Vulnerabilities > Improper Input Validation

DATE CVE VULNERABILITY TITLE RISK
2016-04-11 CVE-2016-3678 Improper Input Validation vulnerability in Huawei products
Huawei Quidway S9700, S5700, S5300, S9300, and S7700 switches with software before V200R003SPH012 allow remote attackers to cause a denial of service (switch restart) via crafted traffic.
network
low complexity
huawei CWE-20
7.5
2016-04-08 CVE-2016-2381 Improper Input Validation vulnerability in multiple products
Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.
network
low complexity
perl debian oracle opensuse canonical CWE-20
7.5
2016-04-08 CVE-2016-3980 Improper Input Validation vulnerability in SAP Application Server Java 7.2/7.3/7.4
The Java Startup Framework (aka jstart) in SAP JAVA AS 7.2 through 7.4 allows remote attackers to cause a denial of service (process crash) via a crafted HTTP request, aka SAP Security Note 2259547.
network
low complexity
sap CWE-20
7.5
2016-04-08 CVE-2016-3979 Improper Input Validation vulnerability in SAP Java AS 7.4
Internet Communication Manager (aka ICMAN or ICM) in SAP JAVA AS 7.2 through 7.4 allows remote attackers to cause a denial of service (heap memory corruption and process crash) via a crafted HTTP request, related to the IctParseCookies function, aka SAP Security Note 2256185.
network
low complexity
sap CWE-20
7.5
2016-04-07 CVE-2016-2098 Improper Input Validation vulnerability in multiple products
Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method.
network
low complexity
debian rubyonrails CWE-20
7.3
2016-04-07 CVE-2016-0792 Improper Input Validation vulnerability in multiple products
Multiple unspecified API endpoints in Jenkins before 1.650 and LTS before 1.642.2 allow remote authenticated users to execute arbitrary code via serialized data in an XML file, related to XStream and groovy.util.Expando.
network
low complexity
jenkins redhat CWE-20
8.8
2016-04-07 CVE-2016-0789 Improper Input Validation vulnerability in multiple products
CRLF injection vulnerability in the CLI command documentation in Jenkins before 1.650 and LTS before 1.642.2 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.
network
low complexity
jenkins redhat CWE-20
6.1
2016-04-07 CVE-2016-2216 Improper Input Validation vulnerability in multiple products
The HTTP header parsing code in Node.js 0.10.x before 0.10.42, 0.11.6 through 0.11.16, 0.12.x before 0.12.10, 4.x before 4.3.0, and 5.x before 5.6.0 allows remote attackers to bypass an HTTP response-splitting protection mechanism via UTF-8 encoded Unicode characters in the HTTP header, as demonstrated by %c4%8d%c4%8a.
network
low complexity
nodejs fedoraproject CWE-20
7.5
2016-04-07 CVE-2016-2086 Improper Input Validation vulnerability in multiple products
Node.js 0.10.x before 0.10.42, 0.12.x before 0.12.10, 4.x before 4.3.0, and 5.x before 5.6.0 allow remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header.
network
low complexity
nodejs fedoraproject CWE-20
7.5
2016-04-07 CVE-2015-8305 Improper Input Validation vulnerability in Huawei P7 Firmware P7L07V100R001C01B606/P7L10C900B852
Huawei Sophia-L10 smartphones with software before P7-L10C900B852 allow attackers to cause a denial of service (system panic) via a crafted application with the system or camera privilege.
local
low complexity
huawei CWE-20
5.5