Vulnerabilities > Improper Input Validation

DATE CVE VULNERABILITY TITLE RISK
2016-06-16 CVE-2016-2841 Improper Input Validation vulnerability in multiple products
The ne2000_receive function in the NE2000 NIC emulation support (hw/net/ne2000.c) in QEMU before 2.5.1 allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via crafted values for the PSTART and PSTOP registers, involving ring buffer control.
local
low complexity
qemu canonical CWE-20
6.0
2016-06-16 CVE-2016-5361 Improper Input Validation vulnerability in Libreswan
programs/pluto/ikev1.c in libreswan before 3.17 retransmits in initial-responder states, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed UDP packet.
network
low complexity
libreswan CWE-20
7.5
2016-06-16 CVE-2016-4165 Improper Input Validation vulnerability in Adobe Brackets 1.6
The extension manager in Adobe Brackets before 1.7 allows attackers to have an unspecified impact via invalid input.
network
low complexity
adobe CWE-20
critical
9.8
2016-06-16 CVE-2016-3230 Improper Input Validation vulnerability in Microsoft products
The Search component in Microsoft Windows 7, Windows Server 2008 R2 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to cause a denial of service (performance degradation) via a crafted application, aka "Windows Search Component Denial of Service Vulnerability."
local
low complexity
microsoft CWE-20
5.0
2016-06-16 CVE-2016-3228 Improper Input Validation vulnerability in Microsoft Windows Server 2008 and Windows Server 2012
Microsoft Windows Server 2008 SP2 and R2 SP1 and Windows Server 2012 Gold and R2 allow remote authenticated users to execute arbitrary code via a crafted NetLogon request, aka "Windows Netlogon Memory Corruption Remote Code Execution Vulnerability."
network
low complexity
microsoft CWE-20
8.8
2016-06-16 CVE-2016-3207 Improper Input Validation vulnerability in Microsoft Jscript and Vbscript
The Microsoft (1) JScript 5.8 and (2) VBScript 5.7 and 5.8 engines, as used in Internet Explorer 9 through 11 and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-3205 and CVE-2016-3206.
network
high complexity
microsoft CWE-20
7.5
2016-06-16 CVE-2016-3206 Improper Input Validation vulnerability in Microsoft Jscript and Vbscript
The Microsoft (1) JScript 5.8 and (2) VBScript 5.7 and 5.8 engines, as used in Internet Explorer 9 through 11 and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-3205 and CVE-2016-3207.
network
high complexity
microsoft CWE-20
7.5
2016-06-16 CVE-2016-3205 Improper Input Validation vulnerability in Microsoft Jscript and Vbscript
The Microsoft (1) JScript 5.8 and (2) VBScript 5.7 and 5.8 engines, as used in Internet Explorer 9 through 11 and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-3206 and CVE-2016-3207.
network
high complexity
microsoft CWE-20
7.5
2016-06-16 CVE-2016-3203 Improper Input Validation vulnerability in Microsoft products
Microsoft Windows 8.1, Windows Server 2012 Gold and R2, Windows 10 Gold and 1511, and Microsoft Edge allow remote attackers to execute arbitrary code via a crafted PDF document, aka "Windows PDF Remote Code Execution Vulnerability."
local
low complexity
microsoft CWE-20
7.8
2016-06-16 CVE-2016-3202 Improper Input Validation vulnerability in Microsoft Chakra Javascript, Jscript and Vbscript
The Microsoft (1) Chakra JavaScript, (2) JScript, and (3) VBScript engines, as used in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability."
network
high complexity
microsoft CWE-20
7.5