Vulnerabilities > Improper Input Validation

DATE CVE VULNERABILITY TITLE RISK
2022-11-01 CVE-2022-3444 Improper Input Validation vulnerability in Google Chrome
Insufficient data validation in File System API in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to bypass File System restrictions via a crafted HTML page and malicious file.
network
low complexity
google CWE-20
4.3
2022-10-27 CVE-2022-0073 Improper Input Validation vulnerability in Litespeedtech Openlitespeed
Improper Input Validation vulnerability in LiteSpeed Technologies OpenLiteSpeed Web Server and LiteSpeed Web Server dashboards allows Command Injection.
network
low complexity
litespeedtech CWE-20
8.8
2022-10-26 CVE-2022-20822 Improper Input Validation vulnerability in Cisco Identity Services Engine 3.1/3.2
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to read and delete files on an affected device.
network
low complexity
cisco CWE-20
8.1
2022-10-25 CVE-2022-33178 Improper Input Validation vulnerability in Broadcom Fabric Operating System
A vulnerability in the radius authentication system of Brocade Fabric OS before Brocade Fabric OS 9.0 could allow a remote attacker to execute arbitrary code on the Brocade switch.
network
low complexity
broadcom CWE-20
7.2
2022-10-25 CVE-2022-38435 Improper Input Validation vulnerability in Adobe Illustrator
Adobe Illustrator versions 26.4 (and earlier) and 25.4.7 (and earlier) are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user.
local
low complexity
adobe CWE-20
7.8
2022-10-24 CVE-2021-44769 Improper Input Validation vulnerability in Lannerinc Iac-Ast2500A Firmware 1.10.0
An improper input validation vulnerability in the TLS certificate generation function allows an attacker to cause a Denial-of-Service (DoS) condition which can only be reverted via a factory reset.
network
low complexity
lannerinc CWE-20
6.5
2022-10-19 CVE-2022-41694 Improper Input Validation vulnerability in F5 products
In BIG-IP versions 16.1.x before 16.1.3, 15.1.x before 15.1.6.1, 14.1.x before 14.1.5, and all versions of 13.1.x, and BIG-IQ versions 8.x before 8.2.0.1 and all versions of 7.x, when an SSL key is imported on a BIG-IP or BIG-IQ system, undisclosed input can cause MCPD to terminate.
network
low complexity
f5 CWE-20
4.9
2022-10-19 CVE-2022-41813 Improper Input Validation vulnerability in F5 products
In versions 16.1.x before 16.1.3.1, 15.1.x before 15.1.6.1, 14.1.x before 14.1.5, and all versions of 13.1.x, when BIG-IP is provisioned with PEM or AFM module, an undisclosed input can cause Traffic Management Microkernel (TMM) to terminate.
network
low complexity
f5 CWE-20
6.5
2022-10-19 CVE-2022-1414 Improper Input Validation vulnerability in Redhat 3Scale API Management 2.0
3scale API Management 2 does not perform adequate sanitation for user input in multiple fields.
network
low complexity
redhat CWE-20
8.8
2022-10-18 CVE-2022-22192 Improper Input Validation vulnerability in Juniper Junos OS Evolved
An Improper Validation of Syntactic Correctness of Input vulnerability in the kernel of Juniper Networks Junos OS Evolved on PTX series allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS).
network
low complexity
juniper CWE-20
7.5