Vulnerabilities > Improper Input Validation

DATE CVE VULNERABILITY TITLE RISK
2016-01-16 CVE-2015-6863 Improper Input Validation vulnerability in HP Arcsight Logger
HPE ArcSight Logger before 6.1P1 allows remote attackers to execute arbitrary code via unspecified input to the (1) Intellicus or (2) client-certificate upload component.
network
low complexity
hp CWE-20
7.3
2016-01-15 CVE-2016-1262 Improper Input Validation vulnerability in Juniper Junos
Juniper Junos OS before 12.1X46-D45, 12.1X47 before 12.1X47-D30, 12.1X48 before 12.3X48-D20, and 15.1X49 before 15.1X49-D30 on SRX series devices, when the Real Time Streaming Protocol Application Layer Gateway (RTSP ALG) is enabled, allow remote attackers to cause a denial of service (flowd crash) via a crafted RTSP packet.
network
high complexity
juniper CWE-20
5.9
2016-01-15 CVE-2016-1258 Improper Input Validation vulnerability in Juniper Junos
Embedthis Appweb, as used in J-Web in Juniper Junos OS before 12.1X44-D60, 12.1X46 before 12.1X46-D45, 12.1X47 before 12.1X47-D30, 12.3 before 12.3R10, 12.3X48 before 12.3X48-D20, 13.2X51 before 13.2X51-D20, 13.3 before 13.3R8, 14.1 before 14.1R6, and 14.2 before 14.2R5, allows remote attackers to cause a denial of service (J-Web crash) via unspecified vectors.
network
low complexity
juniper CWE-20
5.3
2016-01-15 CVE-2016-1257 Improper Input Validation vulnerability in Juniper Junos
The Routing Engine in Juniper Junos OS 13.2R5 through 13.2R8, 13.3R1 before 13.3R8, 13.3R7 before 13.3R7-S3, 14.1R1 before 14.1R6, 14.1R3 before 14.1R3-S9, 14.1R4 before 14.1R4-S7, 14.1X51 before 14.1X51-D65, 14.1X53 before 14.1X53-D12, 14.1X53 before 14.1X53-D28, 14.1X53 before 4.1X53-D35, 14.2R1 before 14.2R5, 14.2R3 before 14.2R3-S4, 14.2R4 before 14.2R4-S1, 15.1 before 15.1R3, 15.1F2 before 15.1F2-S2, and 15.1X49 before 15.1X49-D40, when LDP is enabled, allows remote attackers to cause a denial of service (RPD routing process crash) via a crafted LDP packet.
network
high complexity
juniper CWE-20
5.9
2016-01-15 CVE-2015-8688 Improper Input Validation vulnerability in Gajim
Gajim before 0.16.5 allows remote attackers to modify the roster and intercept messages via a crafted roster-push IQ stanza.
network
low complexity
gajim CWE-20
5.4
2016-01-14 CVE-2015-8605 Improper Input Validation vulnerability in multiple products
ISC DHCP 4.x before 4.1-ESV-R12-P1, 4.2.x, and 4.3.x before 4.3.3-P1 allows remote attackers to cause a denial of service (application crash) via an invalid length field in a UDP IPv4 packet.
low complexity
sophos isc debian canonical CWE-20
6.5
2016-01-13 CVE-2016-1569 Improper Input Validation vulnerability in Firebirdsql Firebird 2.5.5
FireBird 2.5.5 allows remote authenticated users to cause a denial of service (daemon crash) by using service manager to invoke the gbak utility with an invalid parameter.
network
low complexity
firebirdsql CWE-20
6.5
2016-01-13 CVE-2016-1494 Improper Input Validation vulnerability in multiple products
The verify function in the RSA package for Python (Python-RSA) before 3.3 allows attackers to spoof signatures with a small public exponent via crafted signature padding, aka a BERserk attack.
network
low complexity
python fedoraproject opensuse CWE-20
5.3
2016-01-13 CVE-2015-8607 Improper Input Validation vulnerability in multiple products
The canonpath function in the File::Spec module in PathTools before 3.62, as used in Perl, does not properly preserve the taint attribute of data, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.
network
low complexity
canonical perl debian CWE-20
7.3
2016-01-13 CVE-2015-8466 Improper Input Validation vulnerability in multiple products
Swift3 before 1.9 allows remote attackers to conduct replay attacks via an Authorization request that lacks a Date header.
network
high complexity
fedoraproject openstack CWE-20
7.4