Vulnerabilities > Improper Input Validation

DATE CVE VULNERABILITY TITLE RISK
2016-09-26 CVE-2016-7162 Improper Input Validation vulnerability in multiple products
The _g_file_remove_directory function in file-utils.c in File Roller 3.5.4 through 3.20.2 allows remote attackers to delete arbitrary files via a symlink attack on a folder in an archive.
network
low complexity
canonical file-roller-project CWE-20
7.5
2016-09-26 CVE-2016-3110 Improper Input Validation vulnerability in multiple products
mod_cluster, as used in Red Hat JBoss Web Server 2.1, allows remote attackers to cause a denial of service (Apache http server crash) via an MCMP message containing a series of = (equals) characters after a legitimate element.
network
low complexity
redhat fedoraproject CWE-20
7.5
2016-09-26 CVE-2016-5947 Improper Input Validation vulnerability in IBM products
IBM Spectrum Control (formerly Tivoli Storage Productivity Center) 5.2.x before 5.2.11 allows remote authenticated users to conduct clickjacking attacks via a crafted web site.
network
low complexity
ibm CWE-20
5.7
2016-09-26 CVE-2016-3000 Improper Input Validation vulnerability in IBM Connections
The help service in IBM Connections 4.x through 4.5 CR5, 5.0 before CR4, and 5.5 before CR1 allows remote authenticated users to cause a denial of service (service degradation) via a crafted URL.
network
low complexity
ibm CWE-20
4.3
2016-09-25 CVE-2016-5174 Improper Input Validation vulnerability in Google Chrome
browser/ui/cocoa/browser_window_controller_private.mm in Google Chrome before 53.0.2785.113 does not process fullscreen toggle requests during a fullscreen transition, which allows remote attackers to cause a denial of service (unsuppressed popup) via a crafted web site.
network
low complexity
google CWE-20
6.5
2016-09-25 CVE-2016-4753 Improper Input Validation vulnerability in Apple products
Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3 mishandle signed disk images, which allows attackers to execute arbitrary code in a privileged context via a crafted app.
local
low complexity
apple CWE-20
7.8
2016-09-25 CVE-2016-4728 Improper Input Validation vulnerability in Apple products
WebKit in Apple iOS before 10, tvOS before 10, iTunes before 12.5.1 on Windows, and Safari before 10 mishandles error prototypes, which allows remote attackers to execute arbitrary code via a crafted web site.
network
low complexity
apple CWE-20
8.8
2016-09-25 CVE-2016-4722 Improper Input Validation vulnerability in Apple Iphone OS
The IDS - Connectivity component in Apple iOS before 10 and OS X before 10.12 allows man-in-the-middle attackers to conduct Call Relay spoofing attacks and cause a denial of service via unspecified vectors.
network
high complexity
apple CWE-20
5.9
2016-09-25 CVE-2016-4711 Improper Input Validation vulnerability in Apple Iphone OS
CCrypt in corecrypto in CommonCrypto in Apple iOS before 10 and OS X before 10.12 allows attackers to discover cleartext information by leveraging a function call that specifies the same buffer for input and output.
network
low complexity
apple CWE-20
7.5
2016-09-25 CVE-2016-4706 Improper Input Validation vulnerability in Apple mac OS X
cd9660 in Apple OS X before 10.12 allows local users to cause a denial of service via unspecified vectors.
local
low complexity
apple CWE-20
5.5