifimage function in gif2tiff.c in the gif2tiff tool in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (segmentation fault) via a crafted gif file.
local
low complexity
libtiff CWE-20
5.5
2017-02-06 CVE-2010-5328 Improper Input Validation vulnerability in Linux Kernel
include/linux/init_task.h in the Linux kernel before 2.6.35 does not prevent signals with a process group ID of zero from reaching the swapper process, which allows local users to cause a denial of service (system crash) by leveraging access to this process group.
local
low complexity
linux CWE-20
5.5
2017-02-04 CVE-2017-5880 Improper Input Validation vulnerability in Splunk
Splunk Web in Splunk Enterprise versions 6.5.x before 6.5.2, 6.4.x before 6.4.5, 6.3.x before 6.3.9, 6.2.x before 6.2.13, 6.1.x before 6.1.12, 6.0.x before 6.0.13, 5.0.x before 5.0.17 and Splunk Light versions before 6.5.2 allows remote authenticated users to cause a denial of service (daemon crash) via a crafted GET request, aka SPL-130279.
network
low complexity
splunk CWE-20
6.5
2017-02-03 CVE-2016-6500 Improper Input Validation vulnerability in Forgerock Racf Connector 1.1.0.0
Unspecified methods in the RACF Connector component before 1.1.1.0 in ForgeRock OpenIDM and OpenICF improperly call the SearchControls constructor with returnObjFlag set to true, which allows remote attackers to execute arbitrary code via a crafted serialized Java object, aka LDAP entry poisoning.
network
high complexity
forgerock CWE-20
8.1
2017-02-03 CVE-2017-3822 Improper Input Validation vulnerability in Cisco Firepower Threat Defense 6.1.0
A vulnerability in the logging subsystem of the Cisco Firepower Threat Defense (FTD) Firepower Device Manager (FDM) could allow an unauthenticated, remote attacker to add arbitrary entries to the audit log.
network
low complexity
cisco CWE-20
5.3
2017-02-03 CVE-2017-3818 Improper Input Validation vulnerability in Cisco Email Security Appliance Firmware 9.7.1066
A vulnerability in the Multipurpose Internet Mail Extensions (MIME) scanner of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to bypass configured user filters on the device, aka a Malformed MIME Header Filtering Bypass.
network
low complexity
cisco CWE-20
5.8
2017-02-03 CVE-2017-3814 Improper Input Validation vulnerability in Cisco Secure Firewall Management Center
A vulnerability in Cisco Firepower System Software could allow an unauthenticated, remote attacker to maliciously bypass the appliance's ability to block certain web content, aka a URL Bypass.
network
low complexity
cisco CWE-20
5.8
2017-02-03 CVE-2017-3809 Improper Input Validation vulnerability in Cisco Secure Firewall Management Center 6.1.0/6.2.0
A vulnerability in the Policy deployment module of the Cisco Firepower Management Center (FMC) could allow an unauthenticated, remote attacker to prevent deployment of a complete and accurate rule base.
network
low complexity
cisco CWE-20
5.8
2017-02-02 CVE-2016-6234 Improper Input Validation vulnerability in Lepton Project Lepton 1.0
The process_file function in lepton/jpgcoder.cc in Dropbox lepton 1.0 allows remote attackers to cause a denial of service (crash) via a crafted jpeg file.
local
low complexity
lepton-project CWE-20
5.5