Vulnerabilities > Improper Input Validation

DATE CVE VULNERABILITY TITLE RISK
2016-05-15 CVE-2016-0381 Improper Input Validation vulnerability in IBM Cognos TM1
IBM Cognos TM1 10.2.2 before FP5, when the host/pmhub/pm/admin AdminGroups setting is empty, allows remote authenticated users to cause a denial of service (configuration outage) via a non-empty value.
network
low complexity
ibm CWE-20
4.3
2016-05-14 CVE-2016-1665 Improper Input Validation vulnerability in multiple products
The JSGenericLowering class in compiler/js-generic-lowering.cc in Google V8, as used in Google Chrome before 50.0.2661.94, mishandles comparison operators, which allows remote attackers to obtain sensitive information via crafted JavaScript code.
network
low complexity
opensuse redhat google CWE-20
6.5
2016-05-14 CVE-2016-1661 Improper Input Validation vulnerability in multiple products
Blink, as used in Google Chrome before 50.0.2661.94, does not ensure that frames satisfy a check for the same renderer process in addition to a Same Origin Policy check, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted web site, related to BindingSecurity.cpp and DOMWindow.cpp.
network
low complexity
redhat google opensuse CWE-20
8.0
2016-05-14 CVE-2016-1660 Improper Input Validation vulnerability in multiple products
Blink, as used in Google Chrome before 50.0.2661.94, mishandles assertions in the WTF::BitArray and WTF::double_conversion::Vector classes, which allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted web site.
network
low complexity
opensuse redhat google CWE-20
8.8
2016-05-14 CVE-2016-1209 Improper Input Validation vulnerability in Ninjaforms Ninja Forms
The Ninja Forms plugin before 2.9.42.1 for WordPress allows remote attackers to conduct PHP object injection attacks via crafted serialized values in a POST request.
network
low complexity
ninjaforms CWE-20
critical
9.8
2016-05-13 CVE-2015-8099 Improper Input Validation vulnerability in F5 products
F5 BIG-IP LTM, AFM, Analytics, APM, ASM, Link Controller, and PEM 11.3.x, 11.4.x before 11.4.1 HF10, 11.5.x before 11.5.4, 11.6.x before 11.6.1, and 12.x before 12.0.0 HF1; BIG-IP AAM 11.4.x before 11.4.1 HF10, 11.5.x before 11.5.4, 11.6.x before 11.6.1, and 12.x before 12.0.0 HF1; BIG-IP DNS 12.x before 12.0.0 HF1; BIG-IP Edge Gateway, WebAccelerator, and WOM 11.3.0; BIG-IP GTM 11.3.x, 11.4.x before 11.4.1 HF10, 11.5.x before 11.5.4, and 11.6.x before 11.6.1; BIG-IP PSM 11.3.x and 11.4.x before 11.4.1 HF10; Enterprise Manager 3.0.0 through 3.1.1; BIG-IQ Cloud and BIG-IQ Security 4.0.0 through 4.5.0; BIG-IQ Device 4.2.0 through 4.5.0; BIG-IQ ADC 4.5.0; BIG-IQ Centralized Management 4.6.0; and BIG-IQ Cloud and Orchestration 1.0.0 on the 3900, 6900, 8900, 8950, 11000, 11050, PB100 and PB200 platforms, when software SYN cookies are configured on virtual servers, allow remote attackers to cause a denial of service (High-Speed Bridge hang) via an invalid TCP segment.
network
high complexity
f5 CWE-20
5.9
2016-05-13 CVE-2014-9764 Improper Input Validation vulnerability in multiple products
imlib2 before 1.4.7 allows remote attackers to cause a denial of service (segmentation fault) via a crafted GIF file.
network
low complexity
debian enlightenment CWE-20
7.5
2016-05-13 CVE-2014-9762 Improper Input Validation vulnerability in multiple products
imlib2 before 1.4.7 allows remote attackers to cause a denial of service (segmentation fault) via a GIF image without a colormap.
network
low complexity
enlightenment debian CWE-20
7.5
2016-05-13 CVE-2016-2850 Improper Input Validation vulnerability in multiple products
Botan 1.11.x before 1.11.29 does not enforce TLS policy for (1) signature algorithms and (2) ECC curves, which allows remote attackers to conduct downgrade attacks via unspecified vectors.
network
low complexity
fedoraproject botan-project CWE-20
7.5
2016-05-13 CVE-2016-2194 Improper Input Validation vulnerability in multiple products
The ressol function in Botan before 1.10.11 and 1.11.x before 1.11.27 allows remote attackers to cause a denial of service (infinite loop) via unspecified input to the OS2ECP function, related to a composite modulus.
network
low complexity
debian botan-project CWE-20
7.5