Vulnerabilities > Improper Input Validation

DATE CVE VULNERABILITY TITLE RISK
2016-01-13 CVE-2016-0005 Improper Input Validation vulnerability in Microsoft Internet Explorer 10/11/9
Microsoft Internet Explorer 9 through 11 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, aka "Internet Explorer Elevation of Privilege Vulnerability."
network
low complexity
microsoft CWE-20
4.3
2016-01-12 CVE-2015-7759 Improper Input Validation vulnerability in F5 products
BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, Link Controller, and PEM 12.0.0 before HF1, when the TCP profile for a virtual server is configured with Congestion Metrics Cache enabled, allow remote attackers to cause a denial of service (Traffic Management Microkernel (TMM) restart) via crafted ICMP packets, related to Path MTU (PMTU) discovery.
network
high complexity
f5 CWE-20
3.7
2016-01-11 CVE-2015-8331 Improper Input Validation vulnerability in Huawei Vcn500 V100R002C00Spc200B010
The Operation and Maintenance Unit (OMU) in Huawei VCN500 with software before V100R002C00SPC200 does not properly invalidate the session ID when an "abnormal exit" occurs, which allows remote attackers to conduct replay attacks via the session ID.
network
high complexity
huawei CWE-20
7.4
2016-01-08 CVE-2015-8760 Improper Input Validation vulnerability in Typo3
The Flvplayer component in TYPO3 6.2.x before 6.2.16 allows remote attackers to embed Flash videos from external domains via unspecified vectors, aka "Cross-Site Flashing."
network
low complexity
typo3 CWE-20
6.1
2016-01-08 CVE-2015-8226 Improper Input Validation vulnerability in Huawei ALE Firmware and Gem-703L Firmware
The Joint Photographic Experts Group Processing Unit (JPU) driver in Huawei ALE smartphones with software before ALE-UL00C00B220 and ALE-TL00C01B220 and GEM-703L smartphones with software before V100R001C233B111 allows remote attackers to cause a denial of service (crash) via a crafted application with the system or camera permission, a different vulnerability than CVE-2015-8225.
local
low complexity
huawei CWE-20
5.5
2016-01-08 CVE-2015-8225 Improper Input Validation vulnerability in Huawei ALE Firmware and Gem-703L Firmware
The Joint Photographic Experts Group Processing Unit (JPU) driver in Huawei ALE smartphones with software before ALE-UL00C00B220 and ALE-TL00C01B220 and GEM-703L smartphones with software before V100R001C233B111 allows remote attackers to cause a denial of service (crash) via a crafted application with the system or camera permission, a different vulnerability than CVE-2015-8226.
local
low complexity
huawei CWE-20
5.5
2016-01-08 CVE-2015-7754 Improper Input Validation vulnerability in Juniper Screenos 6.3.0
Juniper ScreenOS before 6.3.0r21, when ssh-pka is configured and enabled, allows remote attackers to cause a denial of service (system crash) or execute arbitrary code via crafted SSH negotiation.
network
high complexity
juniper CWE-20
8.1
2016-01-08 CVE-2015-7519 Improper Input Validation vulnerability in Phusionpassenger Phusion Passenger
agent/Core/Controller/SendRequest.cpp in Phusion Passenger before 4.0.60 and 5.0.x before 5.0.22, when used in Apache integration mode or in standalone mode without a filtering proxy, allows remote attackers to spoof headers passed to applications by using an _ (underscore) character instead of a - (dash) character in an HTTP header, as demonstrated by an X_User header.
network
high complexity
phusionpassenger CWE-20
3.7
2016-01-08 CVE-2015-5254 Improper Input Validation vulnerability in multiple products
Apache ActiveMQ 5.x before 5.13.0 does not restrict the classes that can be serialized in the broker, which allows remote attackers to execute arbitrary code via a crafted serialized Java Message Service (JMS) ObjectMessage object.
network
low complexity
redhat apache fedoraproject CWE-20
critical
9.8
2016-01-04 CVE-2015-8742 Improper Input Validation vulnerability in Wireshark 2.0.0
The dissect_CPMSetBindings function in epan/dissectors/packet-mswsp.c in the MS-WSP dissector in Wireshark 2.0.x before 2.0.1 does not validate the column size, which allows remote attackers to cause a denial of service (memory consumption or application crash) via a crafted packet.
local
low complexity
wireshark CWE-20
5.5