Vulnerabilities > Improper Input Validation
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-09-14 | CVE-2022-29492 | Improper Input Validation vulnerability in Hitachienergy Microscada X Sys600 Improper Input Validation vulnerability in the handling of a malformed IEC 104 TCP packet in the Hitachi Energy MicroSCADA X SYS600, MicroSCADA Pro SYS600. | 7.5 |
2022-09-14 | CVE-2022-29922 | Improper Input Validation vulnerability in Hitachienergy Microscada X Sys600 Improper Input Validation vulnerability in the handling of a specially crafted IEC 61850 packet with a valid data item but with incorrect data type in the IEC 61850 OPC Server in the Hitachi Energy MicroSCADA X SYS600, MicroSCADA Pro SYS600. | 7.5 |
2022-09-13 | CVE-2022-20392 | Improper Input Validation vulnerability in Google Android In declareDuplicatePermission of ParsedPermissionUtils.java, there is a possible way to obtain a dangerous permission without user consent due to improper input validation. | 7.8 |
2022-09-09 | CVE-2022-36087 | Improper Input Validation vulnerability in multiple products OAuthLib is an implementation of the OAuth request-signing logic for Python 3.6+. | 6.5 |
2022-09-09 | CVE-2021-40648 | Improper Input Validation vulnerability in Man2Html Project Man2Html 1.6G In man2html 1.6g, a filename can be created to overwrite the previous size parameter of the next chunk and the fd, bk, fd_nextsize, bk_nextsize of the current chunk. | 5.5 |
2022-09-09 | CVE-2022-3169 | Improper Input Validation vulnerability in multiple products A flaw was found in the Linux kernel. | 5.5 |
2022-09-06 | CVE-2022-36058 | Improper Input Validation vulnerability in Elrond GO Elrond go is the go implementation for the Elrond Network protocol. | 7.5 |
2022-09-06 | CVE-2022-31020 | Improper Input Validation vulnerability in Linuxfoundation Indy-Node Indy Node is the server portion of a distributed ledger purpose-built for decentralized identity. | 8.8 |
2022-09-05 | CVE-2022-30331 | Improper Input Validation vulnerability in Tigergraph 3.6.0 The User-Defined Functions (UDF) feature in TigerGraph 3.6.0 allows installation of a query (in the GSQL query language) without proper validation. | 8.8 |
2022-09-02 | CVE-2021-35109 | Improper Input Validation vulnerability in Qualcomm products Possible address manipulation from APP-NS while APP-S is configuring an RG where it tries to merge the address ranges in Snapdragon Connectivity, Snapdragon Mobile | 6.8 |